


default search action
EUROCRYPT 2014: Copenhagen, Denmark
- Phong Q. Nguyen, Elisabeth Oswald

:
Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings. Lecture Notes in Computer Science 8441, Springer 2014, ISBN 978-3-642-55219-9
Public-Key Cryptanalysis
- Razvan Barbulescu, Pierrick Gaudry, Antoine Joux

, Emmanuel Thomé
:
A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic. 1-16 - Alain Couvreur, Ayoub Otmani

, Jean-Pierre Tillich:
Polynomial Time Attack on Wild McEliece over Quadratic Extensions. 17-39 - Jean-Charles Faugère, Louise Huot, Antoine Joux

, Guénaël Renault, Vanessa Vitse:
Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus. 40-57
Identity-Based Encryption
- Allison B. Lewko, Brent Waters:

Why Proving HIBE Systems Secure Is Difficult. 58-76 - Junzuo Lai, Robert H. Deng

, Shengli Liu, Jian Weng
, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. 77-92
Key Derivation and Quantum Computing
- Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:

Key Derivation without Entropy Waste. 93-110 - Sebastian Faust, Pratyay Mukherjee, Daniele Venturi

, Daniel Wichs:
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. 111-128 - Dominique Unruh

:
Revocable Quantum Timed-Release Encryption. 129-146
Secret-Key Analysis and Implementations
- Thomas Peyrin

, Lei Wang:
Generic Universal Forgery Attack on Iterative Hash-Based MACs. 147-164 - Céline Blondeau, Kaisa Nyberg:

Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 165-182 - Craig Costello

, Hüseyin Hisil
, Benjamin Smith
:
Faster Compact Diffie-Hellman: Endomorphisms on the x-line. 183-200
Obfuscation and Multilinear Maps
- Susan Hohenberger, Amit Sahai, Brent Waters:

Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation. 201-220 - Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai:

Protecting Obfuscation against Algebraic Attacks. 221-238 - Adeline Langlois

, Damien Stehlé, Ron Steinfeld:
GGHLite: More Efficient Multilinear Maps from Ideal Lattices. 239-256
Authenticated Encryption
- Chanathip Namprempre, Phillip Rogaway, Thomas Shrimpton:

Reconsidering Generic Composition. 257-274 - Kazuhiko Minematsu:

Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions. 275-292
Symmetric Encryption
- Ari Juels, Thomas Ristenpart:

Honey Encryption: Security Beyond the Brute-Force Bound. 293-310 - Ben Morris, Phillip Rogaway:

Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time. 311-326 - Shan Chen

, John P. Steinberger:
Tight Security Bounds for Key-Alternating Ciphers. 327-350 - David Cash, Stefano Tessaro:

The Locality of Searchable Symmetric Encryption. 351-368
Multi-party Computation
- Himanshu Tyagi, Shun Watanabe

:
A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing. 369-386 - Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva:

Non-Interactive Secure Computation Based on Cut-and-Choose. 387-404 - Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs:

Garbled RAM Revisited. 405-422
Side-Channel Attacks
- Alexandre Duc, Stefan Dziembowski, Sebastian Faust:

Unifying Leakage Models: From Probing Attacks to Noisy Leakage. 423-440 - Jean-Sébastien Coron:

Higher Order Masking of Look-Up Tables. 441-458 - François Durvaux, François-Xavier Standaert

, Nicolas Veyrat-Charvillon:
How to Certify the Leakage of a Chip? 459-476
Signatures and Public-Key Encryption
- Sanjam Garg, Divya Gupta:

Efficient Round Optimal Blind Signatures. 477-495 - Mihir Bellare, Sarah Meiklejohn, Susan Thomson:

Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig. 496-513 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:

Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures. 514-532
Functional Encryption
- Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. 533-556 - Nuttapong Attrapadung:

Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More. 557-577 - Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou

:
Multi-input Functional Encryption. 578-602
Foundations
- Arno Mittelbach:

Salvaging Indifferentiability in a Multi-stage Setting. 603-621 - Melissa Chase, Sarah Meiklejohn:

Déjà Q: Using Dual Systems to Revisit q-Type Assumptions. 622-639 - Niv Gilboa

, Yuval Ishai:
Distributed Point Functions and Their Applications. 640-658
Multi-party Computation
- Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:

A Full Characterization of Completeness for Two-Party Randomized Function Evaluation. 659-676 - Juan A. Garay, Yuval Ishai, Ranjit Kumaresan, Hoeteck Wee:

On the Complexity of UC Commitments. 677-694 - Morten Dahl, Ivan Damgård:

Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption. 695-712

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














