


default search action
36. EUROCRYPT 2017: Paris, France - Part II
- Jean-Sébastien Coron, Jesper Buus Nielsen  : :
 Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10211, 2017, ISBN 978-3-319-56613-9
Functional Encryption II
- Nir Bitansky, Huijia Lin, Omer Paneth: 
 On Removing Graded Encodings from Functional Encryption. 3-29
- Shashank Agrawal, David J. Wu: 
 Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. 30-61
Lattice Attacks and Constructions IV
- Yoshinori Aono, Phong Q. Nguyen: 
 Random Sampling Revisited: Lattice Enumeration with Discrete Pruning. 65-102
- Martin R. Albrecht: 
 On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL. 103-129
- Atsushi Takayasu, Yao Lu, Liqiang Peng: 
 Small CRT-Exponent RSA Revisited. 130-159
Multiparty Computation II
- Elette Boyle, Niv Gilboa  , Yuval Ishai: , Yuval Ishai:
 Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation. 163-193
- Sanjam Garg, Susumu Kiyoshima, Omkant Pandey: 
 On the Exact Round Complexity of Self-composable Two-Party Computation. 194-224
- Jun Furukawa, Yehuda Lindell  , Ariel Nof, Or Weinstein: , Ariel Nof, Or Weinstein:
 High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. 225-255
Symmetric Cryptanalysis I
- Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao: 
 Conditional Cube Attack on Reduced-Round Keccak Sponge Function. 259-288
- Lorenzo Grassi  , Christian Rechberger, Sondre Rønjom: , Christian Rechberger, Sondre Rønjom:
 A New Structural-Differential Property of 5-Round AES. 289-317
Zero Knowledge II
- Geoffroy Couteau  , Thomas Peters, David Pointcheval , Thomas Peters, David Pointcheval : :
 Removing the Strong RSA Assumption from Arguments over the Integers. 321-350
- Yi Deng: 
 Magic Adversaries Versus Individual Reduction: Science Wins Either Way. 351-377
Provable Security for Symmetric Cryptography I
- Viet Tung Hoang, Stefano Tessaro: 
 The Multi-user Security of Double Encryption. 381-411
- Pratik Soni, Stefano Tessaro: 
 Public-Seed Pseudorandom Permutations. 412-441
Security Models I
- Prabhanjan Ananth, Aloni Cohen, Abhishek Jain: 
 Cryptography with Updates. 445-472
- Yevgeniy Dodis, Siyao Guo, Jonathan Katz: 
 Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited. 473-495
Provable Security for Symmetric Cryptography II
- Paul Grubbs, Thomas Ristenpart, Yuval Yarom  : :
 Modifying an Enciphering Scheme After Deployment. 499-527
- Rishab Goyal, Venkata Koppula, Brent Waters: 
 Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. 528-557
Security Models II
- Mohammad Hajiabadi, Bruce M. Kapron  : :
 Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions. 561-591
- Nir Bitansky, Vinod Vaikuntanathan: 
 A Note on Perfect Correctness by Derandomization. 592-606
Blockchain
- Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra  : :
 Decentralized Anonymous Micropayments. 609-642
- Rafael Pass  , Lior Seeman, Abhi Shelat: , Lior Seeman, Abhi Shelat:
 Analysis of the Blockchain Protocol in Asynchronous Networks. 643-673

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














