What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from EUROCRYPT 2013
Year
Venue
Title
2013
EUROCRYPT
A Toolkit for Ring-LWE Cryptography
Vadim Lyubashevsky
Chris Peikert
Oded Regev
2013
EUROCRYPT
Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
2013
EUROCRYPT
Amplification of Chosen-Ciphertext Security
Huijia Lin
Stefano Tessaro
2013
EUROCRYPT
Batch Fully Homomorphic Encryption over the Integers
Jung Hee Cheon
Jean-Sébastien Coron
Jinsu Kim
Moon Sung Lee
Tancrède Lepoint
Mehdi Tibouchi
Aaram Yun
2013
EUROCRYPT
Candidate Multilinear Maps from Ideal Lattices
★
Best Paper
Sanjam Garg
Craig Gentry
Shai Halevi
2013
EUROCRYPT
Circular Chosen-Ciphertext Security with Compact Ciphertexts
Dennis Hofheinz
2013
EUROCRYPT
Cryptanalysis of Full RIPEMD-128
Franck Landelle
Thomas Peyrin
2013
EUROCRYPT
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
Ananth Raghunathan
Gil Segev
Salil P. Vadhan
2013
EUROCRYPT
Dynamic Proofs of Retrievability via Oblivious RAM
David Cash
Alptekin Küpçü
Daniel Wichs
2013
EUROCRYPT
Efficient Cryptosystems from 2<sup> <i>k</i> </sup>-th Power Residue Symbols
Marc Joye
Benoît Libert
2013
EUROCRYPT
Fast Cryptography in Genus 2
Joppe W. Bos
Craig Costello
Hüseyin Hisil
Kristin E. Lauter
2013
EUROCRYPT
Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields
Antoine Joux
2013
EUROCRYPT
Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem
Charles Bouillaguet
Pierre-Alain Fouque
Amandine Véber
2013
EUROCRYPT
How to Garble RAM Programs
Steve Lu
Rafail Ostrovsky
2013
EUROCRYPT
How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation
Payman Mohassel
Seyed Saeed Sadeghian
2013
EUROCRYPT
How to Watermark Cryptographic Functions
Ryo Nishimaki
2013
EUROCRYPT
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher
Pooya Farshim
Marc Fischlin
Martijn Stam
2013
EUROCRYPT
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Patrick Derbez
Pierre-Alain Fouque
Jérémy Jean
2013
EUROCRYPT
Improving Local Collisions: New Attacks on Reduced SHA-256
Florian Mendel
Tomislav Nad
Martin Schläffer
2013
EUROCRYPT
Keccak
★
Invited paper
Guido Bertoni
Joan Daemen
Michael Peeters
Gilles Van Assche
2013
EUROCRYPT
Leakage-Resilient Cryptography from Minimal Assumptions
Carmit Hazay
Adriana López-Alt
Hoeteck Wee
Daniel Wichs
2013
EUROCRYPT
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures
Marc Fischlin
Nils Fleischhacker
2013
EUROCRYPT
Locally Computable UOWHF with Linear Shrinkage
Benny Applebaum
Yoni Moses
2013
EUROCRYPT
Lossy Codes and a New Variant of the Learning-With-Errors Problem
Nico Döttling
Jörn Müller-Quade
2013
EUROCRYPT
Masking against Side-Channel Attacks: A Formal Security Proof
Emmanuel Prouff
Matthieu Rivain
2013
EUROCRYPT
Message-Locked Encryption and Secure Deduplication
Mihir Bellare
Sriram Keelveedhi
Thomas Ristenpart
2013
EUROCRYPT
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions
Tore Kasper Frederiksen
Thomas Pelle Jakobsen
Jesper Buus Nielsen
Peter Sebastian Nordholt
Claudio Orlandi
2013
EUROCRYPT
Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction
S. Dov Gordon
Tal Malkin
Mike Rosulek
Hoeteck Wee
2013
EUROCRYPT
New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis
Marc Stevens
2013
EUROCRYPT
New Links between Differential and Linear Cryptanalysis
Céline Blondeau
Kaisa Nyberg
2013
EUROCRYPT
On Concurrently Secure Computation in the Multiple Ideal Query Model
Vipul Goyal
Abhishek Jain
2013
EUROCRYPT
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games
Marco Tomamichel
Serge Fehr
Jedrzej Kaniewski
Stephanie Wehner
2013
EUROCRYPT
Practical Homomorphic MACs for Arithmetic Circuits
Dario Catalano
Dario Fiore
2013
EUROCRYPT
Practical Signatures from Standard Assumptions
Florian Böhl
Dennis Hofheinz
Tibor Jager
Jessica Koch
Jae Hong Seo
Christoph Striecks
2013
EUROCRYPT
Quadratic Span Programs and Succinct NIZKs without PCPs
Rosario Gennaro
Craig Gentry
Bryan Parno
Mariana Raykova
2013
EUROCRYPT
Quantum-Secure Message Authentication Codes
Dan Boneh
Mark Zhandry
2013
EUROCRYPT
Regularity of Lossy RSA on Subdomains and Its Applications
Mark Lewko
Adam O'Neill
Adam Smith
2013
EUROCRYPT
Resource-Restricted Indifferentiability
Gregory Demay
Peter Gazi
Martin Hirt
Ueli Maurer
2013
EUROCRYPT
Security Evaluations beyond Computing Power
Nicolas Veyrat-Charvillon
Benoît Gérard
François-Xavier Standaert
2013
EUROCRYPT
Streaming Authenticated Data Structures
Charalampos Papamanthou
Elaine Shi
Roberto Tamassia
Ke Yi
2013
EUROCRYPT
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
Jooyoung Lee
2013
EUROCRYPT
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Rafail Ostrovsky
Alessandra Scafuro
Ivan Visconti
Akshay Wadia
2013
EUROCRYPT
Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists
Stephanie Bayer
Jens Groth