year |
venue |
title |
pages |
2013 | asiacrypt | Engineering Privacy-Friendly Computations | online |
2013 | asiacrypt | Block ciphers - past and present | online |
2013 | asiacrypt | Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter | online |
2013 | asiacrypt | Key Difference Invariant Bias in Block Ciphers | online |
2013 | asiacrypt | Random Projections, Graph Sparsification, and Differential Privacy | online |
2013 | asiacrypt | Reset Indifferentiability and Its Consequences | online |
2013 | asiacrypt | Functional Encryption from (Small) Hardware Tokens | online |
2013 | asiacrypt | Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency | online |
2013 | asiacrypt | Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments | online |
2013 | asiacrypt | Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests | online |
2013 | asiacrypt | Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters | online |
2013 | asiacrypt | Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique - (Extended Abstract) | online |
2013 | asiacrypt | Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier | online |
2013 | asiacrypt | Function-Private Subspace-Membership Encryption and Its Applications | online |
2013 | asiacrypt | Four-Dimensional GLV via the Weil Restriction | online |
2013 | asiacrypt | Generic Key Recovery Attack on Feistel Scheme | online |
2013 | asiacrypt | Computational Fuzzy Extractors | 174-193 |
2013 | asiacrypt | How to Construct an Ideal Cipher from a Small Set of Public Permutations | online |
2013 | asiacrypt | Discrete Gaussian Leftover Hash Lemma over Infinite Domains | online |
2013 | asiacrypt | Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization | online |
2013 | asiacrypt | Constrained Pseudorandom Functions and Their Applications | online |
2013 | asiacrypt | Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited | online |
2013 | asiacrypt | On Diamond Structures and Trojan Message Attacks | online |
2013 | asiacrypt | New Insight into the Isomorphism of Polynomial Problem IP1S and Its Use in Cryptography | online |
2013 | asiacrypt | Unconditionally Secure and Universally Composable Commitments from Physical Assumptions | online |
2013 | asiacrypt | Building Lossy Trapdoor Functions from Lossy Encryption | online |
2013 | asiacrypt | Lattice-Based Group Signatures with Logarithmic Signature Size | online |
2013 | asiacrypt | Cryptanalysis of HMAC/NMAC-Whirlpool | online |
2013 | asiacrypt | Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I | |
2013 | asiacrypt | Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes | online |
2013 | asiacrypt | Parallelizable and Authenticated Online Ciphers | online |
2013 | asiacrypt | A Heuristic for Finding Compatible Differential Paths with Application to HAS-160 | online |
2013 | asiacrypt | Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful | online |
2013 | asiacrypt | A Modular Framework for Building Variable-Input-Length Tweakable Ciphers | online |
2013 | asiacrypt | SCARE of Secret Ciphers with SPN Structures | online |
2013 | asiacrypt | Tamper Resilient Circuits: The Adversary at the Gates | online |
2013 | asiacrypt | Between a Rock and a Hard Place: Interpolating between MPC and FHE | online |
2013 | asiacrypt | Constant-Round Concurrent Zero Knowledge in the Bounded Player Model | online |
2013 | asiacrypt | Fully Homomorphic Message Authenticators | online |
2013 | asiacrypt | New Generic Attacks against Hash-Based MACs | online |
2013 | asiacrypt | Fair and Efficient Secure Multiparty Computation with Reputation Systems | online |
2013 | asiacrypt | Families of Fast Elliptic Curves from ℚ-curves | online |
2013 | asiacrypt | Notions of Black-Box Reductions, Revisited | online |
2013 | asiacrypt | SPHF-Friendly Non-interactive Commitments | online |
2013 | asiacrypt | Efficient General-Adversary Multi-Party Computation | online |
2013 | asiacrypt | Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild | online |
2013 | asiacrypt | Behind the Scene of Side Channel Attacks | online |
2013 | asiacrypt | Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 | online |
2013 | asiacrypt | Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE | online |
2013 | asiacrypt | The Fiat-Shamir Transformation in a Quantum World | online |
2013 | asiacrypt | On Continual Leakage of Discrete Log Representations | online |
2013 | asiacrypt | Improved Cryptanalysis of Reduced RIPEMD-160 | online |
2013 | asiacrypt | Naturally Rehearsing Passwords | online |
2013 | asiacrypt | Hiding the Input-Size in Secure Two-Party Computation | online |
2013 | asiacrypt | Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces | online |
2013 | asiacrypt | Non-uniform Cracks in the Concrete: The Power of Free Precomputation | online |
2013 | asiacrypt | On the Security of One-Witness Blind Signature Schemes | online |
2013 | asiacrypt | Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II | |
