Search dblp for Publications

export results for "stream:streams/conf/crypto:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@inproceedings{DBLP:conf/crypto/AbrahamJMMS23,
  author       = {Ittai Abraham and
                  Philipp Jovanovic and
                  Mary Maller and
                  Sarah Meiklejohn and
                  Gilad Stern},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and
                  Distributed Key Generation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {39--70},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_2},
  doi          = {10.1007/978-3-031-38557-5\_2},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbrahamJMMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbramWZ23,
  author       = {Damiano Abram and
                  Brent Waters and
                  Mark Zhandry},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Security-Preserving Distributed Samplers: How to Generate Any {CRS}
                  in One Round Without Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {489--514},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_16},
  doi          = {10.1007/978-3-031-38557-5\_16},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbramWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AcharyaHPV23,
  author       = {Anasuya Acharya and
                  Carmit Hazay and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Best of Both Worlds - Revisiting the Spymasters Double Agent Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {328--359},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_11},
  doi          = {10.1007/978-3-031-38557-5\_11},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AcharyaHPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalCO23,
  author       = {Divesh Aggarwal and
                  Eldon Chung and
                  Maciej Obremski},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Extractors: Low Entropy Requirements Colliding with Non-malleability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {580--610},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_19},
  doi          = {10.1007/978-3-031-38545-2\_19},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalCO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalRYY23,
  author       = {Shweta Agrawal and
                  M{\'{e}}lissa Rossi and
                  Anshu Yadav and
                  Shota Yamada},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Constant Input Attribute Based (and Predicate) Encryption from Evasive
                  and Tensor {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {532--564},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_17},
  doi          = {10.1007/978-3-031-38551-3\_17},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalRYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalTY23,
  author       = {Shweta Agrawal and
                  Junichi Tomida and
                  Anshu Yadav},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Attribute-Based Multi-input {FE} (and More) for Attribute-Weighted
                  Sums},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {464--497},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_15},
  doi          = {10.1007/978-3-031-38551-3\_15},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenMT23,
  author       = {Jo{\"{e}}l Alwen and
                  Marta Mularczyk and
                  Yiannis Tselekounis},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Fork-Resilient Continuous Group Key Agreement},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {396--429},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_13},
  doi          = {10.1007/978-3-031-38551-3\_13},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthKL22,
  author       = {Prabhanjan Ananth and
                  Fatih Kaleoglu and
                  Qipeng Liu},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Cloning Games: {A} General Framework for Unclonable Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {66--98},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_3},
  doi          = {10.1007/978-3-031-38554-4\_3},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumNP23,
  author       = {Benny Applebaum and
                  Oded Nir and
                  Benny Pinkas},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {How to Recover a Secret with O(n) Additions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {236--262},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_8},
  doi          = {10.1007/978-3-031-38557-5\_8},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AragonDG23,
  author       = {Nicolas Aragon and
                  Victor Dyseryn and
                  Philippe Gaborit},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Analysis of the Security of the {PSSI} Problem and Cryptanalysis of
                  the Durandal Signature Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {127--149},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_5},
  doi          = {10.1007/978-3-031-38548-3\_5},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AragonDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BachoCLL23,
  author       = {Renas Bacho and
                  Daniel Collins and
                  Chen{-}Da Liu{-}Zhang and
                  Julian Loss},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Network-Agnostic Security Comes (Almost) for Free in {DKG} and {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {71--106},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_3},
  doi          = {10.1007/978-3-031-38557-5\_3},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BachoCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BackendalBGS23,
  author       = {Matilda Backendal and
                  Mihir Bellare and
                  Felix G{\"{u}}nther and
                  Matteo Scarlata},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {When Messages Are Keys: Is {HMAC} a Dual-PRF?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {661--693},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_22},
  doi          = {10.1007/978-3-031-38548-3\_22},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BackendalBGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaeCKPS23,
  author       = {Youngjin Bae and
                  Jung Hee Cheon and
                  Jaehyung Kim and
                  Jai Hyun Park and
                  Damien Stehl{\'{e}}},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {{HERMES:} Efficient Ring Packing Using {MLWE} Ciphertexts and Application
                  to Transciphering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {37--69},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_2},
  doi          = {10.1007/978-3-031-38551-3\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaeCKPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarbosaBDDFGHHLW22,
  author       = {Manuel Barbosa and
                  Gilles Barthe and
                  Christian Doczkal and
                  Jelle Don and
                  Serge Fehr and
                  Benjamin Gr{\'{e}}goire and
                  Yu{-}Hsuan Huang and
                  Andreas H{\"{u}}lsing and
                  Yi Lee and
                  Xiaodi Wu},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts
                  and Dilithium},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {358--389},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_12},
  doi          = {10.1007/978-3-031-38554-4\_12},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BarbosaBDDFGHHLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarbosaDGHMS22,
  author       = {Manuel Barbosa and
                  Fran{\c{c}}ois Dupressoir and
                  Benjamin Gr{\'{e}}goire and
                  Andreas H{\"{u}}lsing and
                  Matthias Meijers and
                  Pierre{-}Yves Strub},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Machine-Checked Security for rmXMSS as in {RFC} 8391 and {\textdollar}{\textbackslash}mathrm
                  \{SPHINCS\{+\}\} {\textdollar}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {421--454},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_14},
  doi          = {10.1007/978-3-031-38554-4\_14},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarbosaDGHMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarootiCCHV23,
  author       = {Khashayar Barooti and
                  Daniel Collins and
                  Simone Colombo and
                  Lo{\"{\i}}s Huguenin{-}Dumittan and
                  Serge Vaudenay},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On Active Attack Detection in Messaging with Immediate Decryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {362--395},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_12},
  doi          = {10.1007/978-3-031-38551-3\_12},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarootiCCHV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekK22,
  author       = {James Bartusek and
                  Dakshita Khurana},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Cryptography with Certified Deletion},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {192--223},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_7},
  doi          = {10.1007/978-3-031-38554-4\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekKP22,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Alexander Poremba},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Publicly-Verifiable Deletion via Target-Collapsing Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {99--128},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_4},
  doi          = {10.1007/978-3-031-38554-4\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekKS22,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Akshayaram Srinivasan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Secure Computation with Shared {EPR} Pairs (Or: How to Teleport in
                  Zero-Knowledge)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {224--257},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_8},
  doi          = {10.1007/978-3-031-38554-4\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaumBGKORS22,
  author       = {Carsten Baum and
                  Lennart Braun and
                  Cyprien Delpech de Saint Guilhem and
                  Michael Kloo{\ss} and
                  Emmanuela Orsini and
                  Lawrence Roy and
                  Peter Scholl},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from
                  VOLE-in-the-Head},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {581--615},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_19},
  doi          = {10.1007/978-3-031-38554-4\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BaumBGKORS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleFLNS23,
  author       = {Christof Beierle and
                  Patrick Felke and
                  Gregor Leander and
                  Patrick Neumann and
                  Lukas Stennes},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On Perfect Linear Approximations and Differentials over Two-Round
                  SPNs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {209--239},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_8},
  doi          = {10.1007/978-3-031-38548-3\_8},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BeierleFLNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelaidCRT23,
  author       = {Sonia Bela{\"{\i}}d and
                  Ga{\"{e}}tan Cassiers and
                  Matthieu Rivain and
                  Abdul Rahman Taleb},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Unifying Freedom and Separation for Tight Probing-Secure Composition},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {440--472},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_15},
  doi          = {10.1007/978-3-031-38548-3\_15},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BelaidCRT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellesMunozUS23,
  author       = {Marta Bell{\'{e}}s{-}Mu{\~{n}}oz and
                  Jorge Jim{\'{e}}nez Urroz and
                  Javier Silva},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Revisiting Cycles of Pairing-Friendly Elliptic Curves},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {3--37},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_1},
  doi          = {10.1007/978-3-031-38545-2\_1},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellesMunozUS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BerndtEFGOS23,
  author       = {Sebastian Berndt and
                  Thomas Eisenbarth and
                  Sebastian Faust and
                  Marc Gourjon and
                  Maximilian Orlt and
                  Okan Seker},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Combined Fault and Leakage Resilience: Composability, Constructions
                  and Compiler},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {377--409},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_13},
  doi          = {10.1007/978-3-031-38548-3\_13},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BerndtEFGOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Beullens23,
  author       = {Ward Beullens},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence
                  Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {101--126},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_4},
  doi          = {10.1007/978-3-031-38548-3\_4},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Beullens23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeullensS22,
  author       = {Ward Beullens and
                  Gregor Seiler},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {LaBRADOR: Compact Proofs for {R1CS} from Module-SIS},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {518--548},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_17},
  doi          = {10.1007/978-3-031-38554-4\_17},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeullensS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BienstockEP23,
  author       = {Alexander Bienstock and
                  Daniel Escudero and
                  Antigoni Polychroniadou},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On Linear Communication Complexity for (Maximally) Fluid {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {263--294},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_9},
  doi          = {10.1007/978-3-031-38557-5\_9},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BienstockEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyPSS23,
  author       = {Nir Bitansky and
                  Omer Paneth and
                  Dana Shamir and
                  Tomer Solomon},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Non-interactive Universal Arguments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {132--158},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_5},
  doi          = {10.1007/978-3-031-38545-2\_5},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BombarCCD23,
  author       = {Maxime Bombar and
                  Geoffroy Couteau and
                  Alain Couvreur and
                  Cl{\'{e}}ment Ducros},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {567--601},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_18},
  doi          = {10.1007/978-3-031-38551-3\_18},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BombarCCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehBCGI23,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Arithmetic Sketching},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {171--202},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_6},
  doi          = {10.1007/978-3-031-38557-5\_6},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehBCGI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BootleCS23,
  author       = {Jonathan Bootle and
                  Alessandro Chiesa and
                  Katerina Sotiraki},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Lattice-Based Succinct Arguments for {NP} with Polylogarithmic-Time
                  Verification},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {227--251},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_8},
  doi          = {10.1007/978-3-031-38545-2\_8},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BootleCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BootleLNS23,
  author       = {Jonathan Bootle and
                  Vadim Lyubashevsky and
                  Ngoc Khanh Nguyen and
                  Alessandro Sorniotti},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {A Framework for Practical Anonymous Credentials from Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {384--417},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_13},
  doi          = {10.1007/978-3-031-38545-2\_13},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BootleLNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BouraDDLN23,
  author       = {Christina Boura and
                  Nicolas David and
                  Patrick Derbez and
                  Gregor Leander and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Differential Meet-In-The-Middle Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {240--272},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_9},
  doi          = {10.1007/978-3-031-38548-3\_9},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BouraDDLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BouvierBCPSVW23,
  author       = {Cl{\'{e}}mence Bouvier and
                  Pierre Briaud and
                  Pyrros Chaidos and
                  L{\'{e}}o Perrin and
                  Robin Salen and
                  Vesselin Velichkov and
                  Danny Willems},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {New Design Techniques for Efficient Arithmetization-Oriented Hash
                  Functions: ttAnemoi Permutations and ttJive Compression Mode},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {507--539},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_17},
  doi          = {10.1007/978-3-031-38548-3\_17},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BouvierBCPSVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Brakerski22,
  author       = {Zvika Brakerski},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Black-Hole Radiation Decoding Is Quantum Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {37--65},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_2},
  doi          = {10.1007/978-3-031-38554-4\_2},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Brakerski22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiBKLP23,
  author       = {Zvika Brakerski and
                  Maya Farber Brodsky and
                  Yael Tauman Kalai and
                  Alex Lombardi and
                  Omer Paneth},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {SNARGs for Monotone Policy Batch {NP}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {252--283},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_9},
  doi          = {10.1007/978-3-031-38545-2\_9},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiBKLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiGKPV22,
  author       = {Zvika Brakerski and
                  Alexandru Gheorghiu and
                  Gregory D. Kahanamoku{-}Meyer and
                  Eitan Porat and
                  Thomas Vidick},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Simple Tests of Quantumness Also Certify Qubits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {162--191},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_6},
  doi          = {10.1007/978-3-031-38554-4\_6},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiGKPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrancoDS23,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Akshayaram Srinivasan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {A Framework for Statistically Sender Private {OT} with Optimal Rate},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {548--576},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_18},
  doi          = {10.1007/978-3-031-38557-5\_18},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrancoDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BraunDO23,
  author       = {Lennart Braun and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Secure Multiparty Computation from Threshold Encryption Based on Class
                  Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {613--645},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_20},
  doi          = {10.1007/978-3-031-38557-5\_20},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BraunDO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CastryckHMMBV23,
  author       = {Wouter Castryck and
                  Marc Houben and
                  Simon{-}Philipp Merz and
                  Marzio Mula and
                  Sam van Buuren and
                  Frederik Vercauteren},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Weak Instances of Class Group Action Based Cryptography via Self-pairings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {762--792},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_25},
  doi          = {10.1007/978-3-031-38548-3\_25},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CastryckHMMBV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChampionW23,
  author       = {Jeffrey Champion and
                  David J. Wu},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Non-interactive Zero-Knowledge from Non-interactive Batch Arguments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {38--71},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_2},
  doi          = {10.1007/978-3-031-38545-2\_2},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChampionW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaseDV23,
  author       = {Melissa Chase and
                  F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic
                  MACs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {418--449},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_14},
  doi          = {10.1007/978-3-031-38545-2\_14},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaseDV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chen22,
  author       = {Yanbo Chen},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {sfDualMS: Efficient Lattice-Based Two-Round Multi-signature with Trapdoor-Free
                  Simulation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {716--747},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_23},
  doi          = {10.1007/978-3-031-38554-4\_23},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Chen22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenCL23,
  author       = {Yu Long Chen and
                  Wonseok Choi and
                  Changmin Lee},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Improved Multi-user Security Using the Squared-Ratio Method},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {694--724},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_23},
  doi          = {10.1007/978-3-031-38545-2\_23},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoudhuriGJJZ23,
  author       = {Arka Rai Choudhuri and
                  Sanjam Garg and
                  Abhishek Jain and
                  Zhengzhong Jin and
                  Jiaheng Zhang},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Correlation Intractability and SNARGs from Sub-exponential {DDH}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {635--668},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_20},
  doi          = {10.1007/978-3-031-38551-3\_20},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoudhuriGJJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChuGRS23,
  author       = {Hien Chu and
                  Paul Gerhart and
                  Tim Ruffing and
                  Dominique Schr{\"{o}}der},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Practical Schnorr Threshold Signatures Without the Algebraic Group
                  Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {743--773},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_24},
  doi          = {10.1007/978-3-031-38557-5\_24},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChuGRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CiampiOSW23,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Hendrik Waldner},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {List Oblivious Transfer and Applications to Round-Optimal Black-Box
                  Multiparty Coin Tossing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {459--488},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_15},
  doi          = {10.1007/978-3-031-38557-5\_15},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CiampiOSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CiniLM23,
  author       = {Valerio Cini and
                  Russell W. F. Lai and
                  Giulio Malavolta},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Lattice-Based Succinct Arguments from Vanishing Polynomials - (Extended
                  Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {72--105},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_3},
  doi          = {10.1007/978-3-031-38545-2\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CiniLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenGZ23,
  author       = {Ran Cohen and
                  Juan A. Garay and
                  Vassilis Zikas},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Completeness Theorems for Adaptively Secure Broadcast},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {3--38},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_1},
  doi          = {10.1007/978-3-031-38557-5\_1},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenGZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauJJQ23,
  author       = {Geoffroy Couteau and
                  Abhishek Jain and
                  Zhengzhong Jin and
                  Willy Quach},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {A Note on Non-interactive Zero-Knowledge from {CDH}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {731--764},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_23},
  doi          = {10.1007/978-3-031-38551-3\_23},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CouteauJJQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CritesKM23,
  author       = {Elizabeth C. Crites and
                  Chelsea Komlo and
                  Mary Maller},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Fully Adaptive Schnorr Threshold Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {678--709},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_22},
  doi          = {10.1007/978-3-031-38557-5\_22},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CritesKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CritesKMTZ23,
