year |
venue |
title |
pages |
2012 | asiacrypt | Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings | online |
2012 | asiacrypt | Optimal Collision Security in Double Block Length Hashing with Single Length Key | online |
2012 | asiacrypt | A Coding-Theoretic Approach to Recovering Noisy RSA Keys | online |
2012 | asiacrypt | Theory and Practice of a Leakage Resilient Masking Scheme | online |
2012 | asiacrypt | Completeness for Symmetric Two-Party Functionalities - Revisited | online |
2012 | asiacrypt | 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound | online |
2012 | asiacrypt | Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing | online |
2012 | asiacrypt | Perfect Algebraic Immune Functions | online |
2012 | asiacrypt | Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions | online |
2012 | asiacrypt | Analysis of Differential Attacks in ARX Constructions | online |
2012 | asiacrypt | The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions | online |
2012 | asiacrypt | Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks | online |
2012 | asiacrypt | Dual Form Signatures: An Approach for Proving Security from Static Assumptions | online |
2012 | asiacrypt | On the (Im)possibility of Projecting Property in Prime-Order Setting | online |
2012 | asiacrypt | Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract) | online |
2012 | asiacrypt | RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures | online |
2012 | asiacrypt | Differential Attacks against Stream Cipher ZUC | online |
2012 | asiacrypt | ECM at Work | online |
2012 | asiacrypt | Certifying RSA | online |
2012 | asiacrypt | A Mix-Net from Any CCA2 Secure Cryptosystem | online |
2012 | asiacrypt | Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise | online |
2012 | asiacrypt | Signature Schemes Secure against Hard-to-Invert Leakage | online |
2012 | asiacrypt | How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios | online |
2012 | asiacrypt | On Polynomial Systems Arising from a Weil Descent | online |
2012 | asiacrypt | Integral and Multidimensional Linear Distinguishers with Correlation Zero | online |
2012 | asiacrypt | Differential Analysis of the LED Block Cipher | online |
2012 | asiacrypt | The Five-Card Trick Can Be Done with Four Cards | online |
2012 | asiacrypt | Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings | online |
2012 | asiacrypt | A Unified Framework for UC from Only OT | online |
2012 | asiacrypt | PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract | online |
2012 | asiacrypt | Fully Secure Unbounded Inner-Product and Attribute-Based Encryption | online |
2012 | asiacrypt | Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note | online |
2012 | asiacrypt | Understanding Adaptivity: Random Systems Revisited | 313-330 |
2012 | asiacrypt | Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication | online |
2012 | asiacrypt | Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397) | online |
2012 | asiacrypt | Some Mathematical Mysteries in Lattices | online |
2012 | asiacrypt | Pairing-Based Cryptography: Past, Present, and Future | online |
2012 | asiacrypt | Optimal Reductions of Some Decisional Problems to the Rank Problem | online |
2012 | asiacrypt | Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic | online |
2012 | asiacrypt | Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures | online |
2012 | asiacrypt | Generic Related-Key Attacks for HMAC | online |
2012 | asiacrypt | Calling Out Cheaters: Covert Security with Public Verifiability | online |
2012 | asiacrypt | Computing on Authenticated Data: New Privacy Definitions and Constructions | online |
2012 | asiacrypt | IND-CCA Secure Cryptography Based on a Variant of the LPN Problem | online |
2012 | asiacrypt | Provable Security of the Knudsen-Preneel Compression Functions | online |
2012 | asiacrypt | An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher | online |
2012 | ches | Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings | |
2012 | ches | Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware | online |
2012 | ches | Practical Security Analysis of PUF-Based Two-Player Protocols | online |
2012 | ches | A Statistical Model for DPA with Novel Algorithmic Confusion Analysis | online |
2012 | ches | Selecting Time Samples for Multivariate DPA Attacks | online |
2012 | ches | Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us | online |
2012 | ches | Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint | online |
2012 | ches | An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor | online |
2012 | ches | On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes | online |