2013 | ches | The Future of SHA-3 | |
2013 | ches | Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults | online |
2013 | ches | Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware | online |
2013 | ches | On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs | online |
2013 | ches | A New Model for Error-Tolerant Side-Channel Cube Attacks | online |
2013 | ches | Block Ciphers That Are Easier to Mask: How Far Can We Go? | online |
2013 | ches | Leakage-Resilient Symmetric Encryption via Re-keying | online |
2013 | ches | On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme) | online |
2013 | ches | An Accurate Probabilistic Reliability Model for Silicon PUFs | online |
2013 | ches | Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012 | online |
2013 | ches | A Very High Speed True Random Number Generator with Entropy Assessment | online |
2013 | ches | On the Implementation of Unified Arithmetic on Binary Huff Curves | online |
2013 | ches | Masking vs. Multiparty Computation: How Large Is the Gap for AES? | online |
2013 | ches | McBits: Fast Constant-Time Code-Based Cryptography | online |
2013 | ches | Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack | online |
2013 | ches | Stealthy Dopant-Level Hardware Trojans | online |
2013 | ches | Sleuth: Automated Verification of Software Power Analysis Countermeasures | online |
2013 | ches | Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings | |
2013 | ches | A Differential Fault Attack on MICKEY 2.0 | online |
2013 | ches | Lambda Coordinates for Binary Elliptic Curves | online |
2013 | ches | A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement | online |
2013 | ches | Profiling DPA: Efficacy and Efficiency Trade-Offs | online |
2013 | ches | Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID | online |
2013 | ches | Improving Modular Inversion in RNS Using the Plus-Minus Method | online |
2013 | ches | On Measurable Side-Channel Leaks Inside ASIC Design Primitives | online |
2013 | ches | High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition | online |
2013 | ches | Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA | online |
2013 | ches | Non-invasive Spoofing Attacks for Anti-lock Braking Systems | online |
2013 | ches | Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices | online |
2013 | crypto | Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries | online |
2013 | crypto | Time-Optimal Interactive Proofs for Circuit Evaluation | online |
2013 | crypto | Attribute-Based Encryption for Circuits from Multilinear Maps | online |
2013 | crypto | New Techniques for SPHFs and Efficient One-Round PAKE Protocols | online |
2013 | crypto | On the Function Field Sieve and the Impact of Higher Splitting Probabilities | online |
2013 | crypto | Improved OT Extension for Transferring Short Secrets | online |
2013 | crypto | Crypto Wars Part 2 Have Begun | |
2013 | crypto | On Fair Exchange, Fair Coins and Fair Sampling | online |
2013 | crypto | Why the web still runs on RC4 | |
2013 | crypto | Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose | online |
2013 | crypto | Instantiating Random Oracles via UCEs | online |
2013 | crypto | Limits of Provable Security for Homomorphic Encryption | online |
2013 | crypto | Hardness of SIS and LWE with Small Parameters | online |
2013 | crypto | Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols | online |
2013 | crypto | Fully, (Almost) Tightly Secure IBE and Dual System Groups | online |
2013 | crypto | Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption | online |
2013 | crypto | Non-malleable Codes from Two-Source Extractors | online |
2013 | crypto | Bounds in Shallows and in Miseries | online |
2013 | crypto | Message-Locked Encryption for Lock-Dependent Messages | online |
2013 | crypto | Lattice Signatures and Bimodal Gaussians | online |
2013 | crypto | Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields | online |
2013 | crypto | Secure Computation against Adaptive Auxiliary Information | online |
2013 | crypto | Secret Sharing, Rank Inequalities and Information Inequalities | online |
2013 | crypto | Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 | online |
2013 | crypto | Limits on the Power of Cryptographic Cheap Talk | online |
2013 | crypto | Obfuscating Conjunctions | online |
2013 | crypto | Everlasting Multi-party Computation | online |
2013 | crypto | On the Security of the TLS Protocol: A Systematic Analysis | online |
2013 | crypto | Programmable Hash Functions in the Multilinear Setting | 513-530 |
2013 | crypto | Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling | online |
2013 | crypto | An Algebraic Framework for Diffie-Hellman Assumptions | online |
2013 | crypto | What Information Is Leaked under Concurrent Composition? | online |
2013 | crypto | Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures | online |
2013 | crypto | Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions | online |
