default search action
37th EUROCRYPT 2018: Tel Aviv, Israel - Part II
- Jesper Buus Nielsen, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. Lecture Notes in Computer Science 10822, Springer 2018, ISBN 978-3-319-78371-0
Zero-Knowledge
- Nils Fleischhacker, Vipul Goyal, Abhishek Jain:
On the Existence of Three Round Zero-Knowledge Proofs. 3-33 - Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Statistical Witness Indistinguishability (and more) in Two Messages. 34-65 - Pavel Hubácek, Alon Rosen, Margarita Vald:
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge. 66-87
Implementing Multiparty Computation
- Marcel Keller, Avishay Yanai:
Efficient Maliciously Secure Multiparty Computation for RAM. 91-124 - Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder:
Efficient Circuit-Based PSI via Cuckoo Hashing. 125-157 - Marcel Keller, Valerio Pastro, Dragos Rotaru:
Overdrive: Making SPDZ Great Again. 158-189
Non-interactive Zero-Knowledge
- Pyrros Chaidos, Geoffroy Couteau:
Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge. 193-221 - Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. 222-255
Anonymous Communication
- Jean Paul Degabriele, Martijn Stam:
Untagging Tor: A Formal Treatment of Onion Encryption. 259-293 - Marshall Ball, Elette Boyle, Tal Malkin, Tal Moran:
Exploring the Boundaries of Topology-Hiding Computation. 294-325
Isogeny
- Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, Christophe Petit:
Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions. 329-368
Leakage
- Yi-Hsiu Chen, Kai-Min Chung, Jyun-Jie Liao:
On the Complexity of Simulating Auxiliary Input. 371-390
Key Exchange
- Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov:
Fuzzy Password-Authenticated Key Exchange. 393-424 - David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks:
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. 425-455 - Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. 456-486
Quantum
- Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz:
Unforgeable Quantum Encryption. 489-519 - Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa:
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model. 520-551 - Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. 552-586
Non-maleable Codes
- Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Non-malleable Randomness Encoders and Their Applications. 589-617 - Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering. 618-650
Provable Symmetric Cryptography
- Pratik Soni, Stefano Tessaro:
Naor-Reingold Goes Public: The Complexity of Known-Key Security. 653-684 - Anja Lehmann, Björn Tackmann:
Updatable Encryption with Post-Compromise Security. 685-716
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.