2012 | ches | Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking | online |
2012 | ches | Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs | online |
2012 | ches | Solving Quadratic Equations with XL on Parallel Architectures | online |
2012 | ches | Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents | online |
2012 | ches | NEON Crypto | online |
2012 | ches | Efficient Implementations of MQPKS on Constrained Devices | online |
2012 | ches | Practical Leakage-Resilient Symmetric Cryptography | online |
2012 | ches | Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes | online |
2012 | ches | Banking security: attacks and defences | |
2012 | ches | Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems | online |
2012 | ches | (In)security of commonly found smart cards | |
2012 | ches | Low-Latency Encryption - Is "Lightweight = Light + Wait"? | online |
2012 | ches | Breakthrough Silicon Scanning Discovers Backdoor in Military Chip | online |
2012 | ches | Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication | online |
2012 | ches | 3D Hardware Canaries | online |
2012 | ches | How Far Should Theory Be from Practice? - Evaluation of a Countermeasure | online |
2012 | ches | Compiler Assisted Masking | online |
2012 | ches | Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment | online |
2012 | ches | Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA | online |
2012 | ches | Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting | online |
2012 | ches | PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator | online |
2012 | ches | A Differential Fault Attack on the Grain Family of Stream Ciphers | online |
2012 | ches | Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs | online |
2012 | ches | PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon | online |
2012 | ches | Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation | online |
2012 | ches | Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model | online |
2012 | crypto | Homomorphic Evaluation of the AES Circuit | online |
2012 | crypto | Differential Privacy with Imperfect Randomness | online |
2012 | crypto | Securing Circuits against Constant-Rate Tampering | online |
2012 | crypto | New Preimage Attacks against Reduced SHA-1 | online |
2012 | crypto | Must You Know the Code of f to Securely Compute f? | online |
2012 | crypto | On the Distribution of Linear Biases: Three Instructive Examples | online |
2012 | crypto | Tweakable Blockciphers with Beyond Birthday-Bound Security | online |
2012 | crypto | Secret Sharing Schemes for Very Dense Graphs | online |
2012 | crypto | Black-Box Constructions of Composable Protocols without Set-Up | online |
2012 | crypto | The End of Crypto | online |
2012 | crypto | Group Signatures with Almost-for-Free Revocation | online |
2012 | crypto | Crowd-Blending Privacy | online |
2012 | crypto | How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware | online |
2012 | crypto | Tamper and Leakage Resilience in the Split-State Model | online |
2012 | crypto | Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority | online |
2012 | crypto | Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | online |
2012 | crypto | New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation | online |
2012 | crypto | Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings | online |
2012 | crypto | Public Keys | online |
2012 | crypto | Hash Functions Based on Three Permutations: A Generic Security Analysis | online |
2012 | crypto | Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs | online |
2012 | crypto | Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption | online |
2012 | crypto | A New Approach to Practical Active-Secure Two-Party Computation | online |
2012 | crypto | Semantic Security for the Wiretap Channel | online |
2012 | crypto | On the Security of TLS-DHE in the Standard Model | online |
2012 | crypto | Universal Composability from Essentially Any Trusted Setup | online |
2012 | crypto | Quantum to Classical Randomness Extractors | online |
2012 | crypto | Breaking and Repairing GCM Security Proofs | online |
2012 | crypto | To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC | online |
2012 | crypto | Secure Identity-Based Encryption in the Quantum Random Oracle Model | online |
2012 | crypto | Functional Encryption for Regular Languages | online |
2012 | crypto | An Enciphering Scheme Based on a Card Shuffle | online |
2012 | crypto | Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits | online |
2012 | crypto | Actively Secure Two-Party Evaluation of Any Quantum Operation | online |
2012 | crypto | Functional Encryption with Bounded Collusions via Multi-party Computation | online |