2013 | crypto | Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I | |
2013 | crypto | The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries | 392-409 |
2013 | crypto | Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation | online |
2013 | crypto | Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based | online |
2013 | crypto | Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs | online |
2013 | crypto | Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys | online |
2013 | crypto | A Uniform Min-Max Theorem with Applications in Cryptography | online |
2013 | crypto | Key Homomorphic PRFs and Their Applications | 410-428 |
2013 | crypto | Linearly Homomorphic Structure-Preserving Signatures and Their Applications | online |
2013 | crypto | Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions | 571-588 |
2013 | crypto | Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract) | online |
2013 | crypto | On the Achievability of Simulation-Based Security for Functional Encryption | online |
2013 | crypto | Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract) | online |
2013 | crypto | Counter-cryptanalysis: reconstructing Flame's new variant collision attack | online |
2013 | crypto | SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge | online |
2013 | crypto | Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries | online |
2013 | crypto | Optimal Coding for Streaming Authentication and Interactive Communication | online |
2013 | crypto | Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System | online |
2013 | crypto | Functional Encryption: New Perspectives and Lower Bounds | online |
2013 | crypto | On the Indifferentiability of Key-Alternating Ciphers | online |
2013 | crypto | Construction of Differential Characteristics in ARX Designs Application to Skein | online |
2013 | crypto | Practical Bootstrapping in Quasilinear Time | online |
2013 | crypto | Quantum One-Time Programs - (Extended Abstract) | online |
2013 | crypto | A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation | online |
2013 | crypto | Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World | online |
2013 | crypto | Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers | online |
2013 | crypto | Sieve-in-the-Middle: Improved MITM Attacks | online |
2013 | crypto | Practical Multilinear Maps over the Integers | online |
2013 | crypto | Learning with Rounding, Revisited - New Reduction, Properties and Applications | online |
2013 | crypto | Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II | |
2013 | crypto | How to Run Turing Machines on Encrypted Data | online |
2013 | eurocrypt | Locally Computable UOWHF with Linear Shrinkage | online |
2013 | eurocrypt | Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists | online |
2013 | eurocrypt | Regularity of Lossy RSA on Subdomains and Its Applications | online |
2013 | eurocrypt | Candidate Multilinear Maps from Ideal Lattices | online |
2013 | eurocrypt | How to Garble RAM Programs | online |
2013 | eurocrypt | MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions | online |
2013 | eurocrypt | Amplification of Chosen-Ciphertext Security | online |
2013 | eurocrypt | Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions | 426-443 |
2013 | eurocrypt | Practical Homomorphic MACs for Arithmetic Circuits | online |
2013 | eurocrypt | Streaming Authenticated Data Structures | online |
2013 | eurocrypt | Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields | online |
2013 | eurocrypt | How to Watermark Cryptographic Functions | online |
2013 | eurocrypt | Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption | online |
2013 | eurocrypt | Practical Signatures from Standard Assumptions | online |
2013 | eurocrypt | Message-Locked Encryption and Secure Deduplication | online |
2013 | eurocrypt | Improving Local Collisions: New Attacks on Reduced SHA-256 | online |
2013 | eurocrypt | Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions | online |
2013 | eurocrypt | Circular Chosen-Ciphertext Security with Compact Ciphertexts | online |
2013 | eurocrypt | Efficient Cryptosystems from 2 k -th Power Residue Symbols | online |
2013 | eurocrypt | Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem | online |
2013 | eurocrypt | Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions | online |
2013 | eurocrypt | A Toolkit for Ring-LWE Cryptography | online |
2013 | eurocrypt | Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings | |
2013 | eurocrypt | Dynamic Proofs of Retrievability via Oblivious RAM | online |
2013 | eurocrypt | Keccak | online |
2013 | eurocrypt | Masking against Side-Channel Attacks: A Formal Security Proof | online |
2013 | eurocrypt | New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis | online |
2013 | eurocrypt | One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games | online |
2013 | eurocrypt | Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction | online |
