default search action
ASIACRYPT 2018: Brisbane, QLD, Australia
- Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. Lecture Notes in Computer Science 11274, Springer 2018, ISBN 978-3-030-03331-6
Multi-Party Computation
- Aner Ben-Efraim:
On Multiparty Garbling of Arithmetic Circuits. 3-33 - Vladimir Kolesnikov:
$$\mathsf {Free\ }{} \mathtt{IF} $$ : How to Omit Inactive Branches and Implement S -Universal Garbled Circuit (Almost) for Free. 34-58 - S. Dov Gordon, Samuel Ranellucci, Xiao Wang:
Secure Computation with Low Communication from Cross-Checking. 59-85 - Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez:
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). 86-117 - Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti:
Non-interactive Secure Computation from One-Way Functions. 118-138
ORAM
- S. Dov Gordon, Jonathan Katz, Xiao Wang:
Simple and Efficient Two-Server ORAM. 141-157 - T.-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi:
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting. 158-188
Real World Protocols
- Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias:
A Universally Composable Framework for the Privacy of Email Ecosystems. 191-221 - Chris Brzuska, Antoine Delignat-Lavaud, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:
State Separation for Code-Based Game-Playing Proofs. 222-249 - Puwen Wei, Quan Yuan, Yuliang Zheng:
Security of the Blockchain Against Long Delay Attack. 250-275
Secret Sharing
- Russell W. F. Lai, Giulio Malavolta, Dominique Schröder:
Homomorphic Secret Sharing for Low Degree Polynomials. 279-309 - Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang:
Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem. 310-331 - Amos Beimel, Naty Peter:
Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols. 332-362
Isogeny-Based Cryptography
- Luca De Feo, Jean Kieffer, Benjamin Smith:
Towards Practical Key Exchange from Ordinary Isogeny Graphs. 365-394 - Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes:
CSIDH: An Efficient Post-Quantum Commutative Group Action. 395-427 - Craig Costello:
Computing Supersingular Isogenies on Kummer Surfaces. 428-456
Foundations
- Yunhua Wen, Shengli Liu:
Robustly Reusable Fuzzy Extractor from Standard Assumptions. 459-489 - Tibor Jager, Rafael Kurek, Jiaxin Pan:
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. 490-518 - Jean Paul Degabriele, Marc Fischlin:
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove. 519-550
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.