


default search action
37th CRYPTO 2017: Santa Barbara, CA, USA - Part II
- Jonathan Katz, Hovav Shacham:

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10402, Springer 2017, ISBN 978-3-319-63714-3
OT and ORAM
- Alexander R. Block

, Hemanta K. Maji, Hai H. Nguyen:
Secure Computation Based on Leaky Correlations: High Resilience Setting. 3-32 - Chongwon Cho

, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou:
Laconic Oblivious Transfer and Its Applications. 33-65 - Steve Lu, Rafail Ostrovsky:

Black-Box Parallel Garbled RAM. 66-92
Foundations II
- Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi:

Non-Malleable Codes for Space-Bounded Tampering. 95-126 - Michele Ciampi

, Rafail Ostrovsky, Luisa Siniscalchi
, Ivan Visconti:
Four-Round Concurrent Non-Malleable Commitments from One-Way Functions. 127-157 - Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum:

Distinguisher-Dependent Simulation in Two Rounds and its Applications. 158-189
Obfuscation II
- Sanjam Garg, Omkant Pandey:

Incremental Program Obfuscation. 193-223 - Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum:

From Obfuscation to the Security of Fiat-Shamir for Proofs. 224-251 - Prabhanjan Ananth, Abhishek Jain, Amit Sahai:

Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization. 252-279
Quantum
- Fang Song, Aaram Yun:

Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks. 283-309 - Gorjan Alagic, Christian Majenz

:
Quantum Non-malleability and Authentication. 310-341 - Sumegha Garg, Henry Yuen, Mark Zhandry

:
New Security Notions and Feasibility Results for Authentication of Quantum Data. 342-371
Hash Functions
- Itai Dinur, Niv Nadler:

Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme. 375-403 - Zhenzhen Bao

, Lei Wang, Jian Guo
, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. 404-427 - Ling Song, Guohong Liao, Jian Guo

:
Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak. 428-451
Lattices
- Daniele Micciancio

, Michael Walter
:
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time. 455-485 - Andre Esser, Robert Kübler, Alexander May

:
LPN Decoded. 486-514
Signatures
- Fuchun Guo

, Rongmao Chen, Willy Susilo
, Jianchang Lai, Guomin Yang
, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. 517-547 - Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan

:
Compact Structure-Preserving Signatures with Almost Tight Security. 548-580 - Jens Groth

, Mary Maller:
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs. 581-612 - Yehuda Lindell

:
Fast Secure Two-Party ECDSA Signing. 613-644
Block Ciphers
- Christof Beierle

, Anne Canteaut, Gregor Leander
, Yann Rotella:
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. 647-678 - F. Betül Durak, Serge Vaudenay:

Breaking the FF3 Format-Preserving Encryption Standard over Small Domains. 679-707 - Bart Mennink:

Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. 708-732

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