  author       = {Elizabeth C. Crites and
                  Chelsea Komlo and
                  Mary Maller and
                  Stefano Tessaro and
                  Chenzhi Zhu},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Snowblind: {A} Threshold Blind Signature in Pairing-Free Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {710--742},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_23},
  doi          = {10.1007/978-3-031-38557-5\_23},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CritesKMTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DachmanSoledGHK22,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Tom Hanson and
                  Hunter Kippen},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Revisiting Security Estimation for {LWE} with Hints from a Geometric
                  Perspective},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {748--781},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_24},
  doi          = {10.1007/978-3-031-38554-4\_24},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DachmanSoledGHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaoIJL23,
  author       = {Quang Dao and
                  Yuval Ishai and
                  Aayush Jain and
                  Huijia Lin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Multi-party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse
                  {LPN}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {315--348},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_11},
  doi          = {10.1007/978-3-031-38545-2\_11},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaoIJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DavidDGIKKLN23,
  author       = {Bernardo David and
                  Giovanni Deligios and
                  Aarushi Goel and
                  Yuval Ishai and
                  Anders Konring and
                  Eyal Kushilevitz and
                  Chen{-}Da Liu{-}Zhang and
                  Varun Narayanan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Perfect {MPC} over Layered Graphs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {360--392},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_12},
  doi          = {10.1007/978-3-031-38557-5\_12},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DavidDGIKKLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaviesFGHHHJ23,
  author       = {Gareth T. Davies and
                  Sebastian H. Faller and
                  Kai Gellert and
                  Tobias Handirk and
                  Julia Hesse and
                  M{\'{a}}t{\'{e}} Horv{\'{a}}th and
                  Tibor Jager},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {330--361},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_11},
  doi          = {10.1007/978-3-031-38551-3\_11},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaviesFGHHHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DeveveyFPS22,
  author       = {Julien Devevey and
                  Pouria Fallahpour and
                  Alain Passel{\`{e}}gue and
                  Damien Stehl{\'{e}}},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {A Detailed Analysis of Fiat-Shamir with Aborts},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {327--357},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_11},
  doi          = {10.1007/978-3-031-38554-4\_11},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DeveveyFPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisFGHP23,
  author       = {Yevgeniy Dodis and
                  Niels Ferguson and
                  Eli Goldin and
                  Peter Hall and
                  Krzysztof Pietrzak},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {514--546},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_17},
  doi          = {10.1007/978-3-031-38545-2\_17},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisFGHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasEP23,
  author       = {L{\'{e}}o Ducas and
                  Thomas Espitau and
                  Eamonn W. Postlethwaite},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Finding Short Integer Solutions When the Modulus Is Small},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {150--176},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_6},
  doi          = {10.1007/978-3-031-38548-3\_6},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DucasEP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasP23,
  author       = {L{\'{e}}o Ducas and
                  Ludo N. Pulles},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Does the Dual-Sieve Attack on Learning with Errors Even Work?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {37--69},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_2},
  doi          = {10.1007/978-3-031-38548-3\_2},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DucasP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DunkelmanKW23,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Ariel Weizman},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Practical-Time Related-Key Attack on {GOST} with Secret S-Boxes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {177--208},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_7},
  doi          = {10.1007/978-3-031-38548-3\_7},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DunkelmanKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFL23,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Tomasz Lizurej},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Individual Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {547--579},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_18},
  doi          = {10.1007/978-3-031-38545-2\_18},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiFL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EsginSLR22,
  author       = {Muhammed F. Esgin and
                  Ron Steinfeld and
                  Dongxi Liu and
                  Sushmita Ruj},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to
                  Rounding and VRFs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {484--517},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_16},
  doi          = {10.1007/978-3-031-38554-4\_16},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EsginSLR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischLV23,
  author       = {Ben Fisch and
                  Zeyu Liu and
                  Psi Vesely},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Orbweaver: Succinct Linear Functional Commitments from Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {106--131},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_4},
  doi          = {10.1007/978-3-031-38545-2\_4},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischLV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FreitagWW23,
  author       = {Cody Freitag and
                  Brent Waters and
                  David J. Wu},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast,
                  and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {498--531},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_16},
  doi          = {10.1007/978-3-031-38551-3\_16},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FreitagWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuchsRD23,
  author       = {Jonathan Fuchs and
                  Yann Rotella and
                  Joan Daemen},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On the Security of Keyed Hashing Based on Public Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {607--627},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_20},
  doi          = {10.1007/978-3-031-38548-3\_20},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FuchsRD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargJMSWZ23,
  author       = {Sanjam Garg and
                  Abhishek Jain and
                  Pratyay Mukherjee and
                  Rohit Sinha and
                  Mingyuan Wang and
                  Yinuo Zhang},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Cryptography with Weights: MPC, Encryption and Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {295--327},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_10},
  doi          = {10.1007/978-3-031-38557-5\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GargJMSWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarimellaRS23,
  author       = {Gayathri Garimella and
                  Mike Rosulek and
                  Jaspal Singh},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Malicious Secure, Structure-Aware Private Set Intersection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {577--610},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_19},
  doi          = {10.1007/978-3-031-38557-5\_19},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarimellaRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaziRR23,
  author       = {Peter Gazi and
                  Ling Ren and
                  Alexander Russell},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Practical Settlement Bounds for Longest-Chain Consensus},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {107--138},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_4},
  doi          = {10.1007/978-3-031-38557-5\_4},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GaziRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GeSX22,
  author       = {Jiangxia Ge and
                  Tianshu Shan and
                  Rui Xue},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection
                  in the Quantum Random Oracle Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {292--324},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_10},
  doi          = {10.1007/978-3-031-38554-4\_10},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GeSX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GellertGJJ23,
  author       = {Kai Gellert and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via
                  Key Confirmation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {297--329},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_10},
  doi          = {10.1007/978-3-031-38551-3\_10},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GellertGJJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GhoshalT23,
  author       = {Ashrujit Ghoshal and
                  Stefano Tessaro},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {The Query-Complexity of Preprocessing Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {482--513},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_16},
  doi          = {10.1007/978-3-031-38545-2\_16},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GhoshalT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Giunta23,
  author       = {Emanuele Giunta},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On the Impossibility of Algebraic {NIZK} in Pairing-Free Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {702--730},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_22},
  doi          = {10.1007/978-3-031-38551-3\_22},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Giunta23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GolovnevGPS23,
  author       = {Alexander Golovnev and
                  Siyao Guo and
                  Spencer Peters and
                  Noah Stephens{-}Davidowitz},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Revisiting Time-Space Tradeoffs for Function Inversion},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {453--481},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_15},
  doi          = {10.1007/978-3-031-38545-2\_15},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GolovnevGPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GolovnevLSTW23,
  author       = {Alexander Golovnev and
                  Jonathan Lee and
                  Srinath T. V. Setty and
                  Justin Thaler and
                  Riad S. Wahby},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Brakedown: Linear-Time and Field-Agnostic SNARKs for {R1CS}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {193--226},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_7},
  doi          = {10.1007/978-3-031-38545-2\_7},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GolovnevLSTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalLM22,
  author       = {Vipul Goyal and
                  Xiao Liang and
                  Giulio Malavolta},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On Concurrent Multi-party Quantum Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {129--161},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_5},
  doi          = {10.1007/978-3-031-38554-4\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalSW23,
  author       = {Vipul Goyal and
                  Akshayaram Srinivasan and
                  Mingyuan Wang},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Reusable Secure Computation in the Plain Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {427--458},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_14},
  doi          = {10.1007/978-3-031-38557-5\_14},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GrassiAHORW23,
  author       = {Lorenzo Grassi and
                  Irati Manterola Ayala and
                  Martha Norberg Hovd and
                  Morten {\O}ygarden and
                  H{\aa}vard Raddum and
                  Qingju Wang},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery
                  Attack on Rubato},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {305--339},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_11},
  doi          = {10.1007/978-3-031-38548-3\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GrassiAHORW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GrassiHRSWW23,
  author       = {Lorenzo Grassi and
                  Yonglin Hao and
                  Christian Rechberger and
                  Markus Schofnegger and
                  Roman Walch and
                  Qingju Wang},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {573--606},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_19},
  doi          = {10.1007/978-3-031-38548-3\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GrassiHRSWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuanKS23,
  author       = {Jiaxin Guan and
                  Alexis Korb and
                  Amit Sahai},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Streaming Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {433--463},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_14},
  doi          = {10.1007/978-3-031-38551-3\_14},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuanKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GunsingBJMS23,
  author       = {Aldo Gunsing and
                  Ritam Bhaumik and
                  Ashwin Jha and
                  Bart Mennink and
                  Yaobin Shen},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Revisiting the Indifferentiability of the Sum of Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {628--660},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_21},
  doi          = {10.1007/978-3-031-38548-3\_21},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GunsingBJMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviIKR23,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Additive Randomized Encodings and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {203--235},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_7},
  doi          = {10.1007/978-3-031-38557-5\_7},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviIKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HanLWG22,
  author       = {Shuai Han and
                  Shengli Liu and
                  Zhedong Wang and
                  Dawu Gu},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Almost Tight Multi-user Security Under Adaptive Corruptions from {LWE}
                  in the Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {682--715},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_22},
  doi          = {10.1007/978-3-031-38554-4\_22},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HanLWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeathKO23,
  author       = {David Heath and
                  Vladimir Kolesnikov and
                  Rafail Ostrovsky},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Tri-State Circuits - {A} Circuit Model that Captures {RAM}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {128--160},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_5},
  doi          = {10.1007/978-3-031-38551-3\_5},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HeathKO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirchDRM23,
  author       = {Solane El Hirch and
                  Joan Daemen and
                  Raghvendra Rohit and
                  Rusydi H. Makarim},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Twin Column Parity Mixers and Gaston - {A} New Mixing Layer and Permutation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {475--506},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_16},
  doi          = {10.1007/978-3-031-38548-3\_16},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirchDRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoffmannMMRSU23,
  author       = {Cl{\'{e}}ment Hoffmann and
                  Pierrick M{\'{e}}aux and
                  Charles Momin and
                  Yann Rotella and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Learning with Physical Rounding for Linear and Quadratic Leakage Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {410--439},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_14},
  doi          = {10.1007/978-3-031-38548-3\_14},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoffmannMMRSU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HofheinzKK23,
  author       = {Dennis Hofheinz and
                  Julia Kastner and
                  Karen Klein},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {The Power of Undirected Rewindings for Adaptive Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {725--758},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_24},
  doi          = {10.1007/978-3-031-38545-2\_24},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HofheinzKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiJLSZ23,
  author       = {Yuval Ishai and
                  Aayush Jain and
                  Paul Lou and
                  Amit Sahai and
                  Mark Zhandry},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Computational Wiretap Coding from Indistinguishability Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {263--293},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_9},
  doi          = {10.1007/978-3-031-38551-3\_9},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiJLSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKNZ23,
  author       = {Yuval Ishai and
                  Mahimna Kelkar and
                  Varun Narayanan and
                  Liav Zafar},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {One-Message Secure Reductions: On the Cost of Converting Correlations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {515--547},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_17},
  doi          = {10.1007/978-3-031-38557-5\_17},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKNZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKSS23,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Round-Optimal Black-Box {MPC} in the Plain Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {393--426},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_13},
  doi          = {10.1007/978-3-031-38557-5\_13},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiOS23,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Akash Shah},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Succinct Arguments for {RAM} Programs via Projection Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {159--192},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_6},
  doi          = {10.1007/978-3-031-38545-2\_6},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JainLLW23,
  author       = {Aayush Jain and
                  Huijia Lin and
                  Ji Luo and
                  Daniel Wichs},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {The Pseudorandom Oracle Model and Ideal Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {233--262},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_8},
  doi          = {10.1007/978-3-031-38551-3\_8},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JainLLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JeudyRS23,
  author       = {Corentin Jeudy and
                  Adeline Roux{-}Langlois and
                  Olivier Sanders},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Lattice Signature with Efficient Protocols, Application to Anonymous
                  Credentials},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {351--383},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_12},
  doi          = {10.1007/978-3-031-38545-2\_12},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JeudyRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KatsumataLLQ23,
  author       = {Shuichi Katsumata and
                  Yi{-}Fu Lai and
                  Jason T. LeGrow and
                  Ling Qin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {{CSI} -Otter: Isogeny-Based (Partially) Blind Signatures from the
                  Class Group Action with a Twist},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {729--761},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_24},
  doi          = {10.1007/978-3-031-38548-3\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KatsumataLLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimLSS22,
  author       = {Duhyeong Kim and
                  Dongwon Lee and
                  Jinyeong Seo and
                  Yongsoo Song},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Toward Practical Lattice-Based Proof of Knowledge from Hint-MLWE},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {549--580},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_18},
  doi          = {10.1007/978-3-031-38554-4\_18},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimLSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimLSS23,
  author       = {Miran Kim and
                  Dongwon Lee and
                  Jinyeong Seo and
                  Yongsoo Song},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Accelerating {HE} Operations from Key Decomposition Technique},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {70--92},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_3},
  doi          = {10.1007/978-3-031-38551-3\_3},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimLSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KleinK23,
  author       = {Ohad Klein and
                  Ilan Komargodski},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing
                  Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {139--170},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_5},
  doi          = {10.1007/978-3-031-38557-5\_5},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KleinK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KondiOR23,
  author       = {Yashvanth Kondi and
                  Claudio Orlandi and
                  Lawrence Roy},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Two-Round Stateless Deterministic Two-Party Schnorr Signatures from
                  Pseudorandom Correlation Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {646--677},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_21},
  doi          = {10.1007/978-3-031-38557-5\_21},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KondiOR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KothapalliP23,
  author       = {Abhiram Kothapalli and
                  Bryan Parno},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Algebraic Reductions of Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {669--701},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_21},
  doi          = {10.1007/978-3-031-38551-3\_21},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KothapalliP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KutylowskiPPYZ23,
  author       = {Miroslaw Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {759--790},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_25},
  doi          = {10.1007/978-3-031-38545-2\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LaiM22,
  author       = {Russell W. F. Lai and
                  Giulio Malavolta},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Lattice-Based Timed Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {782--804},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_25},
  doi          = {10.1007/978-3-031-38554-4\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LaiM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LazzarettiP23,
  author       = {Arthur Lazzaretti and
                  Charalampos Papamanthou},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information
                  Retrieval from {DDH}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {284--314},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_10},
  doi          = {10.1007/978-3-031-38545-2\_10},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LazzarettiP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuGBMI23,
  author       = {Fukang Liu and
                  Lorenzo Grassi and
                  Cl{\'{e}}mence Bouvier and
                  Willi Meier and
                  Takanori Isobe},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Coefficient Grouping for Complex Affine Layers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {540--572},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_18},
  doi          = {10.1007/978-3-031-38548-3\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuGBMI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuP23,
  author       = {Yanyi Liu and
                  Rafael Pass},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {One-Way Functions and the Hardness of (Probabilistic) Time-Bounded
                  Kolmogorov Complexity w.r.t. Samplable Distributions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {645--673},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_21},
  doi          = {10.1007/978-3-031-38545-2\_21},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuPTV23,
  author       = {Tianren Liu and
                  Angelos Pelecanos and
                  Stefano Tessaro and
                  Vinod Vaikuntanathan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Layout Graphs, Random Walks and the t-Wise Independence of {SPN} Block
                  Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {694--726},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_23},
