


default search action
37th CRYPTO 2017: Santa Barbara, CA, USA - Part III
- Jonathan Katz, Hovav Shacham:

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10403, Springer 2017, ISBN 978-3-319-63696-2
Authenticated Encryption
- Tomer Ashur

, Orr Dunkelman, Atul Luykx:
Boosting Authenticated Encryption Robustness with Minimal Modifications. 3-33 - Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin

, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. 34-65 - Paul Grubbs, Jiahui Lu, Thomas Ristenpart

:
Message Franking via Committing Authenticated Encryption. 66-97 - Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott:

Key Rotation for Authenticated Encryption. 98-129
Public-Key Encryption
- Romain Gay

, Dennis Hofheinz, Lisa Kohl:
Kurosawa-Desmedt Meets Tight Security. 133-160 - Shota Yamada:

Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques. 161-193 - Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan

, Jean-Pierre Tillich:
Identity-Based Encryption from Codes with Rank Metric. 194-224
Stream Ciphers
- Meicheng Liu:

Degree Evaluation of NFSR-Based Cryptosystems. 227-249 - Yosuke Todo

, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. 250-279
Lattice Crypto
- Miruna Rosca, Amin Sakzad

, Damien Stehlé, Ron Steinfeld:
Middle-Product Learning with Errors. 283-297 - Xavier Boyen, Qinyi Li:

All-But-Many Lossy Trapdoor Functions from Lattices and Applications. 298-331 - Benoît Libert, Amin Sakzad

, Damien Stehlé, Ron Steinfeld:
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE. 332-364 - Rafaël del Pino, Vadim Lyubashevsky:

Amortization with Fewer Equations for Proving Knowledge of Small Secrets. 365-394
Leakage and Subversion
- Sonia Belaïd, Fabrice Benhamouda

, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud
:
Private Multiplication over Finite Fields. 397-426 - Jan Camenisch, Manu Drijvers, Anja Lehmann:

Anonymous Attestation with Subverted TPMs. 427-461 - Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton:

Hedging Public-Key Encryption in the Real World. 462-494
Symmetric-Key Crypto
- Wei Dai, Viet Tung Hoang, Stefano Tessaro:

Information-Theoretic Indistinguishability via the Chi-Squared Method. 497-523 - Yuanxi Dai, Yannick Seurin, John P. Steinberger, Aishwarya Thiruvengadam:

Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient. 524-555 - Bart Mennink, Samuel Neves

:
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory. 556-583
Real-World Crypto
- Felix Günther, Sogol Mazaheri:

A Formal Treatment of Multi-key Channels. 587-618 - Mihir Bellare, Asha Camper Singh, Joseph Jaeger

, Maya Nyayapati, Igors Stepanovs:
Ratcheted Encryption and Key Exchange: The Security of Messaging. 619-650 - Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson:

PRF-ODH: Relations, Instantiations, and Impossibility Results. 651-681 - Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. 682-710

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