2012 | crypto | Secure Database Commitments and Universal Arguments of Quasi Knowledge | online |
2012 | crypto | Resistance against Iterated Attacks by Decorrelation Revisited, | online |
2012 | crypto | Adaptively Secure Multi-Party Computation with Dishonest Majority | online |
2012 | crypto | On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups | online |
2012 | crypto | Impossibility Results for Static Input Secure Computation | online |
2012 | crypto | Collusion-Preserving Computation | online |
2012 | crypto | Multiparty Computation from Somewhat Homomorphic Encryption | online |
2012 | crypto | Efficient Padding Oracle Attacks on Cryptographic Hardware | online |
2012 | crypto | Tightly Secure Signatures and Public-Key Encryption | online |
2012 | crypto | The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives | online |
2012 | crypto | Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves | online |
2012 | crypto | Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP | online |
2012 | crypto | Multi-instance Security and Its Application to Password-Based Cryptography | online |
2012 | crypto | Stam's Conjecture and Threshold Phenomena in Collision Resistance | online |
2012 | crypto | New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques | online |
2012 | crypto | Recent Advances and Existing Research Questions in Platform Security | online |
2012 | eurocrypt | Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over $F_(p^6)$ | online |
2012 | eurocrypt | Malleable Proof Systems and Applications | online |
2012 | eurocrypt | Robust Coin Flipping | online |
2012 | eurocrypt | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation | online |
2012 | eurocrypt | Identity-Based (Lossy) Trapdoor Functions and Applications | 228-245 |
2012 | eurocrypt | Message Authentication, Revisited | online |
2012 | eurocrypt | All-But-Many Lossy Trapdoor Functions | online |
2012 | eurocrypt | Identity-Based Encryption Resilient to Continual Auxiliary Leakage | online |
2012 | eurocrypt | Concurrently Secure Computation in Constant Rounds | online |
2012 | eurocrypt | Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More | online |
2012 | eurocrypt | Quantum Proofs of Knowledge | online |
2012 | eurocrypt | Standard Security Does Not Imply Security against Selective-Opening | online |
2012 | eurocrypt | Pseudorandom Functions and Lattices | online |
2012 | eurocrypt | Efficient Zero-Knowledge Argument for Correctness of a Shuffle | online |
2012 | eurocrypt | Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers | online |
2012 | eurocrypt | Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers | online |
2012 | eurocrypt | Lattice Signatures without Trapdoors | online |
2012 | eurocrypt | Statistical Tools Flavor Side-Channel Collision Attacks | online |
2012 | eurocrypt | On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model | online |
2012 | eurocrypt | Incremental Deterministic Public-Key Encryption | online |
2012 | eurocrypt | Another Look at Provable Security | online |
2012 | eurocrypt | Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks | online |
2012 | eurocrypt | Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security | online |
2012 | eurocrypt | Group to Group Commitments Do Not Shrink | online |
2012 | eurocrypt | Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE | online |
2012 | eurocrypt | Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract) | online |
2012 | eurocrypt | Fair Computation with Rational Players | online |
2012 | eurocrypt | Narrow-Bicliques: Cryptanalysis of Full IDEA | online |
2012 | eurocrypt | Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting | online |
2012 | eurocrypt | Minimalism in Cryptography: The Even-Mansour Scheme Revisited | online |
2012 | eurocrypt | Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields | online |
2012 | eurocrypt | Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding | online |
2012 | eurocrypt | Fully Homomorphic Encryption with Polylog Overhead | online |
2012 | eurocrypt | Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption | online |
2012 | eurocrypt | Tightly-Secure Signatures from Lossy Identification Schemes | online |
2012 | eurocrypt | Optimal Security Proofs for Full Domain Hash, Revisited | online |
2012 | eurocrypt | A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract) | online |
2012 | eurocrypt | Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller | online |
2012 | eurocrypt | Scalable Group Signatures with Revocation | online |
2012 | eurocrypt | Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading | online |
