EUROCRYPT 2015:
Elisabeth Oswald and Marc Fischlin (Eds.):
Advances in Cryptology - EUROCRYPT 2015
34th Annual International Conference on the Theory and Applications of Cryptographic Techniques
Sofia, Bulgaria,
April 26-30, 2015,
Proceedings.
EUROCRYPT 2015, Vol 1
EUROCRYPT 2015, Vol 2
Organizational Committee
Program Chairs : | Elisabeth Oswald and Marc Fischlin | |
General Chairs : | Svetla Nikova and Dimitar Jetchev |
Program Committee
Masayuki Abe |
Gilles Barthe |
Lejla Batina |
Alex Biryukov |
Alexandra Boldyreva |
Jan Camenisch |
Anne Canteaut |
Liqun Chen |
Chen-Mou Cheng |
Marten van Dijk |
Jens Groth |
Tetsu Iwata |
Marc Joye |
Charanjit S. Jutla |
Eike Kiltz |
Markulf Kohlweiss |
Gregor Leander |
Benoît Libert |
Yehuda Lindell |
Stefan Mangard |
Steven Myers |
Gregory Neven |
Kaisa Nyberg |
Kenneth G. Paterson |
David Pointcheval |
Manoj Prabhakaran |
Emmanuel Prouff |
Christian Rechberger |
Pankaj Rohatgi |
Alon Rosen |
Christian Schaffner |
Dominique Schröder |
Martijn Stam |
François-Xavier Standaert |
Douglas Stebila |
Frederik Vercauteren |
Bogdan Warinschi |
External Reviewers
- Best Paper
-
Cryptanalysis of the Multilinear Map over the Integers
, 3-12,
Jung Hee Cheon
,
Damien Stehlé
,
Changmin Lee
,
Hansol Ryu
,
Kyoohyung Han
bib info - Honorable Mentions
- AEZ
-
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks
, 45-74,
Anne Canteaut
,
Joëlle Roué
bib info - Random Number Generators
- Number Field Sieve
- Improving NFS for the discrete logarithm problem in non-prime finite fields, 129-155, Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain
bib info -
The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier Methods
, 156-170,
Cécile Pierrot
bib info - Algorithmic Cryptanalysis
-
Better Algorithms for LWE and LWR
, 173-202,
Serge Vaudenay
,
Alexandre Duc
,
Florian Tramèr
bib info -
On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
, 203-228,
Alexander May
,
Ilya Ozerov
bib info - Symmetric Cryptanalysis I
-
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE
, 231-253,
Itai Dinur
bib info -
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
, 254-283,
Gregor Leander
,
Brice Minaud
,
Sondre Rønjom
bib info - Symmetric Cryptanalysis II
-
Structural Evaluation by Generalized Integral Property
, 287-314,
Yosuke Todo
bib info -
Cryptanalysis of SP Networks with Partial Non-Linear Layers
, 315-342,
Orr Dunkelman
,
Nathan Keller
,
Boaz Tsaban
,
Itai Dinur
,
Achiya Bar-On
,
Virginie Lallemand
bib info - Hash Functions
-
The Sum Can Be Weaker Than Each Part
, 345-367,
Lei Wang
,
Gaëtan Leurent
bib info -
SPHINCS: Practical Stateless Hash-Based Signatures
, 368-397,
Daniel J. Bernstein
,
Tanja Lange
,
Peter Schwabe
,
Ruben Niederhagen
,
Andreas Hülsing
,
Louiza Papachristodoulou
,
Daira Hopwood
,
Michael Schneider
,
Zooko Wilcox-O'Hearn
bib info - Evaluating Implementations
-
Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device
, 401-429,
François-Xavier Standaert
,
Sebastian Faust
,
Alexandre Duc
bib info -
, 430-454,
Christian Rechberger
,
Thomas Schneider
,
Martin R. Albrecht
,
Michael Zohner
,
Tyge Tiessen
bib info - Masking
-
Verified Proofs of Higher-Order Masking
, 457-485,
Pierre-Alain Fouque
,
Gilles Barthe
,
Sonia Belaïd
,
Pierre-Yves Strub
,
François Dupressoir
,
Benjamin Grégoire
bib info -
Inner Product Masking Revisited
, 486-510,
Benedikt Gierlichs
,
Sebastian Faust
,
Josep Balasch
bib info - Fully Homomorphic Encryption I
-
Fully Homomophic Encryption over the Integers Revisited
, 513-536,
Jung Hee Cheon
,
Damien Stehlé
bib info -
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces
, 537-555,
Kaoru Kurosawa
,
Koji Nuida
bib info - Related-Key Attacks
-
KDM-CCA Security from RKA Secure Authenticated Encryption
, 559-583,
Bao Li
,
Xianhui Lu
,
Dingding Jia
bib info -
On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks
, 584-613,
Yannick Seurin
,
Benoit Cogliati
bib info - Fully Homomorphic Encryption II
-
FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second
, 617-640,
Daniele Micciancio
,
Léo Ducas
bib info -
Bootstrapping for HElib
, 641-670,
Shai Halevi
,
Victor Shoup
