


default search action
34th CRYPTO 2014: Santa Barbara, California, USA
- Juan A. Garay, Rosario Gennaro:

Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Lecture Notes in Computer Science 8616, Springer 2014, ISBN 978-3-662-44370-5
Symmetric Encryption and PRFs
- Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway:

Security of Symmetric Encryption against Mass Surveillance. 1-19 - Yuanxi Dai, Jooyoung Lee, Bart Mennink, John P. Steinberger:

The Security of Multiple Encryption in the Ideal Cipher Model. 20-38 - Shan Chen

, Rodolphe Lampe, Jooyoung Lee, Yannick Seurin, John P. Steinberger:
Minimizing the Two-Round Even-Mansour Cipher. 39-56 - Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander

, Christof Paar, Tolga Yalçin
:
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). 57-76 - Michel Abdalla

, Fabrice Benhamouda
, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. 77-94
Formal Methods
- Gilles Barthe, Edvard Fagerholm, Dario Fiore, John C. Mitchell, Andre Scedrov

, Benedikt Schmidt:
Automated Analysis of Cryptographic Assumptions in Generic Group Models. 95-112
Hash Functions
- Peter Gazi, Krzysztof Pietrzak, Michal Rybár:

The Exact PRF-Security of NMAC and HMAC. 113-130 - Jian Guo

, Thomas Peyrin
, Yu Sasaki, Lei Wang:
Updates on Generic Attacks against HMAC and NMAC. 131-148 - Itai Dinur, Gaëtan Leurent

:
Improved Generic Attacks against Hash-Based MACs and HAIFA. 149-168 - Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi:

Cryptography from Compression Functions: The UCE Bridge to the ROM. 169-187 - Christina Brzuska, Pooya Farshim, Arno Mittelbach:

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources. 188-205
Groups and Maps
- Dan Boneh, Brent Waters, Mark Zhandry

:
Low Overhead Broadcast Encryption from Multilinear Maps. 206-223 - Hyung Tae Lee, Jae Hong Seo

:
Security Analysis of Multilinear Maps over the Integers. 224-240 - Masayuki Abe, Jens Groth

, Miyako Ohkubo, Takeya Tango:
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups. 241-260 - Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla Ràfols

, Andy Rupp:
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations. 261-279
Lattices
- Hendrik W. Lenstra Jr., Alice Silverberg:

Revisiting the Gentry-Szydlo Algorithm. 280-296 - Jacob Alperin-Sheriff, Chris Peikert:

Faster Bootstrapping with Polynomial Error. 297-314 - San Ling

, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld:
Hardness of k-LWE and Applications in Traitor Tracing. 315-334 - Léo Ducas, Daniele Micciancio

:
Improved Short Lattice Signatures in the Standard Model. 335-352 - Abhishek Banerjee, Chris Peikert:

New and Improved Key-Homomorphic Pseudorandom Functions. 353-370
Asymmetric Encryption and Signatures
- Dario Catalano, Dario Fiore, Bogdan Warinschi:

Homomorphic Signatures with Efficient Verification for Polynomial Functions. 371-389 - Masayuki Abe, Jens Groth

, Miyako Ohkubo, Mehdi Tibouchi
:
Structure-Preserving Signatures from Type II Pairings. 390-407 - Olivier Blazy

, Eike Kiltz
, Jiaxin Pan
:
(Hierarchical) Identity-Based Encryption from Affine Message Authentication. 408-425 - Craig Gentry, Allison B. Lewko, Brent Waters:

Witness Encryption from Instance Independent Assumptions. 426-443
Side Channels and Leakage Resilience I
- Daniel Genkin, Adi Shamir, Eran Tromer

:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. 444-461 - Per Austrin, Kai-Min Chung

, Mohammad Mahmoody
, Rafael Pass
, Karn Seth:
On the Impossibility of Cryptography with Tamperable Randomness. 462-479
Obfuscation I
- Dan Boneh, Mark Zhandry

:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. 480-499 - Rafael Pass

, Karn Seth, Sidharth Telang:
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings. 500-517 - Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:

On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. 518-535
FHE
- Rafail Ostrovsky, Anat Paskin-Cherniavsky, Beni Paskin-Cherniavsky

:
Maliciously Circuit-Private FHE. 536-553 - Shai Halevi, Victor Shoup:

Algorithms in HElib. 554-571

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