  doi          = {10.1007/978-3-031-38548-3\_23},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuPTV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MasureS23,
  author       = {Lo{\"{\i}}c Masure and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Prouff and Rivain's Formal Security Proof of Masking, Revisited -
                  Tight Bounds in the Noisy Leakage Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {343--376},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_12},
  doi          = {10.1007/978-3-031-38548-3\_12},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MasureS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MathialaganV23,
  author       = {Surya Mathialagan and
                  Neekon Vafa},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {MacORAMa: Optimal Oblivious {RAM} with Integrity},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {95--127},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_4},
  doi          = {10.1007/978-3-031-38551-3\_4},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MathialaganV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicciancioS22,
  author       = {Daniele Micciancio and
                  Mark Schultz},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Error Correction and Ciphertext Quantization in Lattice Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {648--681},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_21},
  doi          = {10.1007/978-3-031-38554-4\_21},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MicciancioS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicheliMPT22,
  author       = {Gabrielle De Micheli and
                  Daniele Micciancio and
                  Alice Pellet{-}Mary and
                  Nam Tran},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Reductions from Module Lattices to Free Module Lattices, and Application
                  to Dequantizing Module-LLL},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {836--865},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_27},
  doi          = {10.1007/978-3-031-38554-4\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MicheliMPT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NewtonR22,
  author       = {Parker Newton and
                  Silas Richelson},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {A Lower Bound for Proving Hardness of Learning with Rounding with
                  Polynomial Modulus},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {805--835},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_26},
  doi          = {10.1007/978-3-031-38554-4\_26},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NewtonR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PanWZ22,
  author       = {Jiaxin Pan and
                  Benedikt Wagner and
                  Runzhi Zeng},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Lattice-Based Authenticated Key Exchange with Tight Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {616--647},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_20},
  doi          = {10.1007/978-3-031-38554-4\_20},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PanWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PersianoY23,
  author       = {Giuseppe Persiano and
                  Kevin Yeo},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Limits of Breach-Resistant and Snapshot-Oblivious RAMs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {161--196},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_6},
  doi          = {10.1007/978-3-031-38551-3\_6},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PersianoY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RaghuramanRT23,
  author       = {Srinivasan Raghuraman and
                  Peter Rindal and
                  Titouan Tanguy},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Expand-Convolute Codes for Pseudorandom Correlation Generators from
                  {LPN}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {602--632},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_19},
  doi          = {10.1007/978-3-031-38551-3\_19},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RaghuramanRT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RyanH23,
  author       = {Keegan Ryan and
                  Nadia Heninger},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Fast Practical Lattice Reduction Through Iterated Compression},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {3--36},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_1},
  doi          = {10.1007/978-3-031-38548-3\_1},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RyanH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Schrottenloher22,
  author       = {Andr{\'{e}} Schrottenloher},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Quantum Linear Key-Recovery Attacks Using the {QFT}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {258--291},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_9},
  doi          = {10.1007/978-3-031-38554-4\_9},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Schrottenloher22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangLHL23,
  author       = {Shichang Wang and
                  Meicheng Liu and
                  Shiqi Hou and
                  Dongdai Lin},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Moving a Step of ChaCha in Syncopated Rhythm},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {273--304},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_10},
  doi          = {10.1007/978-3-031-38548-3\_10},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WangLHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangWW23,
  author       = {Tianrui Wang and
                  Anyu Wang and
                  Xiaoyun Wang},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Exploring Decryption Failures of {BIKE:} New Class of Weak Keys and
                  Key Recovery Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {70--100},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_3},
  doi          = {10.1007/978-3-031-38548-3\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/WangWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WatersW23,
  author       = {Brent Waters and
                  Daniel Wichs},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Universal Amplification of {KDM} Security: From 1-Key Circular to
                  Multi-Key {KDM}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {674--693},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_22},
  doi          = {10.1007/978-3-031-38545-2\_22},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WatersW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/XiangZDDF23,
  author       = {Binwu Xiang and
                  Jiang Zhang and
                  Yi Deng and
                  Yiran Dai and
                  Dengguo Feng},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Fast Blind Rotation for Bootstrapping FHEs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {3--36},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_1},
  doi          = {10.1007/978-3-031-38551-3\_1},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/XiangZDDF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/XiaoD23,
  author       = {Hanshen Xiao and
                  Srinivas Devadas},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {{PAC} Privacy: Automatic Privacy Measurement and Control of Data Processing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {611--644},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_20},
  doi          = {10.1007/978-3-031-38545-2\_20},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/XiaoD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Yeo23,
  author       = {Kevin Yeo},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and
                  Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {197--230},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_7},
  doi          = {10.1007/978-3-031-38551-3\_7},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Yeo23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YuJW22,
  author       = {Yang Yu and
                  Huiwen Jia and
                  Xiaoyun Wang},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {390--420},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_13},
  doi          = {10.1007/978-3-031-38554-4\_13},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YuJW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry22c,
  author       = {Mark Zhandry},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Tracing Quantum State Distinguishers via Backtracking},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {3--36},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_1},
  doi          = {10.1007/978-3-031-38554-4\_1},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ZhangCY22,
  author       = {Kaiyi Zhang and
                  Hongrui Cui and
                  Yu Yu},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Revisiting the Constant-Sum Winternitz One-Time Signature with Applications
                  to SPHINCS\({}^{\mbox{+}}\) and {XMSS}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {455--483},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_15},
  doi          = {10.1007/978-3-031-38554-4\_15},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ZhangCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2023-1,
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5},
  doi          = {10.1007/978-3-031-38557-5},
  isbn         = {978-3-031-38556-8},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2023-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2023-2,
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2},
  doi          = {10.1007/978-3-031-38545-2},
  isbn         = {978-3-031-38544-5},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2023-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2023-3,
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3},
  doi          = {10.1007/978-3-031-38548-3},
  isbn         = {978-3-031-38547-6},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2023-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2023-4,
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3},
  doi          = {10.1007/978-3-031-38551-3},
  isbn         = {978-3-031-38550-6},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2023-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2023-5,
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4},
  doi          = {10.1007/978-3-031-38554-4},
  isbn         = {978-3-031-38553-7},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2023-5.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaEKKR22,
  author       = {Michel Abdalla and
                  Thorsten Eisenhofer and
                  Eike Kiltz and
                  Sabrina Kunzweiler and
                  Doreen Riepel},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Password-Authenticated Key Exchange from Group Actions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {699--728},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_24},
  doi          = {10.1007/978-3-031-15979-4\_24},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaEKKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbramDOS22,
  author       = {Damiano Abram and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Peter Scholl},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {An Algebraic Framework for Silent Preprocessing with Trustless Setup
                  and Active Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {421--452},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_15},
  doi          = {10.1007/978-3-031-15985-5\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbramDOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalYY22,
  author       = {Shweta Agrawal and
                  Anshu Yadav and
                  Shota Yamada},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Multi-input Attribute Based Encryption and Predicate Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {590--621},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_21},
  doi          = {10.1007/978-3-031-15802-5\_21},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AkshimaGL22,
  author       = {Akshima and
                  Siyao Guo and
                  Qipeng Liu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Time-Space Lower Bounds for Finding Collisions in Merkle-Damg{\aa}rd
                  Hash Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {192--221},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_7},
  doi          = {10.1007/978-3-031-15982-4\_7},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AkshimaGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtCLMT22,
  author       = {Martin R. Albrecht and
                  Valerio Cini and
                  Russell W. F. Lai and
                  Giulio Malavolta and
                  Sri Aravinda Krishnan Thyagarajan},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively
                  Composable - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {102--132},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_4},
  doi          = {10.1007/978-3-031-15979-4\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AlbrechtCLMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenJM22,
  author       = {Jo{\"{e}}l Alwen and
                  Daniel Jost and
                  Marta Mularczyk},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {On the Insider Security of {MLS}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {34--68},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_2},
  doi          = {10.1007/978-3-031-15979-4\_2},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenJM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthKLLZ22,
  author       = {Prabhanjan Ananth and
                  Fatih Kaleoglu and
                  Xingjian Li and
                  Qipeng Liu and
                  Mark Zhandry},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {On the Feasibility of Unclonable Encryption, and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {212--241},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_8},
  doi          = {10.1007/978-3-031-15979-4\_8},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthKLLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthQY22,
  author       = {Prabhanjan Ananth and
                  Luowen Qian and
                  Henry Yuen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Cryptography from Pseudorandom Quantum States},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {208--236},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_8},
  doi          = {10.1007/978-3-031-15802-5\_8},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthQY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumIKP22,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Or Karni and
                  Arpita Patra},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Quadratic Multiparty Randomized Encodings Beyond Honest Majority and
                  Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {453--482},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_16},
  doi          = {10.1007/978-3-031-15985-5\_16},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumIKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumKP22,
  author       = {Benny Applebaum and
                  Eliran Kachlon and
                  Arpita Patra},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two
                  Rounds: Trading NIZKs with Honest Majority - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {33--56},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_2},
  doi          = {10.1007/978-3-031-15985-5\_2},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AttemaF22,
  author       = {Thomas Attema and
                  Serge Fehr},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Parallel Repetition of (k\({}_{\mbox{1, {\dj}ots}}\) , k\({}_{\mbox{{\(\mu\)}
                  }}\))-Special-Sound Multi-round Interactive Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {415--443},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_15},
  doi          = {10.1007/978-3-031-15802-5\_15},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AttemaF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AustrinCCFLM22,
  author       = {Per Austrin and
                  Hao Chung and
                  Kai{-}Min Chung and
                  Shiuan Fu and
                  Yao{-}Ting Lin and
                  Mohammad Mahmoody},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {On the Impossibility of Key Agreements from Quantum Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {165--194},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_6},
  doi          = {10.1007/978-3-031-15979-4\_6},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AustrinCCFLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaenaBCPSV22,
  author       = {John Baena and
                  Pierre Briaud and
                  Daniel Cabarcas and
                  Ray A. Perlner and
                  Daniel Smith{-}Tone and
                  Javier A. Verbel},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Improving Support-Minors Rank Attacks: Applications to G{\dj}isplaystyle
                  eMSS and Rainbow},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {376--405},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_13},
  doi          = {10.1007/978-3-031-15982-4\_13},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaenaBCPSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BallDL22,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Julian Loss},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {(Nondeterministic) Hardness vs. Non-malleability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {148--177},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_6},
  doi          = {10.1007/978-3-031-15802-5\_6},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BallDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaoGST22,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Danping Shi and
                  Yi Tu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security
                  of AES-like Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {64--93},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_3},
  doi          = {10.1007/978-3-031-15802-5\_3},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BaoGST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekKLMMVVY22,
  author       = {James Bartusek and
                  Yael Tauman Kalai and
                  Alex Lombardi and
                  Fermi Ma and
                  Giulio Malavolta and
                  Vinod Vaikuntanathan and
                  Thomas Vidick and
                  Lisa Yang},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Succinct Classical Verification of Quantum Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_7},
  doi          = {10.1007/978-3-031-15979-4\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekKLMMVVY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaumBMS22,
  author       = {Carsten Baum and
                  Lennart Braun and
                  Alexander Munch{-}Hansen and
                  Peter Scholl},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Moz{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2k\}{\textdollar}arella:
                  Efficient Vector-OLE and Zero-Knowledge Proofs over {\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}\{2k\}{\textdollar}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {329--358},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_12},
  doi          = {10.1007/978-3-031-15985-5\_12},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BaumBMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleBFL22,
  author       = {Christof Beierle and
                  Tim Beyne and
                  Patrick Felke and
                  Gregor Leander},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Constructing and Deconstructing Intentional Weaknesses in Symmetric
                  Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {748--778},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_25},
  doi          = {10.1007/978-3-031-15982-4\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeierleBFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareCKMTZ22,
  author       = {Mihir Bellare and
                  Elizabeth C. Crites and
                  Chelsea Komlo and
                  Mary Maller and
                  Stefano Tessaro and
                  Chenzhi Zhu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Better than Advertised Security for Non-interactive Threshold Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {517--550},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_18},
  doi          = {10.1007/978-3-031-15985-5\_18},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareCKMTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Beullens22,
  author       = {Ward Beullens},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Breaking Rainbow Takes a Weekend on a Laptop},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {464--479},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_16},
  doi          = {10.1007/978-3-031-15979-4\_16},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Beullens22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeyneC22,
  author       = {Tim Beyne and
                  Yu Long Chen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Provably Secure Reflection Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {234--263},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_9},
  doi          = {10.1007/978-3-031-15985-5\_9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BeyneC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeyneR22,
  author       = {Tim Beyne and
                  Vincent Rijmen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Differential Cryptanalysis in the Fixed-Key Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {687--716},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_23},
  doi          = {10.1007/978-3-031-15982-4\_23},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BeyneR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BienstockFGMR22,
  author       = {Alexander Bienstock and
                  Jaiden Fairoze and
                  Sanjam Garg and
                  Pratyay Mukherjee and
                  Srinivasan Raghuraman},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {A More Complete Analysis of the Signal Double Ratchet Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {784--813},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_27},
  doi          = {10.1007/978-3-031-15802-5\_27},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BienstockFGMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyBK22,
  author       = {Nir Bitansky and
                  Zvika Brakerski and
                  Yael Tauman Kalai},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Constructive Post-Quantum Reductions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {654--683},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_22},
  doi          = {10.1007/978-3-031-15982-4\_22},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyF22,
  author       = {Nir Bitansky and
                  Sapir Freizeit},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Statistically Sender-Private {OT} from {LPN} and Derandomization},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {625--653},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_21},
  doi          = {10.1007/978-3-031-15982-4\_21},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlockiH22,
  author       = {Jeremiah Blocki and
                  Blake Holman},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Sustained Space and Cumulative Complexity Trade-Offs for Data-Dependent
                  Memory-Hard Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {222--251},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_8},
  doi          = {10.1007/978-3-031-15982-4\_8},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BlockiH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BombarCD22,
  author       = {Maxime Bombar and
                  Alain Couvreur and
                  Thomas Debris{-}Alazard},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {On Codes and Learning with Errors over Function Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {513--540},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_18},
  doi          = {10.1007/978-3-031-15979-4\_18},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BombarCD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehK22,
  author       = {Dan Boneh and
                  Chelsea Komlo},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Threshold Signatures with Private Accountability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {551--581},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_19},
  doi          = {10.1007/978-3-031-15985-5\_19},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoschiniTT22,
  author       = {Cecilia Boschini and
                  Akira Takahashi and
                  Mehdi Tibouchi},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {276--305},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_10},
  doi          = {10.1007/978-3-031-15979-4\_10},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BoschiniTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoudgoustGP22,
  author       = {Katharina Boudgoust and
                  Erell Gachon and
                  Alice Pellet{-}Mary},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde
                  Knapsack Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {480--509},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_17},
  doi          = {10.1007/978-3-031-15979-4\_17},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoudgoustGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKRS22,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Nicolas Resch and
                  Peter Scholl},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Correlated Pseudorandomness from Expand-Accumulate Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {603--633},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_21},
  doi          = {10.1007/978-3-031-15979-4\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCGIKRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleGIK22,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Victor I. Kolobov},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Programmable Distributed Point Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_5},
  doi          = {10.1007/978-3-031-15985-5\_5},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleGIK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanaleLS22,
