


default search action
33rd CRYPTO 2013: Santa Barbara, California, USA
- Ran Canetti, Juan A. Garay: 
 Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II. Lecture Notes in Computer Science 8043, Springer 2013, ISBN 978-3-642-40083-4
Session 11: Implementation-Oriented Protocols
- Yehuda Lindell  : :
 Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries. 1-17
- Yan Huang, Jonathan Katz, David Evans  : :
 Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose. 18-35
- Payman Mohassel, Ben Riva: 
 Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. 36-53
- Vladimir Kolesnikov, Ranjit Kumaresan: 
 Improved OT Extension for Transferring Short Secrets. 54-70
- Justin Thaler: 
 Time-Optimal Interactive Proofs for Circuit Evaluation. 71-89
- Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer  , Madars Virza: , Madars Virza:
 SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. 90-108
Invited Talk: Why the Web Still Runs on RC4
Session 12: Number-Theoretic Hardness
- Faruk Göloglu  , Robert Granger , Robert Granger , Gary McGuire, Jens Zumbrägel: , Gary McGuire, Jens Zumbrägel:
 On the Function Field Sieve and the Impact of Higher Splitting Probabilities - Application to Discrete Logarithms in and. 109-128
- Alex Escala, Gottfried Herold, Eike Kiltz  , Carla Ràfols , Carla Ràfols , Jorge L. Villar , Jorge L. Villar : :
 An Algebraic Framework for Diffie-Hellman Assumptions. 129-147
- Nelly Fazio, Rosario Gennaro, Irippuge Milinda Perera, William E. Skeith III: 
 Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields. 148-165
Session 13: MPC - Foundations
- Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, Brent Waters: 
 Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys. 166-184
- Gil Cohen, Ivan Bjerre Damgård, Yuval Ishai, Jonas Kölker, Peter Bro Miltersen, Ran Raz, Ron D. Rothblum: 
 Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract). 185-202
- Martin Hirt, Christoph Lucas, Ueli Maurer: 
 A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation. 203-219
- Martin Hirt, Christoph Lucas, Ueli Maurer: 
 Erratum: A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation.
- Vipul Goyal, Divya Gupta, Abhishek Jain: 
 What Information Is Leaked under Concurrent Composition? 220-238
Session 14: Codes and Secret Sharing
- Stefan Dziembowski, Tomasz Kazana, Maciej Obremski: 
 Non-malleable Codes from Two-Source Extractors. 239-257
- Matthew K. Franklin, Ran Gelles, Rafail Ostrovsky, Leonard J. Schulman: 
 Optimal Coding for Streaming Authentication and Interactive Communication. 258-276
- Sebastià Martín Molleví, Carles Padró  , An Yang: , An Yang:
 Secret Sharing, Rank Inequalities and Information Inequalities. 277-288
Session 15: Signatures and Authentication
- Benoît Libert, Thomas Peters, Marc Joye, Moti Yung: 
 Linearly Homomorphic Structure-Preserving Signatures and Their Applications. 289-307
- Vadim Lyubashevsky, Daniel Masny: 
 Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs. 308-325
Session 16: Quantum Security
- Frédéric Dupuis, Omar Fawzi  , Stephanie Wehner: , Stephanie Wehner:
 Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling. 326-343
- Anne Broadbent, Gus Gutoski, Douglas Stebila  : :
 Quantum One-Time Programs - (Extended Abstract). 344-360
- Dan Boneh, Mark Zhandry  : :
 Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World. 361-379
- Dominique Unruh  : :
 Everlasting Multi-party Computation. 380-397
Session 17: New Primitives
- Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi: 
 Instantiating Random Oracles via UCEs. 398-415
- Zvika Brakerski, Guy N. Rothblum: 
 Obfuscating Conjunctions. 416-434
Session 18: Functional Encryption I
- Jie Chen, Hoeteck Wee: 
 Fully, (Almost) Tightly Secure IBE and Dual System Groups. 435-460
- Dan Boneh, Ananth Raghunathan, Gil Segev: 
 Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. 461-478
- Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters: 
 Attribute-Based Encryption for Circuits from Multilinear Maps. 479-499
Session 19: Functional Encryption II
- Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee: 
 Functional Encryption: New Perspectives and Lower Bounds. 500-518
- Angelo De Caro, Vincenzo Iovino  , Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano: , Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano:
 On the Achievability of Simulation-Based Security for Functional Encryption. 519-535
- Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich: 
 How to Run Turing Machines on Encrypted Data. 536-553

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














