default search action
37th EUROCRYPT 2018: Tel Aviv, Israel - Part II
- Jesper Buus Nielsen, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II. Lecture Notes in Computer Science 10821, Springer 2018, ISBN 978-3-319-78374-1
Blockchain
- Rafael Pass, Elaine Shi:
Thunderella: Blockchains with Optimistic Instant Confirmation. 3-33 - Christian Badertscher, Juan A. Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. 34-65 - Bernardo David, Peter Gazi, Aggelos Kiayias, Alexander Russell:
Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain. 66-98 - Joël Alwen, Jeremiah Blocki, Krzysztof Pietrzak:
Sustained Space Complexity. 99-130
Multi-collision Resistance
- Itay Berman, Akshay Degwekar, Ron D. Rothblum, Prashant Nalini Vasudevan:
Multi-Collision Resistant Hash Functions and Their Applications. 133-161 - Ilan Komargodski, Moni Naor, Eylon Yogev:
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions. 162-194
Signatures
- Susan Hohenberger, Brent Waters:
Synchronized Aggregate Signatures from the RSA Assumption. 197-229 - Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan:
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures. 230-258
Private Simultaneous Messages
- Benny Applebaum, Thomas Holenstein, Manoj Mishra, Ofer Shayevitz:
The Communication Complexity of Private Simultaneous Messages, Revisited. 261-286 - Amos Beimel, Eyal Kushilevitz, Pnina Nissim:
The Complexity of Multiparty PSM Protocols and Related Models. 287-318
Masking
- Roderick Bloem, Hannes Groß, Rinat Iusupov, Bettina Könighofer, Stefan Mangard, Johannes Winter:
Formal Verification of Masked Hardware Implementations in the Presence of Glitches. 321-353 - Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi:
Masking the GLP Lattice-Based Signature Scheme at Any Order. 354-384 - Vincent Grosso, François-Xavier Standaert:
Masking Proofs Are Tight and How to Exploit it in Security Evaluations. 385-412
Best Young Researcher Paper Award
- Henry Corrigan-Gibbs, Dmitry Kogan:
The Discrete-Logarithm Problem with Preprocessing. 415-447
Best Paper Awards
- Bram Cohen, Krzysztof Pietrzak:
Simple Proofs of Sequential Work. 451-467 - Sanjam Garg, Akshayaram Srinivasan:
Two-Round Multiparty Secure Computation from Minimal Assumptions. 468-499 - Fabrice Benhamouda, Huijia Lin:
k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits. 500-532
Theoretical Multiparty Computation
- Sanjam Garg, Akshayaram Srinivasan:
Adaptively Secure Garbling with Near Optimal Online Complexity. 535-565 - Sanjam Garg, Susumu Kiyoshima, Omkant Pandey:
A New Approach to Black-Box Concurrent Secure Computation. 566-599
Obfuscation
- Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka:
Obfustopia Built on Secret-Key Functional Encryption. 603-648 - Boaz Barak, Zvika Brakerski, Ilan Komargodski, Pravesh K. Kothari:
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation). 649-679
Symmetric Cryptanalysis
- Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. 683-714 - Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin:
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. 715-744 - Gaëtan Leurent, Ferdinand Sibleyras:
The Missing Difference Problem, and Its Applications to Counter Mode Encryption. 745-770 - Bin Zhang, Chao Xu, Willi Meier:
Fast Near Collision Attack on the Grain v1 Stream Cipher. 771-802
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.