2013 | eurocrypt | Resource-Restricted Indifferentiability | online |
2013 | eurocrypt | Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures | online |
2013 | eurocrypt | How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation | online |
2013 | eurocrypt | Lossy Codes and a New Variant of the Learning-With-Errors Problem | online |
2013 | eurocrypt | Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting | online |
2013 | eurocrypt | On Concurrently Secure Computation in the Multiple Ideal Query Model | online |
2013 | eurocrypt | Fast Cryptography in Genus 2 | online |
2013 | eurocrypt | Batch Fully Homomorphic Encryption over the Integers | online |
2013 | eurocrypt | Cryptanalysis of Full RIPEMD-128 | online |
2013 | eurocrypt | Leakage-Resilient Cryptography from Minimal Assumptions | online |
2013 | eurocrypt | Quantum-Secure Message Authentication Codes | online |
2013 | eurocrypt | New Links between Differential and Linear Cryptanalysis | online |
2013 | eurocrypt | Quadratic Span Programs and Succinct NIZKs without PCPs | online |
2013 | eurocrypt | Security Evaluations beyond Computing Power | online |
2013 | fse | Failures of secret-key cryptography | |
2013 | fse | Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers | |
2013 | fse | Higher-Order Side Channel Security and Mask Refreshing | online |
2013 | fse | Towards Understanding the Known-Key Security of Block Ciphers | online |
2013 | fse | Rotational Cryptanalysis of Round-Reduced Keccak | online |
2013 | fse | Full Plaintext Recovery Attack on Broadcast RC4 | online |
2013 | fse | Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES | online |
2013 | fse | Time-Memory Trade-Offs for Near-Collisions | online |
2013 | fse | A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox | online |
2013 | fse | Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller | online |
2013 | fse | Attacks and Security Proofs of EAX-Prime | online |
2013 | fse | Smashing WEP in a Passive Attack | online |
2013 | fse | Tweakable Blockciphers with Asymptotically Optimal Security | online |
2013 | fse | Near Collision Attack on the Grain v1 Stream Cipher | online |
2013 | fse | Cryptanalysis of WIDEA | online |
2013 | fse | Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks | online |
2013 | fse | Towards Secure Distance Bounding | online |
2013 | fse | Complementing Feistel Ciphers | online |
2013 | fse | Secure Message Authentication Against Related-Key Attack | online |
2013 | fse | ALE: AES-Based Lightweight Authenticated Encryption | online |
2013 | fse | Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 | online |
2013 | fse | A Framework for Automated Independent-Biclique Cryptanalysis | online |
2013 | fse | Cryptanalysis of Round-Reduced \mathttLED | online |
2013 | fse | Reflection Cryptanalysis of PRINCE-Like Ciphers | online |
2013 | fse | Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials | online |
2013 | fse | Security Analysis of PRINCE | online |
2013 | fse | Masking Tables - An Underestimated Security Risk | online |
2013 | fse | Related-Key Attacks Against Full Hummingbird-2 | online |
2013 | fse | A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones | online |
2013 | fse | On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes | online |
2013 | fse | On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2 | online |
2013 | fse | On Symmetric Encryption with Distinguishable Decryption Failures | online |
2013 | jofc | A Note on Constant-Round Zero-Knowledge Proofs of Knowledge | 638-654 |
2013 | jofc | Round-Optimal Password-Based Authenticated Key Exchange | 714-743 |
2013 | jofc | A Comparison of Cryptanalytic Tradeoff Algorithms | 559-637 |
2013 | jofc | FlipIt: The Game of “Stealthy Takeover” | 655-713 |
2013 | jofc | Compact Proofs of Retrievability | 442-483 |
2013 | jofc | Enhancements of Trapdoor Permutations | 484-512 |
2013 | jofc | Fully Leakage-Resilient Signatures | 513-558 |
2013 | jofc | Polynomial Runtime and Composability | 375-441 |
2013 | jofc | A Note on the Bivariate Coppersmith Theorem | 246-250 |
2013 | jofc | Quark: A Lightweight Hash | 313-339 |
2013 | pkc | Packed Ciphertexts in LWE-based Homomorphic Encryption | online |
2013 | pkc | Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption | online |
2013 | pkc | Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption | online |
2013 | pkc | Functional Encryption: Origins and Recent Developments | online |
2013 | pkc | Vector Commitments and their Applications | online |
2013 | pkc | Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS | 72 |
2013 | pkc | Cryptography Using CAPTCHA Puzzles | online |
2013 | pkc | Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications | online |
2013 | pkc | Decentralized Attribute-Based Signatures | online |
2013 | pkc | On the semantic security of functional encryption schemes | online |
2013 | pkc | Attribute-Based Encryption with Fast Decryption | online |
