


default search action
32nd CRYPTO 2012: Santa Barbara, California, USA
- Reihaneh Safavi-Naini, Ran Canetti:

Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. Lecture Notes in Computer Science 7417, Springer 2012, ISBN 978-3-642-32008-8 - Viet Tung Hoang, Ben Morris, Phillip Rogaway:

An Enciphering Scheme Based on a Card Shuffle. 1-13 - Will Landecker, Thomas Shrimpton, R. Seth Terashima:

Tweakable Blockciphers with Beyond Birthday-Bound Security. 14-30 - Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:

Breaking and Repairing GCM Security Proofs. 31-49 - Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen

, Gregor Leander
:
On the Distribution of Linear Biases: Three Instructive Examples. 50-67 - Eric Miles, Emanuele Viola:

Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs. 68-85 - Jonathan Zittrain

:
The End of Crypto. 86 - Mike Rosulek:

Must You Know the Code of f to Securely Compute f? 87-104 - Sanjam Garg, Amit Sahai:

Adaptively Secure Multi-Party Computation with Dishonest Majority. 105-123 - Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas:

Collusion-Preserving Computation. 124-143 - Amos Beimel

, Oriol Farràs
, Yuval Mintz:
Secret Sharing Schemes for Very Dense Graphs. 144-161 - Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:

Functional Encryption with Bounded Collusions via Multi-party Computation. 162-179 - Allison B. Lewko, Brent Waters:

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. 180-198 - Amit Sahai, Hakan Seyalioglu, Brent Waters:

Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. 199-217 - Brent Waters:

Functional Encryption for Regular Languages. 218-235 - Melissa Chase, Ivan Visconti:

Secure Database Commitments and Universal Arguments of Quasi Knowledge. 236-254 - Nir Bitansky, Alessandro Chiesa:

Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits. 255-272 - Tibor Jager, Florian Kohlar, Sven Schäge

, Jörg Schwenk:
On the Security of TLS-DHE in the Standard Model. 273-293 - Mihir Bellare, Stefano Tessaro, Alexander Vardy

:
Semantic Security for the Wiretap Channel. 294-311 - Mihir Bellare, Thomas Ristenpart, Stefano Tessaro:

Multi-instance Security and Its Application to Password-Based Cryptography. 312-329 - Bart Mennink, Bart Preneel

:
Hash Functions Based on Three Permutations: A Generic Security Analysis. 330-347 - Yevgeniy Dodis, Thomas Ristenpart

, John P. Steinberger, Stefano Tessaro:
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. 348-366 - Simon Knellwolf, Dmitry Khovratovich:

New Preimage Attacks against Reduced SHA-1. 367-383 - John P. Steinberger, Xiaoming Sun

, Zhe Yang:
Stam's Conjecture and Threshold Phenomena in Collision Resistance. 384-405 - Mike Rosulek:

Universal Composability from Essentially Any Trusted Setup. 406-423 - Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky, Ivan Visconti:

Impossibility Results for Static Input Secure Computation. 424-442 - Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:

New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation. 443-460 - Huijia Lin, Rafael Pass

:
Black-Box Constructions of Composable Protocols without Set-Up. 461-478 - Johannes Gehrke, Michael Hay, Edward Lui, Rafael Pass

:
Crowd-Blending Privacy. 479-496 - Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov

, Salil P. Vadhan:
Differential Privacy with Imperfect Randomness. 497-516 - Feng-Hao Liu, Anna Lysyanskaya:

Tamper and Leakage Resilience in the Split-State Model. 517-532 - Dana Dachman-Soled, Yael Tauman Kalai:

Securing Circuits against Constant-Rate Tampering. 533-551 - Guy N. Rothblum:

How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware. 552-569 - Ernie Brickell:

Recent Advances and Existing Research Questions in Platform Security. 570 - Benoît Libert, Thomas Peters, Moti Yung:

Group Signatures with Almost-for-Free Revocation. 571-589 - Dennis Hofheinz, Tibor Jager:

Tightly Secure Signatures and Public-Key Encryption. 590-607 - Romain Bardou, Riccardo Focardi

, Yusuke Kawamoto
, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay:
Efficient Padding Oracle Attacks on Cryptographic Hardware. 608-625 - Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung, Christophe Wachter:

Public Keys. 626-642 - Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias:

Multiparty Computation from Somewhat Homomorphic Encryption. 643-662 - Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky:

Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority. 663-680 - Jesper Buus Nielsen

, Peter Sebastian Nordholt, Claudio Orlandi
, Sai Sheshank Burra:
A New Approach to Practical Active-Secure Two-Party Computation. 681-700 - Mohammad Mahmoody

, Rafael Pass
:
The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives. 701-718 - Itai Dinur, Orr Dunkelman

, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. 719-740 - Aslí Bay, Atefeh Mashatan

, Serge Vaudenay:
Resistance against Iterated Attacks by Decorrelation Revisited, . 741-757 - Mark Zhandry

:
Secure Identity-Based Encryption in the Quantum Random Oracle Model. 758-775 - Mario Berta

, Omar Fawzi
, Stephanie Wehner:
Quantum to Classical Randomness Extractors. 776-793 - Frédéric Dupuis, Jesper Buus Nielsen

, Louis Salvail:
Actively Secure Two-Party Evaluation of Any Quantum Operation. 794-811 - Goichiro Hanaoka, Takahiro Matsuda, Jacob C. N. Schuldt:

On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups. 812-831 - Alexandre Duc, Dimitar Jetchev:

Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves. 832-849 - Craig Gentry, Shai Halevi, Nigel P. Smart:

Homomorphic Evaluation of the AES Circuit. 850-867 - Zvika Brakerski:

Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP. 868-886

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














