EUROCRYPT 2016:
Marc Fischlin and Jean-Sébastien Coron (Eds.):
Advances in Cryptology - EUROCRYPT 2016 -
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques
Vienna, Austria,
May 8-12, 2016,
Proceedings
EUROCRYPT 2016 Vol 1
EUROCRYPT 2016 Vol 2
Organizational Committee
Program Chairs : | Marc Fischlin and Jean-Sébastien Coron | |
General Chair : | Krzysztof Pietrzak |
Program Committee
Michel Abdalla |
Shweta Agrawal |
Elette Boyle |
Christina Brzuska |
Ran Canetti |
David Cash |
Dario Catalano |
Cas J.F. Cremers |
Nico Döttling |
Yevgeniy Dodis |
Pooya Farshim |
Jean-Charles Faugère |
Sebastian Faust |
Dario Fiore |
Georg Fuchsbauer |
Juan A. Garay |
Tim Güneysu |
Vipul Goyal |
Shai Halevi |
Goichiro Hanaoka |
Martin Hirt |
Dennis Hofheinz |
Tibor Jager |
Abhishek Jain |
Aniket Kate |
Dmitry Khovratovich |
Vadim Lyubashevsky |
Sarah Meiklejohn |
Mridul Nandi |
María Naya-Plasencia |
Svetla Nikova |
Adam O |
Claudio Orlandi |
Josef Pieprzyk |
Mariana Raykova |
Thomas Ristenpart |
Matthieu Rivain |
Arnab Roy |
Benedikt Schmidt |
Thomas Schneider |
Berry Schoenmakers |
Peter Schwabe |
Yannick Seurin |
Thomas Shrimpton |
Nigel P. Smart |
John P. Steinberger |
Ron Steinfeld |
Emmanuel Thomé |
Yosuke Todo |
Dominique Unruh |
Daniele Venturi |
Ivan Visconti |
Stefan Wolf |
External Referees
-
Invited Talks and Tutorial
- Protecting Transport Layer Security from Legacy Vulnerabilities , Karthikeyan Bhargavan
- The Future of Cryptography , Bart Preneel
- Engineering Code Obfuscation , Christian Collberg
- Securing Cryptography Implementations in Embedded Systems , Emmanuel Prouff
-
Best Paper and Honorable Mentions
-
Tightly CCA-Secure Encryption Without Pairings
, 1-27,
Eike Kiltz
,
Dennis Hofheinz
,
Hoeteck Wee
,
Romain Gay
bib info , video -
Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes
, 28-57,
Huijia Lin
bib info , video -
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
, 58-86,
Daniel Wichs
,
Valerio Pastro
,
Allison Bishop
,
Rajmohan Rajaraman
bib info , video
-
Tightly CCA-Secure Encryption Without Pairings
, 1-27,
Eike Kiltz
,
Dennis Hofheinz
,
Hoeteck Wee
,
Romain Gay
- (Pseudo)Randomness
- LPN/LWE
- Cryptanalysis I
-
Masking
-
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
, 240-262,
François-Xavier Standaert
,
François Durvaux
bib info , video -
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
, 263-293,
Robert Granger
,
Bart Mennink
,
Philipp Jovanovic
,
Samuel Neves
bib info , video
-
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
, 240-262,
François-Xavier Standaert
,
François Durvaux
- Fully Homomorphic Encryption
- Cryptanalysis II
- Number Theory
- Hash Functions
- Multilinear Maps
- Message Authentication Codes
- Attacks on SSL/TLS
- Real-world Protocols
- Robust Designs
- Lattice Reduction
-
Lattice-based Schemes
-
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors
, 1-31,
Benoît Libert
,
Huaxiong Wang
,
San Ling
,
Khoa Nguyen
bib info , video -
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
, 32-62,
Shota Yamada
bib info , video
-
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors
, 1-31,
Benoît Libert
,
Huaxiong Wang
,
San Ling
,
Khoa Nguyen
- Zero-Knowledge I
- Pseudorandom Functions
- Multi-Party Computation I
- Separations
- Zero-Knowledge II
-
Protocols
-
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
, 358-387,
Joël Alwen
,
Krzysztof Pietrzak
,
Stefano Tessaro
,
Binyi Chen
,
Vladimir Kolmogorov
,
Chethan Kamath
bib info , video -
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
, 388-419,
Daniel Wichs
,
Ryo Nishimaki
,
Mark Zhandry
bib info , video
-
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
, 358-387,
Joël Alwen
,
Krzysztof Pietrzak
,
Stefano Tessaro
,
Binyi Chen
,
Vladimir Kolmogorov
,
Chethan Kamath
-
Round Complexity
-
Unconditionally Secure Computation with Reduced Interaction
, 420-447,
Ivan Damgård
,
Rafail Ostrovsky
,
Jesper Buus Nielsen
,
Adi Rosén
bib info , video -
The Exact Round Complexity of Secure Computation
, 448-476,
Omkant Pandey
,
Sanjam Garg
,
Antigoni Polychroniadou
,
Pratyay Mukherjee
bib info , video
-
Unconditionally Secure Computation with Reduced Interaction
, 420-447,
Ivan Damgård
,
Rafail Ostrovsky
,
Jesper Buus Nielsen
,
Adi Rosén
- Commitments
-
Lattices
-
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
, 528-558,
Phong Q. Nguyen
,
Nicolas Gama
,
Xiang Xie
,
Malika Izabachène
bib info , video -
Recovering Short Generators of Principal Ideals in Cyclotomic Rings
, 559-585,
Ronald Cramer
,
Chris Peikert
,
Oded Regev
,
Léo Ducas
bib info , video
-
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems
, 528-558,
Phong Q. Nguyen
,
Nicolas Gama
,
Xiang Xie
,
Malika Izabachène
-
Leakage
-
Circuit Compilers with O(1/(log (n)) Leakage Rate
, 586-615,
Stefan Dziembowski
,
Sebastian Faust
,
Marcin Andrychowicz
bib info , video -
Randomness Complexity of Private Circuits for Multiplication
, 616-648,
Damien Vergnaud
,
Emmanuel Prouff
,
Adrian Thillard
,
Fabrice Benhamouda
,
Sonia Belaïd
,
Alain Passelègue
bib info , video
-
Circuit Compilers with O(1/(log (n)) Leakage Rate
, 586-615,
Stefan Dziembowski
,
Sebastian Faust
,
Marcin Andrychowicz
- Indifferentiability
-
Multi-Party Computation II
-
Fair and Robust Multi-party Computation Using a Global Transaction Ledger
, 705-734,
Aggelos Kiayias
,
Hong-Sheng Zhou
,
Vassilis Zikas
bib info , video -
Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits
, 881-908,
Tal Malkin
,
Dana Dachman-Soled
,
Marshall Ball
,
Mukul Kulkarni
bib info
-
Fair and Robust Multi-party Computation Using a Global Transaction Ledger
, 705-734,
Aggelos Kiayias
,
Hong-Sheng Zhou
,
Vassilis Zikas
- Obfuscation
-
Automated Analysis, Functional Encryption, and Non-malleable Codes
-
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model
, 822-851,
Gilles Barthe
,
Benedikt Schmidt
,
Miguel Ambrona
bib info , video -
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
, 852-880,
Gil Segev
,
Zvika Brakerski
,
Ilan Komargodski
bib info , video -
Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits
, 881-908,
Tal Malkin
,
Dana Dachman-Soled
,
Marshall Ball
,
Mukul Kulkarni
bib info
-
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model
, 822-851,
Gilles Barthe
,
Benedikt Schmidt
,
Miguel Ambrona
Author Index