2012 | eurocrypt | Property Preserving Symmetric Encryption | online |
2012 | eurocrypt | Unconditionally-Secure Robust Secret Sharing with Compact Shares | online |
2012 | eurocrypt | On Round-Optimal Zero Knowledge in the Bare Public-Key Model | online |
2012 | eurocrypt | Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings | online |
2012 | fse | The history of linear cryptanalysis | |
2012 | fse | Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers | online |
2012 | fse | ElimLin Algorithm Revisited | online |
2012 | fse | McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes | online |
2012 | fse | "Provable" Security against Differential and Linear Cryptanalysis | online |
2012 | fse | Improved Attacks on Full GOST | online |
2012 | fse | Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 | online |
2012 | fse | Higher-Order Masking Schemes for S-Boxes | online |
2012 | fse | New Attacks on Keccak-224 and Keccak-256 | online |
2012 | fse | Zero Correlation Linear Cryptanalysis with Reduced Data Complexity | online |
2012 | fse | On the (In)Security of IDEA in Various Hashing Modes | 163-179 |
2012 | fse | New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia | online |
2012 | fse | Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes | online |
2012 | fse | A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract) | online |
2012 | fse | Lapin: An Efficient Authentication Protocol Based on Ring-LPN | online |
2012 | fse | Differential Propagation Analysis of Keccak | online |
2012 | fse | Recursive Diffusion Layers for Block Ciphers and Hash Functions | online |
2012 | fse | Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family | online |
2012 | fse | The Security of Ciphertext Stealing | 180-195 |
2012 | fse | Improved Rebound Attack on the Finalist Grøstl | online |
2012 | fse | UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX | online |
2012 | fse | (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others | online |
2012 | fse | Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128 | online |
2012 | fse | Practical Cryptanalysis of ARMADILLO2 | online |
2012 | fse | Unaligned Rebound Attack: Application to Keccak | online |
2012 | fse | A Model for Structure Attacks, with Applications to PRESENT and Serpent | online |
2012 | fse | Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication | online |
2012 | jofc | On-line Ciphers and the Hash-CBC Constructions | 640-679 |
2012 | jofc | Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer | 680-722 |
2012 | jofc | Graph Coloring Applied to Secure Computation in Non-Abelian Groups | 557-600 |
2012 | jofc | Batch Verification of Short Signatures | 723-747 |
2012 | jofc | Bonsai Trees, or How to Delegate a Lattice Basis | 601-639 |
2012 | jofc | Security Analysis of Randomize-Hash-then-Sign Digital Signatures | 748-779 |
2012 | jofc | Perfectly Balanced Boolean Functions and Golić Conjecture | 464-483 |
2012 | jofc | Efficient Set Operations in the Presence of Malicious Adversaries | 383-433 |
2012 | jofc | Ideal Multipartite Secret Sharing Schemes | 434-463 |
2012 | jofc | Programmable Hash Functions and Their Applications | 484-527 |
2012 | pkc | Public-Key Identification Schemes Based on Multivariate Cubic Polynomials | online |
2012 | pkc | The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles | online |
2012 | pkc | On Definitions of Selective Opening Security | online |
2012 | pkc | Generating Provable Primes Efficiently on Embedded Devices | online |
2012 | pkc | Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices | online |
2012 | pkc | Multi-location Leakage Resilient Cryptography | online |
2012 | pkc | Strong Security from Probabilistic Signature Schemes | online |
2012 | pkc | Polly Cracker, Revisited, Revisited | online |
2012 | pkc | Constant-Round Multi-party Private Set Union Using Reversed Laurent Series | online |
2012 | pkc | New Definitions and Separations for Circular Security | online |
2012 | pkc | From Selective to Full Security: Semi-generic Transformations in the Standard Model | online |
2012 | pkc | Space Efficient Signature Schemes from the RSA Assumption | online |
2012 | pkc | Public Key Encryption against Related Key Attacks | online |
2012 | pkc | DDH-Like Assumptions Based on Extension Rings | online |
2012 | pkc | NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model | online |
2012 | pkc | Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods | online |
2012 | pkc | Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices | online |
2012 | pkc | Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies | online |
2012 | pkc | Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts | online |
