default search action
CT-RSA 2019: San Francisco, CA, USA
- Mitsuru Matsui:
Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings. Lecture Notes in Computer Science 11405, Springer 2019, ISBN 978-3-030-12611-7 - Tao Zhang, Huangting Wu, Sherman S. M. Chow:
Structure-Preserving Certificateless Encryption and Its Application. 1-22 - Suvradip Chakraborty, C. Pandu Rangan:
Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks. 23-43 - Olivier Blazy, Paul Germouty, Duong Hieu Phan:
Downgradable Identity-Based Encryption and Applications. 44-61 - Sanjit Chatterjee, Sayantan Mukherjee:
Large Universe Subset Predicate Encryption Based on Static Assumption (Without Random Oracle). 62-82 - Shai Halevi, Yuriy Polyakov, Victor Shoup:
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. 83-105 - Sergiu Carpov, Malika Izabachène, Victor Mollimard:
New Techniques for Multi-value Input Homomorphic Evaluation and Applications. 106-126 - Manuel Barbosa, Dario Catalano, Azam Soleimanian, Bogdan Warinschi:
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality. 127-148 - Rémi Géraud, David Naccache, Razvan Rosie:
Robust Encryption, Extended. 149-168 - Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi:
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model. 169-188 - Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels:
Doubly Half-Injective PRGs for Incompressible White-Box Cryptography. 189-209 - Nigel P. Smart, Tim Wood:
Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation. 210-229 - Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. 230-250 - Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-quantum EPID Signatures from Symmetric Primitives. 251-271 - Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:
Assessment of the Key-Reuse Resilience of NewHope. 272-292 - Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. 293-312 - Bart Mennink:
Linking Stam's Bounds with Generalized Truncation. 313-329 - Liron David, Avishai Wool:
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling. 330-349 - Antonio Faonio:
Efficient Fully-Leakage Resilient One-More Signature Schemes. 350-371 - Baoyu Zhu, Xiaoyang Dong, Hongbo Yu:
MILP-Based Differential Attack on Round-Reduced GIFT. 372-390 - Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata:
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers. 391-411 - Kai Hu, Meiqin Wang:
Automatic Search for a Variant of Division Property Using Three Subsets. 412-432 - Si Gao, Arnab Roy, Elisabeth Oswald:
Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations. 433-452 - Mark Abspoel, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede:
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks. 453-472 - Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren:
EPIC: Efficient Private Image Classification (or: Learning from the Masters). 473-492 - Lucas Schabhüser, Denis Butin, Johannes Buchmann:
Context Hiding Multi-key Linearly Homomorphic Authenticators. 493-513 - Liang Zhao:
Revisiting the Secret Hiding Assumption Used in Verifiable (Outsourced) Computation. 514-534 - Elizabeth C. Crites, Anna Lysyanskaya:
Delegatable Anonymous Credentials from Mercurial Signatures. 535-555 - San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Accountable Tracing Signatures from Lattices. 556-576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.