


default search action
2. Mycrypt 2016: Kuala Lumpur, Malaysia
- Raphael C.-W. Phan, Moti Yung:

Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10311, Springer 2017, ISBN 978-3-319-61272-0
Keynotes
- Xavier Boyen:

The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture). 3-10 - Neal Koblitz:

Time for a Paradigm Shift in Our Disciplinary Culture? 11-18
Revisiting Tradition
- Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar:

Another Look at Tightness II: Practical Issues in Cryptography. 21-55 - Russell W. F. Lai

, Henry K. F. Cheung
, Sherman S. M. Chow
, Anthony Man-Cho So
:
Another Look at Anonymous Communication - Security and Modular Constructions. 56-82 - Alfred Menezes, Palash Sarkar, Shashank Singh:

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography. 83-108
Different Paradigms
- Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:

Key Recovery: Inert and Public. 111-126 - Marc Beunardeau, Houda Ferradi, Rémi Géraud

, David Naccache:
Honey Encryption for Language - Robbing Shannon to Pay Turing? 127-144 - Michal Kulis, Pawel Lorek

, Filip Zagórski
:
Randomized Stopping Times and Provably Secure Pseudorandom Permutation Generators. 145-167
Cryptofication
- Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin:

A Virtual Wiretap Channel for Secure Message Transmission. 171-192 - Danny Francis

, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki
, Hideaki Sone:
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions. 193-211
Malicious Cryptography
- Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:

Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices. 215-232 - Herman Galteland, Kristian Gjøsteen:

Malware, Encryption, and Rerandomization - Everything Is Under Attack. 233-251 - Miroslaw Kutylowski, Jacek Cichon

, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang
:
Protecting Electronic Signatures in Case of Key Leakage. 252-274
Advances in Cryptanalysis
- Subhabrata Samajder

, Palash Sarkar:
A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations. 277-293 - Marine Minier, Raphael C.-W. Phan

:
Tuple Cryptanalysis: Slicing and Fusing Multisets. 294-320 - Emmanuel Volte, Valérie Nachef, Nicolas Marrière:

Improvements of Attacks on Various Feistel Schemes. 321-344
Primitives and Features
- Afonso Arriaga

, Vincenzo Iovino
, Qiang Tang:
Updatable Functional Encryption. 347-363 - Daniel Slamanig

, Raphael Spreitzer
, Thomas Unterluggauer:
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks. 364-388 - Britta Hale

, Christopher Carr, Danilo Gligoroski:
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control. 389-408 - Veronika Kuchta, Olivier Markowitch:

Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices. 409-435 - Atsushi Fujioka:

One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators. 436-460
Cryptanalysis Correspondence
- Herman Galteland, Stig Fr. Mjølsnes

, Ruxandra F. Olimid
:
Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. 463-473 - Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng

:
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme. 474-477
Invited and Insight Papers
- Goichiro Hanaoka:

Towards User-Friendly Cryptography. 481-484 - Claude Crépeau, Nan Yang:

Multi-prover Interactive Proofs: Unsound Foundations. 485-493 - Houda Ferradi, Rémi Géraud

, David Naccache:
Human Public-Key Encryption. 494-505 - Nicolas T. Courtois:

Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis. 506-520 - Ryo Nishimaki:

Watermarking Cryptographic Programs. 521-543 - Tyge Tiessen

:
From Higher-Order Differentials to Polytopic Cryptyanalysis. 544-552 - Yosuke Todo

:
Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree. 553-571

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














