![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
38th EUROCRYPT 2020: Zagreb, Croatia - Part I
- Anne Canteaut
, Yuval Ishai:
Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12107, Springer 2020, ISBN 978-3-030-45726-6
Asymmetric Cryptanalysis
- Jan-Pieter D'Anvers
, Mélissa Rossi, Fernando Virdia
:
(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes. 3-33 - Pierre-Alain Fouque
, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet
, Yang Yu
:
Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices. 34-63 - Magali Bardet, Pierre Briaud, Maxime Bros
, Philippe Gaborit, Vincent Neiger
, Olivier Ruatta, Jean-Pierre Tillich:
An Algebraic Attack on Rank Metric Code-Based Cryptosystems. 64-93 - Andre Esser, Alexander May
:
Low Weight Discrete Logarithm and Subset Sum in 20.65n with Polynomial Memory. 94-122
Verifiable Delay Functions
- Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
:
Continuous Verifiable Delay Functions. 125-154 - Lior Rotem, Gil Segev, Ido Shahaf:
Generic-Group Delay Functions Require Hidden-Order Groups. 155-180
Signatures
- Ward Beullens:
Sigma Protocols for MQ, PKP and SIS, and Fishy Signature Schemes. 183-211 - Marc Fischlin, Patrick Harasser, Christian Janson:
Signatures from Sequential-OR Proofs. 212-244
Attribute-Based Encryption
- Huijia Lin, Ji Luo
:
Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and Towards NL. 247-277 - Junqing Gong, Hoeteck Wee:
Adaptively Secure ABE for DFA from k-Lin and More. 278-308
Side-Channel Security
- Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff:
Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations. 311-341 - Jean-Sébastien Coron, Aurélien Greuet
, Rina Zeitoun:
Side-Channel Masking with Pseudo-Random Generator. 342-375
Non-Interactive Zero-Knowledge
- Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. 379-409 - Benoît Libert, Alain Passelègue, Hoeteck Wee, David J. Wu:
New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More. 410-441 - Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
:
Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions. 442-471
Public-Key Encryption
- Benedikt Auerbach
, Federico Giacon, Eike Kiltz
:
Everybody's a Target: Scalability in Public-Key Encryption. 475-506 - Mihir Bellare, Igors Stepanovs:
Security Under Message-Derived Keys: Signcryption in iMessage. 507-537 - Wei Yu, Saud Al Musa, Bao Li:
Double-Base Chains for Scalar Multiplications on Elliptic Curves. 538-565
Zero-Knowledge
- David Heath, Vladimir Kolesnikov:
Stacked Garbling for Disjunctive Zero-Knowledge Proofs. 569-598 - Carmit Hazay, Rafael Pass
, Muthuramakrishnan Venkitasubramaniam:
Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions? 599-619 - Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
Statistical ZAPR Arguments from Bilinear Maps. 620-641 - Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. 642-667 - Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta
:
Statistical Zaps and New Oblivious Transfer Protocols. 668-699
Quantum II
- Veronika Kuchta, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Shifeng Sun:
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security. 703-728 - Yfke Dulek
, Alex B. Grilo, Stacey Jeffery, Christian Majenz
, Christian Schaffner
:
Secure Multi-party Quantum Computation with a Dishonest Majority. 729-758 - Gorjan Alagic, Christian Majenz
, Alexander Russell
:
Efficient Simulation of Random States and Random Unitaries. 759-787 - Gorjan Alagic, Christian Majenz
, Alexander Russell
, Fang Song:
Quantum-Access-Secure Message Authentication via Blind-Unforgeability. 788-817
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.