  author       = {Federico Canale and
                  Gregor Leander and
                  Lukas Stennes},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized
                  Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {779--808},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_26},
  doi          = {10.1007/978-3-031-15982-4\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanaleLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiJSV22,
  author       = {Ran Canetti and
                  Palak Jain and
                  Marika Swanberg and
                  Mayank Varia},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Universally Composable End-to-End Secure Messaging},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_1},
  doi          = {10.1007/978-3-031-15979-4\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiJSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CaoX22,
  author       = {Shujiao Cao and
                  Rui Xue},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't
                  Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash
                  Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {564--595},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_19},
  doi          = {10.1007/978-3-031-15982-4\_19},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CaoX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chairattana-Apirom22,
  author       = {Rutchathon Chairattana{-}Apirom and
                  Lucjan Hanzlik and
                  Julian Loss and
                  Anna Lysyanskaya and
                  Benedikt Wagner},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance
                  Cut-and-Choose and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_1},
  doi          = {10.1007/978-3-031-15982-4\_1},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Chairattana-Apirom22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChandranKOS22,
  author       = {Nishanth Chandran and
                  Bhavana Kanukurthi and
                  Sai Lakshmi Bhavana Obbattu and
                  Sruthi Sekar},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Short Leakage Resilient and Non-malleable Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {178--207},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_7},
  doi          = {10.1007/978-3-031-15802-5\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChandranKOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChiaCLY22,
  author       = {Nai{-}Hui Chia and
                  Kai{-}Min Chung and
                  Xiao Liang and
                  Takashi Yamakawa},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Post-quantum Simulatable Extraction with Minimal Assumptions: Black-Box
                  and Constant-Round},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {533--563},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_18},
  doi          = {10.1007/978-3-031-15982-4\_18},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ChiaCLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenN22,
  author       = {Shahar P. Cohen and
                  Moni Naor},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Low Communication Complexity Protocols, Collision Resistant Hash Functions
                  and Secret Key-Agreement Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {252--281},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_9},
  doi          = {10.1007/978-3-031-15982-4\_9},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CremersNPR22,
  author       = {Cas Cremers and
                  Moni Naor and
                  Shahar Paz and
                  Eyal Ronen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {{CHIP} and {CRISP:} Protecting All Parties Against Compromise Through
                  Identity-Binding PAKEs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {668--698},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_23},
  doi          = {10.1007/978-3-031-15979-4\_23},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CremersNPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DegabrieleK22,
  author       = {Jean Paul Degabriele and
                  Vukasin Karadzic},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient
                  Channels},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {264--295},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_10},
  doi          = {10.1007/978-3-031-15985-5\_10},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DegabrieleK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DittmerILO22,
  author       = {Samuel Dittmer and
                  Yuval Ishai and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Authenticated Garbling from Simple Correlations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {57--87},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_3},
  doi          = {10.1007/978-3-031-15985-5\_3},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DittmerILO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DonFMS22,
  author       = {Jelle Don and
                  Serge Fehr and
                  Christian Majenz and
                  Christian Schaffner},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Efficient NIZKs and Signatures from Commit-and-Open Protocols in the
                  {QROM}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {729--757},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_25},
  doi          = {10.1007/978-3-031-15979-4\_25},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DonFMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DongGLP22,
  author       = {Xiaoyang Dong and
                  Jian Guo and
                  Shun Li and
                  Phuong Pham},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Triangulating Rebound Attack on AES-like Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {94--124},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_4},
  doi          = {10.1007/978-3-031-15802-5\_4},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DongGLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DuGG22,
  author       = {Yang Du and
                  Daniel Genkin and
                  Paul Grubbs},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {152--181},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_6},
  doi          = {10.1007/978-3-031-15985-5\_6},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DuGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EscuderoXY22,
  author       = {Daniel Escudero and
                  Chaoping Xing and
                  Chen Yuan},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {More Efficient Dishonest Majority Secure Computation over {\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}\{2k\}{\textdollar} via Galois Rings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {383--412},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_14},
  doi          = {10.1007/978-3-031-15802-5\_14},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EscuderoXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EspitauTWY22,
  author       = {Thomas Espitau and
                  Mehdi Tibouchi and
                  Alexandre Wallet and
                  Yang Yu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Shorter Hash-and-Sign Lattice-Based Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {245--275},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_9},
  doi          = {10.1007/978-3-031-15979-4\_9},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/EspitauTWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EsserMVW22,
  author       = {Andre Esser and
                  Alexander May and
                  Javier A. Verbel and
                  Weiqiang Wen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Partial Key Exposure Attacks on BIKE, Rainbow and {NTRU}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {346--375},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_12},
  doi          = {10.1007/978-3-031-15982-4\_12},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EsserMVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FeneuilJR22,
  author       = {Thibauld Feneuil and
                  Antoine Joux and
                  Matthieu Rivain},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {541--572},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_19},
  doi          = {10.1007/978-3-031-15979-4\_19},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FeneuilJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FernandoGKS22,
  author       = {Rex Fernando and
                  Yuval Gelles and
                  Ilan Komargodski and
                  Elaine Shi},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Maliciously Secure Massively Parallel Computation for All-but-One
                  Corruptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {688--718},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_24},
  doi          = {10.1007/978-3-031-15802-5\_24},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FernandoGKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FitziKPR22,
  author       = {Matthias Fitzi and
                  Aggelos Kiayias and
                  Giorgos Panagiotakos and
                  Alexander Russell},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - {A}
                  Provably Secure Blockchain Protocol},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {339--369},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_12},
  doi          = {10.1007/978-3-031-15979-4\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FitziKPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FreitagGK22,
  author       = {Cody Freitag and
                  Ashrujit Ghoshal and
                  Ilan Komargodski},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for
                  Short Collisions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {131--160},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_5},
  doi          = {10.1007/978-3-031-15982-4\_5},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FreitagGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarimellaRS22,
  author       = {Gayathri Garimella and
                  Mike Rosulek and
                  Jaspal Singh},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Structure-Aware Private Set Intersection, with Applications to Fuzzy
                  Matching},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {323--352},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_12},
  doi          = {10.1007/978-3-031-15802-5\_12},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarimellaRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GhoshalK22,
  author       = {Ashrujit Ghoshal and
                  Ilan Komargodski},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damg{\aa}rd
                  Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {161--191},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_6},
  doi          = {10.1007/978-3-031-15982-4\_6},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GhoshalK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalIS22,
  author       = {Vipul Goyal and
                  Yuval Ishai and
                  Yifan Song},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Tight Bounds on the Randomness Complexity of Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {483--513},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_17},
  doi          = {10.1007/978-3-031-15985-5\_17},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalIS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalPS22,
  author       = {Vipul Goyal and
                  Antigoni Polychroniadou and
                  Yifan Song},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Sharing Transformation and Dishonest Majority {MPC} with Packed Secret
                  Sharing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_1},
  doi          = {10.1007/978-3-031-15985-5\_1},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalV22,
  author       = {Rishab Goyal and
                  Vinod Vaikuntanathan},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Locally Verifiable Signature and Key Aggregation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {761--791},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_26},
  doi          = {10.1007/978-3-031-15979-4\_26},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Gunsing22,
  author       = {Aldo Gunsing},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Block-Cipher-Based Tree Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {205--233},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_8},
  doi          = {10.1007/978-3-031-15985-5\_8},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Gunsing22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaitnerNY22,
  author       = {Iftach Haitner and
                  Daniel Nukrai and
                  Eylon Yogev},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Lower Bound on SNARGs in the Random Oracle Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {97--127},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_4},
  doi          = {10.1007/978-3-031-15982-4\_4},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/HaitnerNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirokaMNY22,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Certified Everlasting Zero-Knowledge Proof for {QMA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {239--268},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_9},
  doi          = {10.1007/978-3-031-15802-5\_9},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirokaMNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoffmannHKKP22,
  author       = {Charlotte Hoffmann and
                  Pavel Hub{\'{a}}cek and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Practical Statistically-Sound Proofs of Exponentiation in Any Group},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {370--399},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_13},
  doi          = {10.1007/978-3-031-15979-4\_13},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/HoffmannHKKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HolmgrenLTW22,
  author       = {Justin Holmgren and
                  Minghao Liu and
                  LaKyah Tyner and
                  Daniel Wichs},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Nearly Optimal Property Preserving Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {473--502},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_16},
  doi          = {10.1007/978-3-031-15982-4\_16},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HolmgrenLTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HolmgrenR22,
  author       = {Justin Holmgren and
                  Ron D. Rothblum},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Faster Sounder Succinct Arguments and sfIOPs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {474--503},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_17},
  doi          = {10.1007/978-3-031-15802-5\_17},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HolmgrenR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HulsingMS22,
  author       = {Andreas H{\"{u}}lsing and
                  Matthias Meijers and
                  Pierre{-}Yves Strub},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {622--653},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_22},
  doi          = {10.1007/978-3-031-15802-5\_22},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/HulsingMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKLS22,
  author       = {Yuval Ishai and
                  Alexis Korb and
                  Paul Lou and
                  Amit Sahai},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Beyond the Csisz{\'{a}}r-Korner Bound: Best-Possible Wiretap
                  Coding via Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {573--602},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_20},
  doi          = {10.1007/978-3-031-15979-4\_20},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimLP22,
  author       = {Allen Kim and
                  Xiao Liang and
                  Omkant Pandey},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {A New Approach to Efficient Non-Malleable Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {389--418},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_14},
  doi          = {10.1007/978-3-031-15985-5\_14},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KimLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kiyoshima22,
  author       = {Susumu Kiyoshima},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless
                  Multi-Collision-Resistant Hash},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {444--473},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_16},
  doi          = {10.1007/978-3-031-15802-5\_16},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kiyoshima22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KomargodskiMSW22,
  author       = {Ilan Komargodski and
                  Shin'ichiro Matsuo and
                  Elaine Shi and
                  Ke Wu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {log \({}^{\mbox{*}}\)-Round Game-Theoretically-Fair Leader Election},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {409--438},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_14},
  doi          = {10.1007/978-3-031-15982-4\_14},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KomargodskiMSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KothapalliST22,
  author       = {Abhiram Kothapalli and
                  Srinath T. V. Setty and
                  Ioanna Tzialla},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Nova: Recursive Zero-Knowledge Arguments from Folding Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {359--388},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_13},
  doi          = {10.1007/978-3-031-15985-5\_13},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KothapalliST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LefevreM22,
  author       = {Charlotte Lefevre and
                  Bart Mennink},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Tight Preimage Resistance of the Sponge Construction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {185--204},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_7},
  doi          = {10.1007/978-3-031-15985-5\_7},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LefevreM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiMSS22,
  author       = {Baiyu Li and
                  Daniele Micciancio and
                  Mark Schultz and
                  Jessica Sorrell},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Securing Approximate Homomorphic Encryption Using Differential Privacy},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {560--589},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_20},
  doi          = {10.1007/978-3-031-15802-5\_20},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LiMSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinL22,
  author       = {Huijia Lin and
                  Tianren Liu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Two-Round {MPC} Without Round Collapsing Revisited - Towards Efficient
                  Malicious Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {353--382},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_13},
  doi          = {10.1007/978-3-031-15802-5\_13},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuT22,
  author       = {Zeyu Liu and
                  Eran Tromer},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Oblivious Message Retrieval},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {753--783},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_26},
  doi          = {10.1007/978-3-031-15802-5\_26},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LyubashevskyNP22,
  author       = {Vadim Lyubashevsky and
                  Ngoc Khanh Nguyen and
                  Maxime Plan{\c{c}}on},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler,
                  and More General},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {71--101},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_3},
  doi          = {10.1007/978-3-031-15979-4\_3},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LyubashevskyNP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MattNT22,
  author       = {Christian Matt and
                  Jesper Buus Nielsen and
                  S{\o}ren Eller Thomsen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Formalizing Delayed Adaptive Corruptions and the Security of Flooding
                  Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {400--430},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_14},
  doi          = {10.1007/978-3-031-15979-4\_14},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MattNT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MinaudR22,
  author       = {Brice Minaud and
                  Michael Reichle},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Dynamic Local Searchable Symmetric Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {91--120},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_4},
  doi          = {10.1007/978-3-031-15985-5\_4},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MinaudR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MorimaeY22,
  author       = {Tomoyuki Morimae and
                  Takashi Yamakawa},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Quantum Commitments and Signatures Without One-Way Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {269--295},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_10},
  doi          = {10.1007/978-3-031-15802-5\_10},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MorimaeY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaitoSS22,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Sugawara},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Secret Can Be Public: Low-Memory {AEAD} Mode for High-Order Masking},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {315--345},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_11},
  doi          = {10.1007/978-3-031-15982-4\_11},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/NaitoSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NassarR22,
  author       = {Shafik Nassar and
                  Ron D. Rothblum},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Succinct Interactive Oracle Proofs: Applications and Limitations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {504--532},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_18},
  doi          = {10.1007/978-3-031-15802-5\_18},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/NassarR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NguyenGSY22,
  author       = {Khoa Nguyen and
                  Fuchun Guo and
                  Willy Susilo and
                  Guomin Yang},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Multimodal Private Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {792--822},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_27},
  doi          = {10.1007/978-3-031-15979-4\_27},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/NguyenGSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NguyenS22,
  author       = {Ngoc Khanh Nguyen and
                  Gregor Seiler},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Practical Sublinear Proofs for {R1CS} from Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {133--162},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_5},
  doi          = {10.1007/978-3-031-15979-4\_5},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NguyenS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NielsenRO22,
  author       = {Jesper Buus Nielsen and
                  Jo{\~{a}}o Ribeiro and
                  Maciej Obremski},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {127--147},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_5},
  doi          = {10.1007/978-3-031-15802-5\_5},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/NielsenRO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NiuSLL22,
  author       = {Zhongfeng Niu and
                  Siwei Sun and
                  Yunwen Liu and
                  Chao Li},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Rotational Differential-Linear Distinguishers of {ARX} Ciphers with
                  Arbitrary Output Linear Masks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_1},
  doi          = {10.1007/978-3-031-15802-5\_1},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NiuSLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PinoK22,
  author       = {Rafa{\"{e}}l del Pino and
                  Shuichi Katsumata},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {A New Framework for More Efficient Round-Optimal Lattice-Based (Partially)
                  Blind Signature via Trapdoor Sampling},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {306--336},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_11},
  doi          = {10.1007/978-3-031-15979-4\_11},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PinoK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RachuriS22,
  author       = {Rahul Rachuri and
                  Peter Scholl},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Le Mans: Dynamic and Fluid {MPC} for Dishonest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {719--749},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_25},
  doi          = {10.1007/978-3-031-15802-5\_25},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/RachuriS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RaneaVP22,
  author       = {Adri{\'{a}}n Ranea and
                  Joachim Vandersmissen and
                  Bart Preneel},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Implicit White-Box Implementations: White-Boxing {ARX} Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_2},
  doi          = {10.1007/978-3-031-15802-5\_2},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/RaneaVP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RothblumV22,
  author       = {Ron D. Rothblum and
                  Prashant Nalini Vasudevan},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Collision-Resistance from Multi-Collision-Resistance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {503--529},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_17},
  doi          = {10.1007/978-3-031-15982-4\_17},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/RothblumV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Roy22,
  author       = {Lawrence Roy},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {SoftSpokenOT: Quieter {OT} Extension from Small-Field Silent {VOLE}