2013 | pkc | Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors | online |
2013 | pkc | Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public ? | online |
2013 | pkc | Revocable Identity-Based Encryption Revisited: Security Model and Construction | online |
2013 | pkc | Improved (Hierarchical) Inner-Product Encryption from Lattices | online |
2013 | pkc | Non-Interactive Key Exchange | online |
2013 | pkc | Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages | online |
2013 | pkc | Tighter Reductions for Forward-Secure Signature Schemes | online |
2013 | pkc | Tagged One-Time Signatures: Tight Security and Optimal Tag Size | online |
2013 | pkc | Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures | online |
2013 | pkc | Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES | online |
2013 | pkc | Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies | online |
2013 | pkc | New Constructions and Applications of Trapdoor DDH Groups | online |
2013 | pkc | Techniques for Efficient Secure Computation Based on Yao's Protocol | online |
2013 | pkc | Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited | online |
2013 | pkc | Robust Encryption, Revisited | online |
2013 | pkc | Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited | online |
2013 | pkc | Rate-Limited Secure Function Evaluation: Definitions and Constructions | online |
2013 | pkc | Verifiable Elections That Scale for Free | online |
2013 | pkc | On the Connection between Leakage Tolerance and Adaptive Security | online |
2013 | pkc | Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings | |
2013 | tcc | Overcoming Weak Expectations | online |
2013 | tcc | A Counterexample to the Chain Rule for Conditional HILL Entropy, and what Deniable Encryption has to do with it | online |
2013 | tcc | Hardness Preserving Reductions via Cuckoo Hashing | online |
2013 | tcc | Concurrent Zero Knowledge in the Bounded Player Model | online |
2013 | tcc | Public-Coin Concurrent Zero-Knowledge in the Global Hash Model | online |
2013 | tcc | Succinct Malleable NIZKs and an Application to Compact Shuffles | online |
2013 | tcc | Encrypted Messages from the Heights of Cryptomania | online |
2013 | tcc | Attribute-Based Functional Encryption on Lattices | online |
2013 | tcc | When Homomorphism Becomes a Liability | online |
2013 | tcc | Garbling XOR Gates "For Free" in the Standard Model | online |
2013 | tcc | Why ``Fiat-Shamir for Proofs" Lacks a Proof | online |
2013 | tcc | On the (In)security of Fischlin's Paradigm | online |
2013 | tcc | Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings | |
2013 | tcc | Signatures of Correct Computation | online |
2013 | tcc | A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness | online |
2013 | tcc | Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities | online |
2013 | tcc | Feasibility and Completeness of Cryptographic Tasks in the Quantum World | online |
2013 | tcc | Languages with Efficient Zero-Knowledge PCPs are in SZK | online |
2013 | tcc | Succinct Non-Interactive Arguments via Linear Interactive Proofs | online |
2013 | tcc | Barriers to Provably-Secure Perfect NIZK and Non-interactive Non-malleable Commitments | online |
2013 | tcc | Secure Computation for Big Data | online |
2013 | tcc | Communication Locality in Secure Multi-Party Computation: How to Run Sublinear Algorithms in a Distributed Setting | online |
2013 | tcc | Distributed Oblivious RAM for Secure Two-Party Computation | online |
2013 | tcc | Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead | online |
2013 | tcc | Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy | 415 |
2013 | tcc | Limits on the Usefulness of Random Oracles | online |
2013 | tcc | Analyzing Graphs with Node Differential Privacy | online |
2013 | tcc | Universally Composable Synchronous Computation | online |
2013 | tcc | Multi-Client Non-Interactive Verifiable Computation | online |
2013 | tcc | On the Feasibility of Extending Oblivious Transfer | online |
2013 | tcc | Computational Soundness of Coinductive Symbolic Security under Active Attacks | online |
2013 | tcc | Revisiting Lower and Upper Bounds for Selective Decommitments | online |
2013 | tcc | On the Circular Security of Bit-Encryption | online |
2013 | tcc | Cryptographic Hardness of Random Local Functions -- Survey | online |
2013 | tcc | On the Power of Correlated Randomness in Secure Computation | online |
2013 | tcc | Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing | online |
2013 | tcc | Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens | online |
2013 | tcc | A Cookbook for Black-Box Separations and a Recipe for UOWHFs | online |
2013 | tcc | Algebraic (Trapdoor) One Way Functions and their Applications | online |
2013 | tcc | Randomness-Dependent Message Security | online |
2013 | tcc | ERRATA: (Nearly) round-optimal black-box constructions of commitments secure against selective opening attacks | online |