


default search action
35th CRYPTO 2015: Santa Barbara, California, USA
- Rosario Gennaro, Matthew Robshaw:

Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9215, Springer 2015, ISBN 978-3-662-47988-9
Lattice-Based Cryptography
- Thijs Laarhoven

:
Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing. 3-22 - Qian Guo

, Thomas Johansson
, Paul Stankovski
:
Coded-BKW: Solving LWE Using Lattice Codes. 23-42 - Paul Kirchner

, Pierre-Alain Fouque
:
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. 43-62 - Yara Elias, Kristin E. Lauter, Ekin Ozman

, Katherine E. Stange
:
Provably Weak Instances of Ring-LWE. 63-92
Cryptanalytic Insights
- Bing Sun, Zhiqiang Liu, Vincent Rijmen

, Ruilin Li, Lei Cheng, Qingju Wang
, Hoda Alkhzaimi
, Chao Li:
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. 95-115 - Alex Biryukov

, Léo Perrin:
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. 116-140 - Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:

Capacity and Data Complexity in Multidimensional Linear Attack. 141-160 - Stefan Kölbl, Gregor Leander

, Tyge Tiessen
:
Observations on the SIMON Block Cipher Family. 161-185
Modes and Constructions
- Benoit Cogliati, Rodolphe Lampe, Yannick Seurin:

Tweaking Even-Mansour Ciphers. 189-208 - Nicky Mouha, Atul Luykx:

Multi-key Security: The Even-Mansour Construction Revisited. 209-223 - Mohammad Hajiabadi, Bruce M. Kapron

:
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations. 224-243
Multilinear Maps and IO
- Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint

, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. 247-266 - Jean-Sébastien Coron, Tancrède Lepoint

, Mehdi Tibouchi
:
New Multilinear Maps Over the Integers. 267-286 - Kai-Min Chung

, Huijia Lin, Rafael Pass
:
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation. 287-307 - Prabhanjan Ananth, Abhishek Jain:

Indistinguishability Obfuscation from Compact Functional Encryption. 308-326
Pseudorandomness
- Nico Döttling, Dominique Schröder

:
Efficient Pseudorandom Functions via On-the-Fly Adaptation. 329-350 - Brice Minaud, Yannick Seurin:

The Iterated Random Permutation Problem with Applications to Cascade Encryption. 351-367 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:

The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. 368-387 - Michel Abdalla

, Fabrice Benhamouda
, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. 388-409
Block Cipher Cryptanalysis
- Yosuke Todo

:
Integral Cryptanalysis on Full MISTY1. 413-432 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:

New Attacks on Feistel Structures with Improved Memory Complexities. 433-454 - Céline Blondeau, Thomas Peyrin

, Lei Wang:
Known-Key Distinguisher on Full PRESENT. 455-474 - Henri Gilbert, Jérôme Plût, Joana Treger:

Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes. 475-490
Integrity
- Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár:

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. 493-517 - Avradip Mandal, Arnab Roy:

Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More. 518-537 - Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:

Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations. 538-557
Assumptions
- Pierre-Alain Fouque

, Moon Sung Lee, Tancrède Lepoint
, Mehdi Tibouchi
:
Cryptanalysis of the Co-ACD Assumption. 561-580 - Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:

Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP. 581-600 - Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:

A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. 601-620
Hash Functions and Stream Cipher Cryptanalysis
- Pierre Karpman, Thomas Peyrin

, Marc Stevens
:
Practical Free-Start Collision Attacks on 76-step SHA-1. 623-642 - Bin Zhang, Chao Xu, Willi Meier:

Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0. 643-662 - Virginie Lallemand, María Naya-Plasencia:

Cryptanalysis of Full Sprout. 663-682 - Thomas Espitau, Pierre-Alain Fouque

, Pierre Karpman:
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE. 683-701
Implementations
- Mike Hamburg:

Decaf: Eliminating Cofactors Through Point Compression. 705-723 - Marcel Keller

, Emmanuela Orsini
, Peter Scholl
:
Actively Secure OT Extension with Optimal Overhead. 724-741 - Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:

Algebraic Decomposition for Probing Security. 742-763 - Oscar Reparaz, Begül Bilgin, Svetla Nikova

, Benedikt Gierlichs, Ingrid Verbauwhede
:
Consolidating Masking Schemes. 764-783

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