                  in the Minicrypt Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {657--687},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_23},
  doi          = {10.1007/978-3-031-15802-5\_23},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Roy22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SantosCS22,
  author       = {Maria Corte{-}Real Santos and
                  Craig Costello and
                  Jia Shi},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Accelerating the Delfs-Galbraith Algorithm with Fast Subfield Root
                  Detection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {285--314},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_10},
  doi          = {10.1007/978-3-031-15982-4\_10},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/SantosCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SchrottenloherS22,
  author       = {Andr{\'{e}} Schrottenloher and
                  Marc Stevens},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Simplified {MITM} Modeling for Permutations: New (Quantum) Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {717--747},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_24},
  doi          = {10.1007/978-3-031-15982-4\_24},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/SchrottenloherS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shmueli22,
  author       = {Omri Shmueli},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Semi-quantum Tokenized Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {296--319},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_11},
  doi          = {10.1007/978-3-031-15802-5\_11},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Shmueli22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Tsabary22,
  author       = {Rotem Tsabary},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Candidate Witness Encryption from Lattice Techniques},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {535--559},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_19},
  doi          = {10.1007/978-3-031-15802-5\_19},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Tsabary22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TsimosLP22,
  author       = {Georgios Tsimos and
                  Julian Loss and
                  Charalampos Papamanthou},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Gossiping for Communication-Efficient Broadcast},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {439--469},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_15},
  doi          = {10.1007/978-3-031-15982-4\_15},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/TsimosLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WatersW22,
  author       = {Brent Waters and
                  David J. Wu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {433--463},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_15},
  doi          = {10.1007/978-3-031-15979-4\_15},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WatersW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/XieZS22,
  author       = {Tiancheng Xie and
                  Yupeng Zhang and
                  Dawn Song},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Orion: Zero Knowledge Proof with Linear Prover Time},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {299--328},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5\_11},
  doi          = {10.1007/978-3-031-15985-5\_11},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/XieZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YangYAS22,
  author       = {Rupeng Yang and
                  Zuoxia Yu and
                  Man Ho Au and
                  Willy Susilo},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Public-Key Watermarking Schemes for Pseudorandom Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {637--667},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_22},
  doi          = {10.1007/978-3-031-15979-4\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/YangYAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry22,
  author       = {Mark Zhandry},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Augmented Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {35--65},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_2},
  doi          = {10.1007/978-3-031-15982-4\_2},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry22a,
  author       = {Mark Zhandry},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {To Label, or Not To Label (in Generic Groups)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {66--96},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_3},
  doi          = {10.1007/978-3-031-15982-4\_3},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry22b,
  author       = {Mark Zhandry},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {New Constructions of Collapsing Hashes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {596--624},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_20},
  doi          = {10.1007/978-3-031-15982-4\_20},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2022-1,
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5},
  doi          = {10.1007/978-3-031-15802-5},
  isbn         = {978-3-031-15801-8},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2022-2,
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4},
  doi          = {10.1007/978-3-031-15979-4},
  isbn         = {978-3-031-15978-7},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2022-3,
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4},
  doi          = {10.1007/978-3-031-15982-4},
  isbn         = {978-3-031-15981-7},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2022-4,
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5},
  doi          = {10.1007/978-3-031-15985-5},
  isbn         = {978-3-031-15984-8},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2022-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AaronsonLLZZ21,
  author       = {Scott Aaronson and
                  Jiahui Liu and
                  Qipeng Liu and
                  Mark Zhandry and
                  Ruizhe Zhang},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {New Approaches for Quantum Copy-Protection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {526--555},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_19},
  doi          = {10.1007/978-3-030-84242-0\_19},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AaronsonLLZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGM21,
  author       = {Shweta Agrawal and
                  Shafi Goldwasser and
                  Saleet Mossel},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Deniable Fully Homomorphic Encryption from Learning with Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {641--670},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_22},
  doi          = {10.1007/978-3-030-84245-1\_22},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGT21,
  author       = {Shweta Agrawal and
                  Rishab Goyal and
                  Junichi Tomida},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Multi-input Quadratic Functional Encryption from Pairings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {208--238},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_8},
  doi          = {10.1007/978-3-030-84259-8\_8},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalIKNPPR21,
  author       = {Shweta Agrawal and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Varun Narayanan and
                  Manoj Prabhakaran and
                  Vinod M. Prabhakaran and
                  Alon Rosen},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Secure Computation from One-Way Noisy Communication, or: Anti-correlation
                  via Anti-concentration},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {124--154},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_5},
  doi          = {10.1007/978-3-030-84245-1\_5},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalIKNPPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalMVY21,
  author       = {Shweta Agrawal and
                  Monosij Maitra and
                  Narasimha Sai Vempati and
                  Shota Yamada},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Functional Encryption for Turing Machines with Dynamic Bounded Collusion
                  from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {239--269},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_9},
  doi          = {10.1007/978-3-030-84259-8\_9},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalMVY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlagicBDS21,
  author       = {Gorjan Alagic and
                  Zvika Brakerski and
                  Yfke Dulek and
                  Christian Schaffner},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Impossibility of Quantum Virtual Black-Box Obfuscation of Classical
                  Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {497--525},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_18},
  doi          = {10.1007/978-3-030-84242-0\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlagicBDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtBLR21,
  author       = {Martin R. Albrecht and
                  Shi Bai and
                  Jianwei Li and
                  Joe Rowell},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Lattice Reduction with Approximate Enumeration Oracles - Practical
                  Algorithms and Concrete Performance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {732--759},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_25},
  doi          = {10.1007/978-3-030-84245-1\_25},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlbrechtBLR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtL21,
  author       = {Martin R. Albrecht and
                  Russell W. F. Lai},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments
                  over Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {519--548},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_18},
  doi          = {10.1007/978-3-030-84245-1\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlbrechtL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlonCCHLS21,
  author       = {Bar Alon and
                  Hao Chung and
                  Kai{-}Min Chung and
                  Mi{-}Ying Huang and
                  Yi Lee and
                  Yu{-}Ching Shen},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Round Efficient Secure Multiparty Quantum Computation with Identifiable
                  Abort},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {436--466},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_16},
  doi          = {10.1007/978-3-030-84242-0\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AlonCCHLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlperB21,
  author       = {Handan Kilin{\c{c}} Alper and
                  Jeffrey Burdges},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Two-Round Trip Schnorr Multi-signatures via Delinearized Witnesses},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {157--188},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_7},
  doi          = {10.1007/978-3-030-84242-0\_7},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlperB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthCP21,
  author       = {Prabhanjan Ananth and
                  Kai{-}Min Chung and
                  Rolando L. La Placa},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {On the Concurrent Composition of Quantum Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {346--374},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_13},
  doi          = {10.1007/978-3-030-84242-0\_13},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumN21,
  author       = {Benny Applebaum and
                  Oded Nir},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Upslices, Downslices, and Secret-Sharing with Complexity of 1.5\({}^{\mbox{n}}\)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {627--655},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_21},
  doi          = {10.1007/978-3-030-84252-9\_21},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AsharovKLS21,
  author       = {Gilad Asharov and
                  Ilan Komargodski and
                  Wei{-}Kai Lin and
                  Elaine Shi},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Oblivious {RAM} with Worst-Case Logarithmic Overhead},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {610--640},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_21},
  doi          = {10.1007/978-3-030-84259-8\_21},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AsharovKLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AttemaCF21,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Serge Fehr},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Compressing Proofs of k-Out-Of-n Partial Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {65--91},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_3},
  doi          = {10.1007/978-3-030-84259-8\_3},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AttemaCF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AttemaCK21,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Lisa Kohl},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {A Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocol
                  Theory for Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {549--579},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_19},
  doi          = {10.1007/978-3-030-84245-1\_19},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AttemaCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BadertscherLZ21,
  author       = {Christian Badertscher and
                  Yun Lu and
                  Vassilis Zikas},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {A Rational Protocol Treatment of 51{\%} Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_1},
  doi          = {10.1007/978-3-030-84252-9\_1},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BadertscherLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarbosaBCW21,
  author       = {Manuel Barbosa and
                  Alexandra Boldyreva and
                  Shan Chen and
                  Bogdan Warinschi},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Provable Security Analysis of {FIDO2}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {125--156},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_5},
  doi          = {10.1007/978-3-030-84252-9\_5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BarbosaBCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekCKM21,
  author       = {James Bartusek and
                  Andrea Coladangelo and
                  Dakshita Khurana and
                  Fermi Ma},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {On the Round Complexity of Secure Quantum Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {406--435},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_15},
  doi          = {10.1007/978-3-030-84242-0\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekCKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekCKM21a,
  author       = {James Bartusek and
                  Andrea Coladangelo and
                  Dakshita Khurana and
                  Fermi Ma},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {One-Way Functions Imply Secure Computation in a Quantum World},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {467--496},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_17},
  doi          = {10.1007/978-3-030-84242-0\_17},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekCKM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaumMRS21,
  author       = {Carsten Baum and
                  Alex J. Malozemoff and
                  Marc B. Rosen and
                  Peter Scholl},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
                  with Nested Disjunctions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {92--122},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_4},
  doi          = {10.1007/978-3-030-84259-8\_4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaumMRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelOP21,
  author       = {Amos Beimel and
                  Hussien Othman and
                  Naty Peter},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Quadratic Secret Sharing and Conditional Disclosure of Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {748--778},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_25},
  doi          = {10.1007/978-3-030-84252-9\_25},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelOP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Beyne21,
  author       = {Tim Beyne},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Linear Cryptanalysis of {FF3-1} and {FEA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {41--69},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_3},
  doi          = {10.1007/978-3-030-84242-0\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Beyne21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlockHRRS21,
  author       = {Alexander R. Block and
                  Justin Holmgren and
                  Alon Rosen and
                  Ron D. Rothblum and
                  Pratik Soni},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Time- and Space-Efficient Arguments from Groups of Unknown Order},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {123--152},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_5},
  doi          = {10.1007/978-3-030-84259-8\_5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BlockHRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehDFG21,
  author       = {Dan Boneh and
                  Justin Drake and
                  Ben Fisch and
                  Ariel Gabizon},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {649--680},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_23},
  doi          = {10.1007/978-3-030-84242-0\_23},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehDFG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BootleCS21,
  author       = {Jonathan Bootle and
                  Alessandro Chiesa and
                  Katerina Sotiraki},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Sumcheck Arguments and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {742--773},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_26},
  doi          = {10.1007/978-3-030-84242-0\_26},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BootleCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BordesDKA21,
  author       = {Nicolas Bordes and
                  Joan Daemen and
                  Dani{\"{e}}l Kuijsters and
                  Gilles Van Assche},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Thinking Outside the Superbox},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {337--367},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_12},
  doi          = {10.1007/978-3-030-84252-9\_12},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BordesDKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BossuatBFMR21,
  author       = {Ang{\`{e}}le Bossuat and
                  Raphael Bost and
                  Pierre{-}Alain Fouque and
                  Brice Minaud and
                  Michael Reichle},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {{SSE} and {SSD:} Page-Efficient Searchable Symmetric Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {157--184},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_6},
  doi          = {10.1007/978-3-030-84252-9\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BossuatBFMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKS21,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Low-Complexity Weak Pseudorandom Functions in {\textdollar}{\textbackslash}mathtt
                  \{AC\}0[{\textbackslash}mathtt \{MOD\}2]{\textdollar}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {487--516},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_17},
  doi          = {10.1007/978-3-030-84259-8\_17},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCGIKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleGIN21,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai and
                  Ariel Nof},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Sublinear GMW-Style Compiler for {MPC} with Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {457--485},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_16},
  doi          = {10.1007/978-3-030-84245-1\_16},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleGIN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BunzCLMS21,
  author       = {Benedikt B{\"{u}}nz and
                  Alessandro Chiesa and
                  William Lin and
                  Pratyush Mishra and
                  Nicholas Spooner},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Proof-Carrying Data Without Succinct Arguments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {681--710},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_24},
  doi          = {10.1007/978-3-030-84242-0\_24},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BunzCLMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CassiersFOS21,
  author       = {Ga{\"{e}}tan Cassiers and
                  Sebastian Faust and
                  Maximilian Orlt and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Towards Tight Random Probing Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {185--214},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_7},
  doi          = {10.1007/978-3-030-84252-9\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CassiersFOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChandranKOS21,
  author       = {Nishanth Chandran and
                  Bhavana Kanukurthi and
                  Sai Lakshmi Bhavana Obbattu and
                  Sruthi Sekar},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Adaptive Extractors and Their Application to Leakage Resilient Secret
                  Sharing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {595--624},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_20},
  doi          = {10.1007/978-3-030-84252-9\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChandranKOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChatterjeeGHKLM21,
  author       = {Rohit Chatterjee and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Dakshita Khurana and
                  Xiao Liang and
                  Giulio Malavolta and
                  Omkant Pandey and
                  Sina Shiehian},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Compact Ring Signatures from Learning with Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {282--312},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_11},
  doi          = {10.1007/978-3-030-84242-0\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ChatterjeeGHKLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenLMQ21,
  author       = {Yilei Chen and
                  Alex Lombardi and
                  Fermi Ma and
                  Willy Quach},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Does Fiat-Shamir Require a Cryptographic Hash Function?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {334--363},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_12},
  doi          = {10.1007/978-3-030-84259-8\_12},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenLMQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CheonKL21,
  author       = {Jung Hee Cheon and
                  Dongwoo Kim and
                  Keewoo Lee},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {MHz2k: {MPC} from {HE} over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2k\}{\textdollar}
                  with New Packing, Simpler Reshare, and Better {ZKP}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {426--456},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_15},
  doi          = {10.1007/978-3-030-84245-1\_15},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CheonKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChiaCY21,
  author       = {Nai{-}Hui Chia and
                  Kai{-}Min Chung and
                  Takashi Yamakawa},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {315--345},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_12},
  doi          = {10.1007/978-3-030-84242-0\_12},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChiaCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChiesaY21,
  author       = {Alessandro Chiesa and
                  Eylon Yogev},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Subquadratic SNARGs in the Random Oracle Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {711--741},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_25},
  doi          = {10.1007/978-3-030-84242-0\_25},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChiesaY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoudhuriGGJK21,
  author       = {Arka Rai Choudhuri and
                  Aarushi Goel and
                  Matthew Green and
                  Abhishek Jain and
                  Gabriel Kaptchuk},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Fluid {MPC:} Secure Multiparty Computation with Dynamic Participants},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {94--123},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_4},
  doi          = {10.1007/978-3-030-84245-1\_4},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoudhuriGGJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoudhuriJJ21,
  author       = {Arka Rai Choudhuri and
                  Abhishek Jain and
                  Zhengzhong Jin},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Non-interactive Batch Arguments for {NP} from Standard Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {394--423},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_14},
  doi          = {10.1007/978-3-030-84259-8\_14},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoudhuriJJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChungCWS21,
  author       = {Kai{-}Min Chung and
                  T.{-}H. Hubert Chan and
                  Ting Wen and
                  Elaine Shi},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader
                  Election},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_1},
  doi          = {10.1007/978-3-030-84245-1\_1},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChungCWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ColadangeloLLZ21,
  author       = {Andrea Coladangelo and
                  Jiahui Liu and
                  Qipeng Liu and
                  Mark Zhandry},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Hidden Cosets and Applications to Unclonable Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {556--584},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_20},