2012 | pkc | Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication | online |
2012 | pkc | Correlated Product Security from Any One-Way Function | online |
2012 | pkc | Password-Based Authenticated Key Exchange | online |
2012 | pkc | Waters Signatures with Optimal Security Reduction | online |
2012 | pkc | Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract) | online |
2012 | pkc | Ring-LWE in Polynomial Rings | online |
2012 | pkc | Extended-DDH and Lossy Trapdoor Functions | online |
2012 | pkc | On the Security of Dynamic Group Signatures: Preventing Signature Hijacking | online |
2012 | pkc | Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited | online |
2012 | pkc | Better Bootstrapping in Fully Homomorphic Encryption | online |
2012 | pkc | Security of Blind Signatures Revisited | online |
2012 | pkc | Efficient Password Authenticated Key Exchange via Oblivious Transfer | online |
2012 | pkc | Public-Key Cryptography from New Multivariate Quadratic Assumptions | online |
2012 | pkc | On Homomorphic Encryption and Chosen-Ciphertext Security | online |
2012 | pkc | Efficiently Shuffling in Public | online |
2012 | pkc | Improved Security for Linearly Homomorphic Signatures: A Generic Framework | online |
2012 | pkc | Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve | online |
2012 | pkc | Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms | online |
2012 | pkc | Circular and KDM Security for Identity-Based Encryption | online |
2012 | pkc | Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes | online |
2012 | pkc | Efficient Network Coding Signatures in the Standard Model | online |
2012 | pkc | Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model | online |
2012 | pkc | Relatively-Sound NIZKs and Password-Based Key-Exchange | online |
2012 | pkc | Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings | |
2012 | tcc | Non-Interactive Zero-Knowledge | |
2012 | tcc | Locally Decodable Codes | |
2012 | tcc | On the Security of the "Free-XOR" Technique | online |
2012 | tcc | On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction | online |
2012 | tcc | Computational Extractors and Pseudorandomness | online |
2012 | tcc | How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption | online |
2012 | tcc | Point Obfuscation and 3-Round Zero-Knowledge | online |
2012 | tcc | Leakage-Resilient Circuits without Computational Assumptions | online |
2012 | tcc | Identifying Cheaters without an Honest Majority | online |
2012 | tcc | From Non-adaptive to Adaptive Pseudorandom Functions | online |
2012 | tcc | On Efficient Zero-Knowledge PCPs | online |
2012 | tcc | Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures | online |
2012 | tcc | On the Instantiability of Hash-and-Sign RSA Signatures | online |
2012 | tcc | Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments | online |
2012 | tcc | Confidentiality and Integrity: A Constructive Perspective | online |
2012 | tcc | Computing on Authenticated Data | online |
2012 | tcc | On Black-Box Reductions between Predicate Encryption Schemes | online |
2012 | tcc | Lossy Functions Do Not Amplify Well | online |
2012 | tcc | Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations | online |
2012 | tcc | A Parallel Repetition Theorem for Leakage Resilience | online |
2012 | tcc | Secure Two-Party Computation with Low Communication | online |
2012 | tcc | Resettable Statistical Zero Knowledge | online |
2012 | tcc | Simultaneously Resettable Arguments of Knowledge | online |
2012 | tcc | The Knowledge Tightness of Parallel Zero-Knowledge | online |
2012 | tcc | Bounded-Collusion IBE from Key Homomorphism | online |
2012 | tcc | Leakage-Tolerant Interactive Protocols | online |
2012 | tcc | Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources | 618-635 |
2012 | tcc | Functional Re-encryption and Collusion-Resistant Obfuscation | online |
2012 | tcc | Iterative Constructions and Private Data Release | online |
2012 | tcc | Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry | online |
2012 | tcc | Hardness Preserving Constructions of Pseudorandom Functions | online |
2012 | tcc | A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy | online |
2012 | tcc | A Dichotomy for Local Small-Bias Generators | online |
2012 | tcc | Subspace LWE | online |
2012 | tcc | Lower Bounds in Differential Privacy | online |
2012 | tcc | Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions | online |
2012 | tcc | Counterexamples to Hardness Amplification beyond Negligible | online |
2012 | tcc | Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions | online |
2012 | tcc | Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings | online |