


default search action
36th CRYPTO 2016: Santa Barbara, CA, USA - Part III
- Matthew Robshaw, Jonathan Katz:

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Lecture Notes in Computer Science 9816, Springer 2016, ISBN 978-3-662-53014-6
Quantum Techniques
- Yfke Dulek

, Christian Schaffner
, Florian Speelman
:
Quantum Homomorphic Encryption for Polynomial-Sized Circuits. 3-32 - Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail:

Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications. 33-59 - Tommaso Gagliardoni, Andreas Hülsing

, Christian Schaffner
:
Semantic Security and Indistinguishability in the Quantum World. 60-89
Spooky Encryption
- Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:

Spooky Encryption and Its Applications. 93-122 - Cynthia Dwork, Moni Naor, Guy N. Rothblum:

Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems. 123-145
Secure Computation and Protocols II
- Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs:

Adaptively Secure Garbled Circuits from One-Way Functions. 149-178 - Ignacio Cascudo

, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen
:
Rate-1, Linear Time and Additively Homomorphic UC Commitments. 179-207 - Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:

UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. 208-239 - Ran Cohen

, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. 240-269 - Michele Ciampi

, Rafail Ostrovsky, Luisa Siniscalchi
, Ivan Visconti:
Concurrent Non-Malleable Commitments (and More) in 3 Rounds. 270-299
IBE, ABE, and Functional Encryption
- Jiang Zhang

, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. 303-332 - Shweta Agrawal, Benoît Libert, Damien Stehlé:

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions. 333-362 - Zvika Brakerski, Vinod Vaikuntanathan:

Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security. 363-384
Automated Tools and Synthesis
- Masayuki Abe, Fumitaka Hoshino

, Miyako Ohkubo:
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming. 387-415 - Brent Carmer, Mike Rosulek:

Linicrypt: A Model for Practical Cryptography. 416-445
Zero Knowledge
- Benny Applebaum, Pavel Raykov:

On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings. 449-477 - Carsten Baum, Ivan Damgård, Kasper Green Larsen

, Michael Nielsen:
How to Prove Knowledge of Small Secrets. 478-498 - Melissa Chase, Chaya Ganesh, Payman Mohassel:

Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials. 499-530
Theory
- Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:

Fine-Grained Cryptography. 533-562 - Sanjam Garg, Payman Mohassel, Charalampos Papamanthou:

TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. 563-592 - Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson:

Bounded Indistinguishability and the Complexity of Recovering Secrets. 593-618 - Nico Döttling, Nils Fleischhacker

, Johannes Krupp, Dominique Schröder
:
Two-Message, Oblivious Evaluation of Cryptographic Functionalities. 619-648

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