  doi          = {10.1007/978-3-030-84242-0\_20},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ColadangeloLLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronS21,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Lorenzo Spignoli},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Secure Wire Shuffling in the Probing Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {215--244},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_8},
  doi          = {10.1007/978-3-030-84252-9\_8},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauRR21,
  author       = {Geoffroy Couteau and
                  Peter Rindal and
                  Srinivasan Raghuraman},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Silver: Silent {VOLE} and Oblivious Transfer from Hardness of Decoding
                  Structured {LDPC} Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {502--534},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_17},
  doi          = {10.1007/978-3-030-84252-9\_17},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CouteauRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerRX21,
  author       = {Ronald Cramer and
                  Matthieu Rambaud and
                  Chaoping Xing},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Asymptotically-Good Arithmetic Secret Sharing over {\textdollar}{\textbackslash}mathbb
                  \{Z\}/p\{{\textbackslash}ell \}{\textbackslash}mathbb \{Z\}{\textdollar}
                  with Strong Multiplication and Its Applications to Efficient {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {656--686},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_22},
  doi          = {10.1007/978-3-030-84252-9\_22},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerRX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledKP21,
  author       = {Dana Dachman{-}Soled and
                  Ilan Komargodski and
                  Rafael Pass},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Non-malleable Codes for Bounded Parallel-Time Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {535--565},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_18},
  doi          = {10.1007/978-3-030-84252-9\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardMRSY21,
  author       = {Ivan Damg{\aa}rd and
                  Bernardo Magri and
                  Divya Ravi and
                  Luisa Siniscalchi and
                  Sophia Yakoubov},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Broadcast-Optimal Two Round {MPC} with an Honest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {155--184},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_6},
  doi          = {10.1007/978-3-030-84245-1\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardMRSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurGHIKSZ21,
  author       = {Itai Dinur and
                  Steven Goldfeder and
                  Tzipora Halevi and
                  Yuval Ishai and
                  Mahimna Kelkar and
                  Vivek Sharma and
                  Greg Zaverucha},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates,
                  Protocols, and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {517--547},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_18},
  doi          = {10.1007/978-3-030-84259-8\_18},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurGHIKSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisGSX21,
  author       = {Yevgeniy Dodis and
                  Siyao Guo and
                  Noah Stephens{-}Davidowitz and
                  Zhiye Xie},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {No Time to Hash: On Super-Efficient Entropy Accumulation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {548--576},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_19},
  doi          = {10.1007/978-3-030-84259-8\_19},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisGSX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DongHSLWH21,
  author       = {Xiaoyang Dong and
                  Jialiang Hua and
                  Siwei Sun and
                  Zheng Li and
                  Xiaoyun Wang and
                  Lei Hu},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and
                  Preimage Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {278--308},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_10},
  doi          = {10.1007/978-3-030-84252-9\_10},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DongHSLWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EriguchiOYN21,
  author       = {Reo Eriguchi and
                  Kazuma Ohara and
                  Shota Yamada and
                  Koji Nuida},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Non-interactive Secure Multiparty Computation for Symmetric Functions,
                  Revisited: More Efficient Constructions and Extensions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {305--334},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_11},
  doi          = {10.1007/978-3-030-84245-1\_11},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EriguchiOYN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EscuderoS21,
  author       = {Daniel Escudero and
                  Eduardo Soria{-}Vazquez},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Efficient Information-Theoretic Multi-party Computation over Non-commutative
                  Rings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {335--364},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_12},
  doi          = {10.1007/978-3-030-84245-1\_12},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EscuderoS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FengT21,
  author       = {Hanwen Feng and
                  Qiang Tang},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Witness Authenticating NIZKs and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_1},
  doi          = {10.1007/978-3-030-84259-8\_1},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FengT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarillotKMN21,
  author       = {Fran{\c{c}}ois Garillot and
                  Yashvanth Kondi and
                  Payman Mohassel and
                  Valeria Nikolaenko},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Threshold Schnorr with Stateless Deterministic Signing from Standard
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {127--156},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_6},
  doi          = {10.1007/978-3-030-84242-0\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GarillotKMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarimellaPRTY21,
  author       = {Gayathri Garimella and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Oblivious Key-Value Stores and Amplification for Private Set Intersection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {395--425},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_14},
  doi          = {10.1007/978-3-030-84245-1\_14},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarimellaPRTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryHKMNRY21,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Bernardo Magri and
                  Jesper Buus Nielsen and
                  Tal Rabin and
                  Sophia Yakoubov},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {{YOSO:} You Only Speak Once - Secure {MPC} with Stateless Ephemeral
                  Roles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {64--93},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_3},
  doi          = {10.1007/978-3-030-84245-1\_3},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryHKMNRY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GhoshalT21,
  author       = {Ashrujit Ghoshal and
                  Stefano Tessaro},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Tight State-Restoration Soundness in the Algebraic Group Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {64--93},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_3},
  doi          = {10.1007/978-3-030-84252-9\_3},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GhoshalT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalLOPS21,
  author       = {Vipul Goyal and
                  Hanjun Li and
                  Rafail Ostrovsky and
                  Antigoni Polychroniadou and
                  Yifan Song},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {{ATLAS:} Efficient and Scalable {MPC} in the Honest Majority Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {244--274},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_9},
  doi          = {10.1007/978-3-030-84245-1\_9},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalLOPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalPS21,
  author       = {Vipul Goyal and
                  Antigoni Polychroniadou and
                  Yifan Song},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Unconditional Communication-Efficient {MPC} via Hall's Marriage Theorem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {275--304},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_10},
  doi          = {10.1007/978-3-030-84245-1\_10},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalSS21,
  author       = {Vipul Goyal and
                  Yifan Song and
                  Akshayaram Srinivasan},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Traceable Secret Sharing and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {718--747},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_24},
  doi          = {10.1007/978-3-030-84252-9\_24},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuJK21,
  author       = {Yanqi Gu and
                  Stanislaw Jarecki and
                  Hugo Krawczyk},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {{KHAPE:} Asymmetric {PAKE} from Key-Hiding Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {701--730},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_24},
  doi          = {10.1007/978-3-030-84259-8\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HanJKLPRS21,
  author       = {Shuai Han and
                  Tibor Jager and
                  Eike Kiltz and
                  Shengli Liu and
                  Jiaxin Pan and
                  Doreen Riepel and
                  Sven Sch{\"{a}}ge},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Authenticated Key Exchange and Signatures with Tight Security in the
                  Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {670--700},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_23},
  doi          = {10.1007/978-3-030-84259-8\_23},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HanJKLPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HerzbergLSW21,
  author       = {Amir Herzberg and
                  Hemi Leibowitz and
                  Ewa Syta and
                  Sara Wr{\'{o}}tniak},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {MoSS: Modular Security Specifications Framework},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_2},
  doi          = {10.1007/978-3-030-84252-9\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HerzbergLSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HopkinsJL21,
  author       = {Samuel B. Hopkins and
                  Aayush Jain and
                  Huijia Lin},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Counterexamples to New Circular Security Assumptions Underlying iO},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {673--700},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_23},
  doi          = {10.1007/978-3-030-84245-1\_23},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HopkinsJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HosoyamadaI21,
  author       = {Akinori Hosoyamada and
                  Tetsu Iwata},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {On Tight Quantum Security of {HMAC} and {NMAC} in the Quantum Random
                  Oracle Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {585--615},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_21},
  doi          = {10.1007/978-3-030-84242-0\_21},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HosoyamadaI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HosoyamadaS21,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Quantum Collision Attacks on Reduced {SHA-256} and {SHA-512}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {616--646},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_22},
  doi          = {10.1007/978-3-030-84242-0\_22},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HosoyamadaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKSS21,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {On the Round Complexity of Black-Box Secure {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {214--243},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_8},
  doi          = {10.1007/978-3-030-84245-1\_8},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KamathKPW21,
  author       = {Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Limits on the Adaptive Security of Yao's Garbling},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {486--515},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_17},
  doi          = {10.1007/978-3-030-84245-1\_17},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KamathKPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KaplanMNS21,
  author       = {Haim Kaplan and
                  Yishay Mansour and
                  Kobbi Nissim and
                  Uri Stemmer},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Separating Adaptive Streaming from Oblivious Streaming Using the Bounded
                  Storage Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {94--121},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_4},
  doi          = {10.1007/978-3-030-84252-9\_4},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KaplanMNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Katsumata21,
  author       = {Shuichi Katsumata},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge
                  Proofs to {QROM} Secure NIZKs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {580--610},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_20},
  doi          = {10.1007/978-3-030-84245-1\_20},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Katsumata21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KerberKK21,
  author       = {Thomas Kerber and
                  Aggelos Kiayias and
                  Markulf Kohlweiss},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Composition with Knowledge Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {364--393},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_13},
  doi          = {10.1007/978-3-030-84259-8\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KerberKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KhuranaS21,
  author       = {Dakshita Khurana and
                  Akshayaram Srinivasan},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Improved Computational Extractors and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {566--594},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_19},
  doi          = {10.1007/978-3-030-84252-9\_19},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KhuranaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KirchnerEF21,
  author       = {Paul Kirchner and
                  Thomas Espitau and
                  Pierre{-}Alain Fouque},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Towards Faster Polynomial-Time Lattice Reduction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {760--790},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_26},
  doi          = {10.1007/978-3-030-84245-1\_26},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KirchnerEF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KirshanovaL21,
  author       = {Elena Kirshanova and
                  Thijs Laarhoven},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Lower Bounds on Lattice Sieving and Information Set Decoding},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {791--820},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_27},
  doi          = {10.1007/978-3-030-84245-1\_27},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KirshanovaL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KomargodskiL21,
  author       = {Ilan Komargodski and
                  Wei{-}Kai Lin},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {A Logarithmic Lower Bound for Oblivious {RAM} (for All Parameters)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {579--609},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_20},
  doi          = {10.1007/978-3-030-84259-8\_20},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KomargodskiL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiangP21,
  author       = {Xiao Liang and
                  Omkant Pandey},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {34--64},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_2},
  doi          = {10.1007/978-3-030-84259-8\_2},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LiangP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuIM21,
  author       = {Fukang Liu and
                  Takanori Isobe and
                  Willi Meier},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {368--401},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_13},
  doi          = {10.1007/978-3-030-84252-9\_13},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuIM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuLL21,
  author       = {Meicheng Liu and
                  Xiaojuan Lu and
                  Dongdai Lin},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Differential-Linear Cryptanalysis from an Algebraic Perspective},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {247--277},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_9},
  doi          = {10.1007/978-3-030-84252-9\_9},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuP21,
  author       = {Yanyi Liu and
                  Rafael Pass},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {On the Possibility of Basing Cryptography on EXP{\(\not =\)} {BPP}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {11--40},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_2},
  doi          = {10.1007/978-3-030-84242-0\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuTV21,
  author       = {Tianren Liu and
                  Stefano Tessaro and
                  Vinod Vaikuntanathan},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {The t-wise Independence of Substitution-Permutation Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {454--483},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_16},
  doi          = {10.1007/978-3-030-84259-8\_16},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuTV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuYZZLH21,
  author       = {Hanlin Liu and
                  Yu Yu and
                  Shuoyao Zhao and
                  Jiang Zhang and
                  Wenling Liu and
                  Zhenkai Hu},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter
                  and More Compact},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {365--394},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_13},
  doi          = {10.1007/978-3-030-84245-1\_13},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuYZZLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LongaWS21,
  author       = {Patrick Longa and
                  Wen Wang and
                  Jakub Szefer},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {The Cost to Break {SIKE:} {A} Comparative Hardware-Based Analysis
                  with {AES} and {SHA-3}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {402--431},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_14},
  doi          = {10.1007/978-3-030-84252-9\_14},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LongaWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LyubashevskyNS21,
  author       = {Vadim Lyubashevsky and
                  Ngoc Khanh Nguyen and
                  Gregor Seiler},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {{SMILE:} Set Membership from Ideal Lattices with Applications to Ring
                  Signatures and Confidential Transactions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {611--640},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_21},
  doi          = {10.1007/978-3-030-84245-1\_21},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LyubashevskyNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MajiPSW21,
  author       = {Hemanta K. Maji and
                  Anat Paskin{-}Cherniavsky and
                  Tom Suad and
                  Mingyuan Wang},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {779--808},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_26},
  doi          = {10.1007/978-3-030-84252-9\_26},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MajiPSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MajiW21,
  author       = {Hemanta K. Maji and
                  Mingyuan Wang},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Computational Hardness of Optimal Fair Computation: Beyond Minicrypt},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_2},
  doi          = {10.1007/978-3-030-84245-1\_2},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MajiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/May21,
  author       = {Alexander May},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {How to Meet Ternary {LWE} Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {701--731},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_24},
  doi          = {10.1007/978-3-030-84245-1\_24},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/May21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NickRS21,
  author       = {Jonas Nick and
                  Tim Ruffing and
                  Yannick Seurin},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {MuSig2: Simple Two-Round Schnorr Multi-signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {189--221},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_8},
  doi          = {10.1007/978-3-030-84242-0\_8},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NickRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PatraS21,
  author       = {Arpita Patra and
                  Akshayaram Srinivasan},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Three-Round Secure Multiparty Computation from Black-Box Two-Round
                  Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {185--213},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_7},
  doi          = {10.1007/978-3-030-84245-1\_7},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PatraS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuachWW21,
  author       = {Willy Quach and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Targeted Lossy Functions and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {424--453},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_15},
  doi          = {10.1007/978-3-030-84259-8\_15},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuachWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuehenKLMPPS21,
  author       = {Victoria de Quehen and
                  P{\'{e}}ter Kutas and
                  Chris Leonardi and
                  Chloe Martindale and
                  Lorenz Panny and
                  Christophe Petit and
                  Katherine E. Stange},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Improved Torsion-Point Attacks on {SIDH} Variants},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {432--470},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_15},
  doi          = {10.1007/978-3-030-84252-9\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuehenKLMPPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RafolsZ21,
  author       = {Carla R{\`{a}}fols and
                  Arantxa Zapico},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {An Algebraic Framework for Universal and Updatable SNARKs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {774--804},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_27},
  doi          = {10.1007/978-3-030-84242-0\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RafolsZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RosulekR21,
  author       = {Mike Rosulek and
                  Lawrence Roy},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Three Halves Make a Whole? Beating the Half-Gates Lower Bound for
                  Garbled Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {94--124},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_5},
  doi          = {10.1007/978-3-030-84242-0\_5},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RosulekR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RotemS21,
  author       = {Lior Rotem and
                  Gil Segev},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Tighter Security for Schnorr Identification and Signatures: {A} High-Moment
                  Forking Lemma for {\textdollar}\{{\textbackslash}varSigma \}{\textdollar}-Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {222--250},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_9},
  doi          = {10.1007/978-3-030-84242-0\_9},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RotemS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RoyS21,
  author       = {Lawrence Roy and
                  Jaspal Singh},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Large Message Homomorphic Secret Sharing from {DCR} and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {687--717},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_23},
  doi          = {10.1007/978-3-030-84252-9\_23},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RoyS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShenWGW21,
  author       = {Yaobin Shen and
                  Lei Wang and
                  Dawu Gu and
                  Jian Weng},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the
                  Multi-user Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {309--336},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_11},
  doi          = {10.1007/978-3-030-84252-9\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ShenWGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShiACM21,
  author       = {Elaine Shi and
                  Waqar Aqeel and
                  Balakrishnan Chandrasekaran and
                  Bruce M. Maggs},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Puncturable Pseudorandom Sets and Private Information Retrieval with
                  Near-Optimal Online Bandwidth and Time},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {641--669},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_22},
  doi          = {10.1007/978-3-030-84259-8\_22},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ShiACM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Shmueli21,