bib info - Efficient Two-Party Protocols
-
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
, 673-701,
Yehuda Lindell
,
Thomas Schneider
,
Gilad Asharov
,
Michael Zohner
bib info -
How to Efficiently Evaluate RAM Programs with Malicious Security
, 702-729,
Payman Mohassel
,
Mike Rosulek
,
Arash Afshar
,
Zhangxiang Hu
bib info - Symmetric Cryptanalysis III
-
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
, 733-761,
Josef Pieprzyk
,
Itai Dinur
,
Pawel Morawiecki
,
Marian Srebrny
,
Michal Straus
bib info -
Twisted Polynomials and Forgery Attacks on GCM
, 762-786,
Andrey Bogdanov
,
Elmar Tischhauser
,
Mohamed Ahmed Abdelraheem
,
Peter Beelen
bib info - Lattices
-
Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices
, 789-815,
Vadim Lyubashevsky
,
Thomas Prest
bib info - Signatures
-
, 3-34,
Susan Hohenberger
,
Brent Waters
,
Venkata Koppula
bib info -
Fully Structure-Preserving Signatures and Shrinking Commitments
, 35-65,
Masayuki Abe
,
Miyako Ohkubo
,
Markulf Kohlweiss
,
Mehdi Tibouchi
bib info - Zero-Knowledge Proofs
-
Disjunctions for Hash Proof Systems: New Constructions and Applications
, 69-100,
Michel Abdalla
,
David Pointcheval
,
Fabrice Benhamouda
bib info -
Quasi-Adaptive NIZK for Linear Subspaces Revisited
, 101-128,
Eike Kiltz
,
Hoeteck Wee
bib info - Leakage-Resilient Cryptography
-
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware
, 131-158,
Hong-Sheng Zhou
,
Dana Dachman-Soled
,
Feng-Hao Liu
bib info -
Noisy Leakage Revisited
, 159-188,
Stefan Dziembowski
,
Sebastian Faust
,
Maciej Skorski
bib info - Garbled Circuits
-
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge
, 191-219,
Jesper Buus Nielsen
,
Claudio Orlandi
,
Tore Kasper Frederiksen
bib info -
Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates
, 220-250,
Mike Rosulek
,
David Evans
,
Samee Zahur
bib info - Crypto Currencies
-
One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
, 253-280,
Jens Groth
,
Markulf Kohlweiss
bib info -
The Bitcoin Backbone Protocol: Analysis and Applications
, 281-310,
Aggelos Kiayias
,
Juan A. Garay
,
Nikos Leonardos
bib info - Secret Sharing
-
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
, 313-336,
Ronald Cramer
,
Serge Fehr
,
Ivan DamgÃÂ¥rd
,
Nico Döttling
,
Gabriele Spini
bib info -
Function Secret Sharing
, 337-367,
Yuval Ishai
,
Niv Gilboa
,
Elette Boyle
bib info - Outsourcing Computations
-
Cluster Computing in Zero Knowledge
, 371-403,
Eran Tromer
,
Alessandro Chiesa
,
Madars Virza
bib info -
Hosting Services on an Untrusted Cloud
, 404-436,
Dan Boneh
,
Amit Sahai
,
Ilya Mironov
,
Divya Gupta
bib info - Obfuscation and E-Voting
-
How to Obfuscate Programs Directly
, 439-467,
Joe Zimmerman
bib info -
End-to-End Verifiable Elections in the Standard Model
, 468-498,
Aggelos Kiayias
,
Bingsheng Zhang
,
Thomas Zacharias
bib info - Multi-Party Computations
-
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
, 501-531,
Manoj Prabhakaran
,
Shweta Agrawal
,
Shashank Agrawal
bib info -
Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World
, 532-560,
Ivan Visconti
,
Rafail Ostrovsky
,
Melissa Chase
bib info - Encryption
-
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
, 563-594,
Dan Boneh
,
Amit Sahai
,
Mark Zhandry
,
Mariana Raykova
,
Kevin Lewi
,
Joe Zimmerman
bib info -
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
, 595-624,
Hoeteck Wee
,
Jie Chen
,
Romain Gay
bib info - Resistant Protocols
-
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
, 627-656,
Mihir Bellare
,
Viet Tung Hoang
bib info -
Cryptographic Reverse Firewalls
, 657-686,
Ilya Mironov
,
Noah Stephens-Davidowitz
bib info - Key Exchange
-
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols
, 689-718,
Yassine Lakhnech
,
Gilles Barthe
,
Benedikt Schmidt
,
Juan Manuel Crespo
bib info -
Authenticated Key Exchange from Ideal Lattices
, 719-751,
Jiang Zhang
,
Jintai Ding
,
Zhenfeng Zhang
,
Michael Snook
,
Özgür Dagdelen
bib info - Quantum Cryptography
-
Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
, 755-784,
Dominique Unruh
bib info -
Privacy Amplification in the Isolated Qubits Model
, 785-814,
Yi-Kai Liu
bib info - Discrete Logarithms