  author       = {Omri Shmueli},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Multi-theorem Designated-Verifier {NIZK} for {QMA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {375--405},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_14},
  doi          = {10.1007/978-3-030-84242-0\_14},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Shmueli21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TaoPD21,
  author       = {Chengdong Tao and
                  Albrecht Petzoldt and
                  Jintai Ding},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Efficient Key Recovery for All {HFE} Signature Variants},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {70--93},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_4},
  doi          = {10.1007/978-3-030-84242-0\_4},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/TaoPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Teague21,
  author       = {Vanessa Teague},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Which E-Voting Problems Do We Need to Solve?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {3--7},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_1},
  doi          = {10.1007/978-3-030-84242-0\_1},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Teague21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangCYHWY21,
  author       = {Yi Wang and
                  Rongmao Chen and
                  Guomin Yang and
                  Xinyi Huang and
                  Baosheng Wang and
                  Moti Yung},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {270--300},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_10},
  doi          = {10.1007/978-3-030-84259-8\_10},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WangCYHWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangPC21,
  author       = {Yuyu Wang and
                  Jiaxin Pan and
                  Yu Chen},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Fine-Grained Secure Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {179--207},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_7},
  doi          = {10.1007/978-3-030-84259-8\_7},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WangPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Wee21,
  author       = {Hoeteck Wee},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Broadcast Encryption with Size N\({}^{\mbox{1/3}}\) and More from
                  k-Lin},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {155--178},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_6},
  doi          = {10.1007/978-3-030-84259-8\_6},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Wee21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YuZ21,
  author       = {Yu Yu and
                  Jiang Zhang},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness
                  for {LPN}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {473--501},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_16},
  doi          = {10.1007/978-3-030-84252-9\_16},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YuZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YuenELAD21,
  author       = {Tsz Hon Yuen and
                  Muhammed F. Esgin and
                  Joseph K. Liu and
                  Man Ho Au and
                  Zhimin Ding},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {DualRing: Generic Construction of Ring Signatures with Efficient Instantiations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {251--281},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_10},
  doi          = {10.1007/978-3-030-84242-0\_10},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YuenELAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry21,
  author       = {Mark Zhandry},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {White Box Traitor Tracing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {303--333},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_11},
  doi          = {10.1007/978-3-030-84259-8\_11},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2021-1,
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0},
  doi          = {10.1007/978-3-030-84242-0},
  isbn         = {978-3-030-84241-3},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2021-2,
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1},
  doi          = {10.1007/978-3-030-84245-1},
  isbn         = {978-3-030-84244-4},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2021-3,
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9},
  doi          = {10.1007/978-3-030-84252-9},
  isbn         = {978-3-030-84251-2},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2021-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2021-4,
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8},
  doi          = {10.1007/978-3-030-84259-8},
  isbn         = {978-3-030-84258-1},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2021-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/00010N20,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Alexander Nilsson},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {A Key-Recovery Timing Attack on Post-quantum Primitives Using the
                  Fujisaki-Okamoto Transformation and Its Application on FrodoKEM},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {359--386},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_13},
  doi          = {10.1007/978-3-030-56880-1\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/00010N20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001GKRS20,
  author       = {Daniel Escudero and
                  Satrajit Ghosh and
                  Marcel Keller and
                  Rahul Rachuri and
                  Peter Scholl},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Improved Primitives for {MPC} over Mixed Arithmetic-Binary Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {823--852},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_29},
  doi          = {10.1007/978-3-030-56880-1\_29},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001GKRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001M20,
  author       = {Daniel Jost and
                  Ueli Maurer},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Overcoming Impossibility Results in Composable Security Using Interval-Wise
                  Guarantees},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {33--62},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_2},
  doi          = {10.1007/978-3-030-56784-2\_2},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001M20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001SY20,
  author       = {Liran Katzir and
                  Clara Shikhelman and
                  Eylon Yogev},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Interactive Proofs for Social Graphs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {574--601},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_20},
  doi          = {10.1007/978-3-030-56877-1\_20},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001SY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBBJKX20,
  author       = {Michel Abdalla and
                  Manuel Barbosa and
                  Tatiana Bradley and
                  Stanislaw Jarecki and
                  Jonathan Katz and
                  Jiayu Xu},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Universally Composable Relaxed Password Authenticated Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {278--307},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_10},
  doi          = {10.1007/978-3-030-56784-2\_10},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBBJKX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaGW20,
  author       = {Michel Abdalla and
                  Junqing Gong and
                  Hoeteck Wee},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Functional Encryption for Attribute-Weighted Sums from k-Lin},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {685--716},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_23},
  doi          = {10.1007/978-3-030-56784-2\_23},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalLNS20,
  author       = {Divesh Aggarwal and
                  Jianwei Li and
                  Phong Q. Nguyen and
                  Noah Stephens{-}Davidowitz},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Slide Reduction, Revisited - Filling the Gaps in {SVP} Approximation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {274--295},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_10},
  doi          = {10.1007/978-3-030-56880-1\_10},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalLNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AkshimaCDW20,
  author       = {Akshima and
                  David Cash and
                  Andrew Drucker and
                  Hoeteck Wee},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Time-Space Tradeoffs and Short Collisions in Merkle-Damg{\aa}rd Hash
                  Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {157--186},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_6},
  doi          = {10.1007/978-3-030-56784-2\_6},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AkshimaCDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtBFKSW20,
  author       = {Martin R. Albrecht and
                  Shi Bai and
                  Pierre{-}Alain Fouque and
                  Paul Kirchner and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k\({}^{\mbox{1/(2k)}}\)
                  Time k\({}^{\mbox{k/8+o(k)}}\)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {186--212},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_7},
  doi          = {10.1007/978-3-030-56880-1\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlbrechtBFKSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlonOP20,
  author       = {Bar Alon and
                  Eran Omri and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {{MPC} with Friends and Foes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {677--706},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_24},
  doi          = {10.1007/978-3-030-56880-1\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AlonOP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenCDT20,
  author       = {Jo{\"{e}}l Alwen and
                  Sandro Coretti and
                  Yevgeniy Dodis and
                  Yiannis Tselekounis},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Security Analysis and Improvements for the {IETF} {MLS} Standard for
                  Group Messaging},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {248--277},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_9},
  doi          = {10.1007/978-3-030-56784-2\_9},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenCDT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AponPRS20,
  author       = {Daniel Apon and
                  Ray A. Perlner and
                  Angela Robinson and
                  Paolo Santini},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Cryptanalysis of LEDAcrypt},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {389--418},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_14},
  doi          = {10.1007/978-3-030-56877-1\_14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AponPRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AttemaC20,
  author       = {Thomas Attema and
                  Ronald Cramer},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocol
                  Theory and Practical Application to Plug {\&} Play Secure Algorithmics},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {513--543},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_18},
  doi          = {10.1007/978-3-030-56877-1\_18},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AttemaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AttemaLS20,
  author       = {Thomas Attema and
                  Vadim Lyubashevsky and
                  Gregor Seiler},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Practical Product Proofs for Lattice Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {470--499},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_17},
  doi          = {10.1007/978-3-030-56880-1\_17},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AttemaLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BallCLMT20,
  author       = {Marshall Ball and
                  Eshan Chattopadhyay and
                  Jyun{-}Jie Liao and
                  Tal Malkin and
                  Li{-}Yang Tan},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Non-malleability Against Polynomial Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {97--126},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_4},
  doi          = {10.1007/978-3-030-56877-1\_4},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BallCLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BallDK20,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {New Techniques for Zero-Knowledge: Leveraging Inefficient Provers
                  to Reduce Assumptions, Interaction, and Trust},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {674--703},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_24},
  doi          = {10.1007/978-3-030-56877-1\_24},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BallDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartaIOW20,
  author       = {Ohad Barta and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  David J. Wu},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {On Succinct Arguments and Witness Encryption from Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {776--806},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_26},
  doi          = {10.1007/978-3-030-56784-2\_26},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartaIOW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BauerFL20,
  author       = {Balthazar Bauer and
                  Georg Fuchsbauer and
                  Julian Loss},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {A Classification of Computational Assumptions in the Algebraic Group
                  Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_5},
  doi          = {10.1007/978-3-030-56880-1\_5},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BauerFL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaumOSS20,
  author       = {Carsten Baum and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Eduardo Soria{-}Vazquez},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Efficient Constant-Round {MPC} with Identifiable Abort and Public
                  Verifiability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {562--592},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_20},
  doi          = {10.1007/978-3-030-56880-1\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaumOSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleBSGPUV020,
  author       = {Christof Beierle and
                  Alex Biryukov and
                  Luan Cardoso dos Santos and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  L{\'{e}}o Perrin and
                  Aleksei Udovenko and
                  Vesselin Velichkov and
                  Qingju Wang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Alzette: {A} 64-Bit ARX-box - (Feat. {CRAX} and {TRAX)}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {419--448},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_15},
  doi          = {10.1007/978-3-030-56877-1\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BeierleBSGPUV020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleLT20,
  author       = {Christof Beierle and
                  Gregor Leander and
                  Yosuke Todo},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Improved Differential-Linear Attacks with Applications to {ARX} Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {329--358},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_12},
  doi          = {10.1007/978-3-030-56877-1\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeierleLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelaidCPRT20,
  author       = {Sonia Bela{\"{\i}}d and
                  Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Abdul Rahman Taleb},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Random Probing Security: Verification, Composition, Expansion and
                  New Constructions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {339--368},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_12},
  doi          = {10.1007/978-3-030-56784-2\_12},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BelaidCPRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelliziaBCGGMPP20,
  author       = {Davide Bellizia and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Vincent Grosso and
                  Chun Guo and
                  Charles Momin and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Mode-Level vs. Implementation-Level Physical Security in Symmetric
                  Cryptography - {A} Practical Guide Through the Leakage-Resistance
                  Jungle},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {369--400},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_13},
  doi          = {10.1007/978-3-030-56784-2\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BelliziaBCGGMPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BermanHT20,
  author       = {Itay Berman and
                  Iftach Haitner and
                  Eliad Tsfadia},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {A Tight Parallel Repetition Theorem for Partially Simulatable Interactive
                  Arguments via Smooth KL-Divergence},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {544--573},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_19},
  doi          = {10.1007/978-3-030-56877-1\_19},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BermanHT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeyneCDELLNPSTW20,
  author       = {Tim Beyne and
                  Anne Canteaut and
                  Itai Dinur and
                  Maria Eichlseder and
                  Gregor Leander and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Yu Sasaki and
                  Yosuke Todo and
                  Friedrich Wiemer},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives
                  Optimized for Integrity Proof Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {299--328},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_11},
  doi          = {10.1007/978-3-030-56877-1\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeyneCDELLNPSTW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlumZL20,
  author       = {Erica Blum and
                  Chen{-}Da Liu Zhang and
                  Julian Loss},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Always Have a Backup Plan: Fully Secure Synchronous {MPC} with Asynchronous
                  Fallback},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {707--731},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_25},
  doi          = {10.1007/978-3-030-56880-1\_25},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BlumZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoerDPW20,
  author       = {Koen de Boer and
                  L{\'{e}}o Ducas and
                  Alice Pellet{-}Mary and
                  Benjamin Wesolowski},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Random Self-reducibility of Ideal-SVP via Arakelov Random Walks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {243--273},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_9},
  doi          = {10.1007/978-3-030-56880-1\_9},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoerDPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BootleL0S20,
  author       = {Jonathan Bootle and
                  Vadim Lyubashevsky and
                  Ngoc Khanh Nguyen and
                  Gregor Seiler},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {A Non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {441--469},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_16},
  doi          = {10.1007/978-3-030-56880-1\_16},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BootleL0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoudotGGHTZ20,
  author       = {Fabrice Boudot and
                  Pierrick Gaudry and
                  Aurore Guillevic and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}} and
                  Paul Zimmermann},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Comparing the Difficulty of Factorization and Discrete Logarithm:
                  {A} 240-Digit Experiment},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {62--91},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_3},
  doi          = {10.1007/978-3-030-56880-1\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoudotGGHTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoydDGJ20,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Fast and Secure Updatable Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {464--493},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_16},
  doi          = {10.1007/978-3-030-56784-2\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoydDGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKS20,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Efficient Pseudorandom Correlation Generators from Ring-LPN},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {387--416},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_14},
  doi          = {10.1007/978-3-030-56880-1\_14},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCGIKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiKM20,
  author       = {Zvika Brakerski and
                  Venkata Koppula and
                  Tamer Mour},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {{NIZK} from {LPN} and Trapdoor Hash via Correlation Intractability
                  for Approximable Relations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {738--767},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_26},
  doi          = {10.1007/978-3-030-56877-1\_26},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiS20,
  author       = {Zvika Brakerski and
                  Omri Shmueli},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Scalable Pseudorandom Quantum States},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {417--440},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_15},
  doi          = {10.1007/978-3-030-56880-1\_15},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrianFO0020,
  author       = {Gianluca Brian and
                  Antonio Faonio and
                  Maciej Obremski and
                  Mark Simkin and
                  Daniele Venturi},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks
                  in the Plain Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {127--155},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_5},
  doi          = {10.1007/978-3-030-56877-1\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BrianFO0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiPP20,
  author       = {Ran Canetti and
                  Sunoo Park and
                  Oxana Poburinnaya},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Fully Deniable Interactive Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {807--835},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_27},
  doi          = {10.1007/978-3-030-56784-2\_27},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CarliniJM20,
  author       = {Nicholas Carlini and
                  Matthew Jagielski and
                  Ilya Mironov},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Cryptanalytic Extraction of Neural Network Models},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {189--218},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_7},
  doi          = {10.1007/978-3-030-56877-1\_7},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CarliniJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CastryckSV20,
  author       = {Wouter Castryck and
                  Jana Sot{\'{a}}kov{\'{a}} and
                  Frederik Vercauteren},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Breaking the Decisional Diffie-Hellman Problem for Class Group Actions
                  Using Genus Theory},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {92--120},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_4},
  doi          = {10.1007/978-3-030-56880-1\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CastryckSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChakrabortyDN20,
  author       = {Suvradip Chakraborty and
                  Stefan Dziembowski and
                  Jesper Buus Nielsen},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Reverse Firewalls for Actively Secure MPCs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {732--762},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_26},
  doi          = {10.1007/978-3-030-56880-1\_26},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChakrabortyDN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaseM20,
  author       = {Melissa Chase and
                  Peihan Miao},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Private Set Intersection in the Internet Setting from Lightweight
                  Oblivious {PRF}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {34--63},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_2},
  doi          = {10.1007/978-3-030-56877-1\_2},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaseM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenCDKLRS20,
  author       = {Megan Chen and
                  Ran Cohen and
                  Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Schuyler Rosefield and
                  Abhi Shelat},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Multiparty Generation of an {RSA} Modulus},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {64--93},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_3},
  doi          = {10.1007/978-3-030-56877-1\_3},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenCDKLRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChotardDGPP20,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour{-}Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Dynamic Decentralized Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {747--775},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_25},
  doi          = {10.1007/978-3-030-56784-2\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChotardDGPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ColadangeloVZ20,
  author       = {Andrea Coladangelo and
                  Thomas Vidick and
                  Tina Zhang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Non-interactive Zero-Knowledge Arguments for QMA, with Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {799--828},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_28},
  doi          = {10.1007/978-3-030-56877-1\_28},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ColadangeloVZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronG20,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Agnese Gini},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_1},
  doi          = {10.1007/978-3-030-56880-1\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauH20,
  author       = {Geoffroy Couteau and
                  Dominik Hartmann},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Shorter Non-interactive Zero-Knowledge Arguments and ZAPs for Algebraic
                  Languages},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {768--798},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_27},
  doi          = {10.1007/978-3-030-56877-1\_27},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CouteauH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledDG20,
  author       = {Dana Dachman{-}Soled and
                  L{\'{e}}o Ducas and
                  Huijing Gong and
                  M{\'{e}}lissa Rossi},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {{LWE} with Side Information: Attacks and Concrete Security Estimation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {329--358},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_12},
  doi          = {10.1007/978-3-030-56880-1\_12},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardO020,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Mark Simkin},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Black-Box Transformations from Passive to Covert Security with Public
                  Verifiability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {647--676},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_23},
  doi          = {10.1007/978-3-030-56880-1\_23},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardO020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DavidsonKN0Y20,
  author       = {Alex Davidson and
                  Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Adaptively Secure Constrained Pseudorandom Functions in the Standard
                  Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {559--589},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_19},
  doi          = {10.1007/978-3-030-56784-2\_19},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DavidsonKN0Y20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DerbezHLNPS20,
  author       = {Patrick Derbez and
                  Paul Huynh and
                  Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  L{\'{e}}o Perrin and
                  Andr{\'{e}} Schrottenloher},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to
                  the Light},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {359--388},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_13},
  doi          = {10.1007/978-3-030-56877-1\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DerbezHLNPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DingDSVZ20,
  author       = {Jintai Ding and
                  Joshua Deaton and
                  Kurt Schmidt and
                  Vishakha and
                  Zheng Zhang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {279--298},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_10},
  doi          = {10.1007/978-3-030-56877-1\_10},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DingDSVZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DonFM20,
  author       = {Jelle Don and
                  Serge Fehr and
                  Christian Majenz},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {The Measure-and-Reprogram Technique 2.0: Multi-round Fiat-Shamir and
                  More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {602--631},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_21},
  doi          = {10.1007/978-3-030-56877-1\_21},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DonFM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GhoshalJT20,
  author       = {Ashrujit Ghoshal and
                  Joseph Jaeger and
                  Stefano Tessaro},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {The Memory-Tightness of Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {127--156},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_5},
  doi          = {10.1007/978-3-030-56784-2\_5},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GhoshalJT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalSZ20,
  author       = {Vipul Goyal and
                  Yifan Song and
                  Chenzhi Zhu},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Guaranteed Output Delivery Comes Free in Honest Majority {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {618--646},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_22},
  doi          = {10.1007/978-3-030-56880-1\_22},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalV20,
  author       = {Rishab Goyal and
                  Satyanarayana Vusirikala},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Verifiable Registration-Based Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {621--651},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_21},
  doi          = {10.1007/978-3-030-56784-2\_21},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalVW20,
  author       = {Rishab Goyal and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {New Constructions of Hinting PRGs, OWFs with Encryption, and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {527--558},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_18},
  doi          = {10.1007/978-3-030-56784-2\_18},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GunsingM20,
  author       = {Aldo Gunsing and
                  Bart Mennink},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {The Summation-Truncation Hybrid: Reusing Discarded Bits for Free},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {187--217},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_7},
  doi          = {10.1007/978-3-030-56784-2\_7},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GunsingM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuoKWW020,
  author       = {Chun Guo and
                  Jonathan Katz and
                  Xiao Wang and
                  Chenkai Weng and
                  Yu Yu},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Better Concrete Security for Half-Gates Garbling (in the Multi-instance
                  Setting)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {793--822},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_28},
  doi          = {10.1007/978-3-030-56880-1\_28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuoKWW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HauckKL020,
  author       = {Eduard Hauck and
                  Eike Kiltz and
                  Julian Loss and
                  Ngoc Khanh Nguyen},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Lattice-Based Blind Signatures, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {500--529},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_18},
  doi          = {10.1007/978-3-030-56880-1\_18},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HauckKL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeathK20,
  author       = {David Heath and
                  Vladimir Kolesnikov},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Stacked Garbling - Garbled Circuit Proportional to Longest Execution
                  Path},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {763--792},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_27},
  doi          = {10.1007/978-3-030-56880-1\_27},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HeathK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangS20,
  author       = {Viet Tung Hoang and
                  Yaobin Shen},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Security Analysis of {NIST} {CTR-DRBG}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {218--247},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_8},
  doi          = {10.1007/978-3-030-56784-2\_8},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HohenbergerKW20,
  author       = {Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Chosen Ciphertext Security from Injective Trapdoor Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {836--866},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_28},
  doi          = {10.1007/978-3-030-56784-2\_28},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HohenbergerKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JaegerT20,
  author       = {Joseph Jaeger and
                  Nirvan Tyagi},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Handling Adaptive Compromise for Practical Encryption Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_1},
  doi          = {10.1007/978-3-030-56784-2\_1},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JaegerT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JainKMS20,
  author       = {Aayush Jain and
                  Alexis Korb and
                  Nathan Manohar and
                  Amit Sahai},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Amplifying the Security of Functional Encryption, Unconditionally},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {717--746},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_24},
  doi          = {10.1007/978-3-030-56784-2\_24},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JainKMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiP020,
  author       = {Yael Tauman Kalai and
                  Omer Paneth and
                  Lisa Yang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Delegation with Updatable Unambiguous Proofs and PPAD-Hardness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {652--673},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_23},
  doi          = {10.1007/978-3-030-56877-1\_23},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiP020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kelkar0GJ20,
  author       = {Mahimna Kelkar and
                  Fan Zhang and
                  Steven Goldfeder and
                  Ari Juels},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Order-Fairness for Byzantine Consensus},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {451--480},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_16},
  doi          = {10.1007/978-3-030-56877-1\_16},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kelkar0GJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KirchnerEF20,
  author       = {Paul Kirchner and
                  Thomas Espitau and
                  Pierre{-}Alain Fouque},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Fast Reduction of Algebraic Lattices over Cyclotomic Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {155--185},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_6},
  doi          = {10.1007/978-3-030-56880-1\_6},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KirchnerEF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kiyoshima20,
  author       = {Susumu Kiyoshima},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Round-Optimal Black-Box Commit-and-Prove with Succinct Communication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {533--561},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_19},
  doi          = {10.1007/978-3-030-56880-1\_19},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kiyoshima20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KreuterLO020,
  author       = {Ben Kreuter and
                  Tancr{\`{e}}de Lepoint and
                  Michele Orr{\`{u}} and
                  Mariana Raykova},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Anonymous Tokens with Private Metadata Bit},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {308--336},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_11},
  doi          = {10.1007/978-3-030-56784-2\_11},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KreuterLO020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiMQW20,
  author       = {Xin Li and
                  Fermi Ma and
                  Willy Quach and
                  Daniel Wichs},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Leakage-Resilient Key Exchange and Two-Seed Extractors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {401--429},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_14},
  doi          = {10.1007/978-3-030-56784-2\_14},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiMQW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Liu0M20,
  author       = {Fukang Liu and
                  Takanori Isobe and
                  Willi Meier},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Automatic Verification of Differential Characteristics: Application
                  to Reduced Gimli},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {219--248},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_8},
  doi          = {10.1007/978-3-030-56877-1\_8},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Liu0M20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuW20,
  author       = {Feng{-}Hao Liu and
                  Zhedong Wang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Rounding in the Rings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {296--326},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_11},
  doi          = {10.1007/978-3-030-56880-1\_11},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LombardiV20,
  author       = {Alex Lombardi and
                  Vinod Vaikuntanathan},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness
                  and VDFs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {632--651},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_22},
  doi          = {10.1007/978-3-030-56877-1\_22},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LombardiV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MajiW20,
  author       = {Hemanta K. Maji and
                  Mingyuan Wang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Black-Box Use of One-Way Functions is Useless for Optimal Fair Coin-Tossing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {593--617},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_21},
  doi          = {10.1007/978-3-030-56880-1\_21},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MajiW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ManurangsiSV20,
  author       = {Pasin Manurangsi and
                  Akshayaram Srinivasan and
                  Prashant Nalini Vasudevan},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Nearly Optimal Robust Secret Sharing Against Rushing Adversaries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {156--185},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_6},
  doi          = {10.1007/978-3-030-56877-1\_6},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ManurangsiSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MiaoP0SY20,
  author       = {Peihan Miao and
                  Sarvar Patel and
                  Mariana Raykova and
                  Karn Seth and
                  Moti Yung},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Two-Sided Malicious Security for Private Intersection-Sum with Cardinality},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_1},
  doi          = {10.1007/978-3-030-56877-1\_1},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MiaoP0SY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicheliGP20,
  author       = {Gabrielle De Micheli and
                  Pierrick Gaudry and
                  C{\'{e}}cile Pierrot},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Asymptotic Complexities of Discrete Logarithm Algorithms in Pairing-Relevant
                  Finite Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {32--61},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_2},
  doi          = {10.1007/978-3-030-56880-1\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MicheliGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MoranW20,
  author       = {Tal Moran and
                  Daniel Wichs},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Incompressible Encodings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {494--523},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_17},
  doi          = {10.1007/978-3-030-56784-2\_17},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MoranW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MukherjeeS20,
  author       = {Tamalika Mukherjee and
                  Noah Stephens{-}Davidowitz},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {213--242},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_8},
  doi          = {10.1007/978-3-030-56880-1\_8},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MukherjeeS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PatelPY20,
  author       = {Sarvar Patel and
                  Giuseppe Persiano and
                  Kevin Yeo},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in
                  the Leakage Cell Probe Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {433--463},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_15},
  doi          = {10.1007/978-3-030-56784-2\_15},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PatelPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PattonS20,
  author       = {Christopher Patton and
                  Thomas Shrimpton},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Quantifying the Security Cost of Migrating Protocols to Practice},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {94--124},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_4},
  doi          = {10.1007/978-3-030-56784-2\_4},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PattonS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Peyrin020,
  author       = {Thomas Peyrin and
                  Haoyang Wang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {The {MALICIOUS} Framework: Embedding Backdoors into Tweakable Block
                  Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {249--278},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_9},
  doi          = {10.1007/978-3-030-56877-1\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Peyrin020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rotem020,
  author       = {Lior Rotem and
                  Gil Segev},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Generically Speeding-Up Repeated Squaring Is Equivalent to Factoring:
                  Sharp Thresholds for All Generic-Ring Delay Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {481--509},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_17},
  doi          = {10.1007/978-3-030-56877-1\_17},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rotem020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Setty20,
  author       = {Srinath T. V. Setty},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Spartan: Efficient and General-Purpose zkSNARKs Without Trusted Setup},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {704--737},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_25},
  doi          = {10.1007/978-3-030-56877-1\_25},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Setty20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YangAYX20,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Zuoxia Yu and
                  Qiuliang Xu},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Collusion Resistant Watermarkable PRFs from Standard Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {590--620},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_20},
  doi          = {10.1007/978-3-030-56784-2\_20},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YangAYX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry020,
  author       = {Mark Zhandry and
                  Cong Zhang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Indifferentiability for Public Key Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {63--93},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_3},
  doi          = {10.1007/978-3-030-56784-2\_3},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry20,
  author       = {Mark Zhandry},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {New Techniques for Traitor Tracing: Size N\({}^{\mbox{1/3}}\) and
                  More from Pairings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {652--682},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_22},
  doi          = {10.1007/978-3-030-56784-2\_22},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2020-1,
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2},
  doi          = {10.1007/978-3-030-56784-2},
  isbn         = {978-3-030-56783-5},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2020-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2020-2,
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1},
  doi          = {10.1007/978-3-030-56880-1},
  isbn         = {978-3-030-56879-5},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2020-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2020-3,
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1},
  doi          = {10.1007/978-3-030-56877-1},
  isbn         = {978-3-030-56876-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2020-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001MW19,
  author       = {Divya Gupta and
                  Hemanta K. Maji and
                  Mingyuan Wang},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Explicit Rate-1 Non-malleable Codes for Local Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {435--466},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_16},
  doi          = {10.1007/978-3-030-26948-7\_16},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/0001MW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0002CHV19,
  author       = {Rohit Agrawal and
                  Yi{-}Hsiu Chen and
                  Thibaut Horel and
                  Salil P. Vadhan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Unifying Computational Entropies via Kullback-Leibler Divergence},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {831--858},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_28},
  doi          = {10.1007/978-3-030-26951-7\_28},
  timestamp    = {Fri, 09 Aug 2019 14:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0002CHV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalDNOPRS19,
  author       = {Divesh Aggarwal and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Maciej Obremski and
                  Erick Purwanto and
                  Jo{\~{a}}o Ribeiro and
                  Mark Simkin},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes
                  for General Access Structures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {510--539},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_18},
  doi          = {10.1007/978-3-030-26951-7\_18},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalDNOPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalM019,
  author       = {Shweta Agrawal and
                  Monosij Maitra and
                  Shota Yamada},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Attribute Based Encryption (and more) for Nondeterministic Finite
                  Automata from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {765--797},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_26},
  doi          = {10.1007/978-3-030-26951-7\_26},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlamatiMP19,
  author       = {Navid Alamati and
                  Hart Montgomery and
                  Sikhar Patranabis},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Symmetric Primitives with Structured Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {650--679},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_23},
  doi          = {10.1007/978-3-030-26948-7\_23},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlamatiMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AmbainisHU19,
  author       = {Andris Ambainis and
                  Mike Hamburg and
                  Dominique Unruh},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Quantum Security Proofs Using Semi-classical Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {269--295},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_10},
  doi          = {10.1007/978-3-030-26951-7\_10},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AmbainisHU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthJL0S19,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Huijia Lin and
                  Christian Matt and
                  Amit Sahai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms
                  via Low Degree Weak Pseudorandomness and Security Amplification},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {284--332},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_10},
  doi          = {10.1007/978-3-030-26954-8\_10},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthJL0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AtenieseFN019,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  David Nu{\~{n}}ez and
                  Daniele Venturi},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Match Me if You Can: Matchmaking Encryption and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {701--731},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_24},
  doi          = {10.1007/978-3-030-26951-7\_24},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AtenieseFN019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BallGW19,
  author       = {Marshall Ball and
                  Siyao Guo and
                  Daniel Wichs},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Non-malleable Codes for Decision Trees},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {413--434},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_15},
  doi          = {10.1007/978-3-030-26948-7\_15},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BallGW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BalleBGN19,
  author       = {Borja Balle and
                  James Bell and
                  Adri{\`{a}} Gasc{\'{o}}n and
                  Kobbi Nissim},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {The Privacy Blanket of the Shuffle Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {638--667},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_22},
  doi          = {10.1007/978-3-030-26951-7\_22},
  timestamp    = {Thu, 05 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BalleBGN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekMZ19,
  author       = {James Bartusek and
                  Fermi Ma and
                  Mark Zhandry},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {The Distinction Between Fixed and Random Generators in Group-Based
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {801--830},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_27},
  doi          = {10.1007/978-3-030-26951-7\_27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareNT19,
  author       = {Mihir Bellare and
                  Ruth Ng and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Nonces Are Noticed: {AEAD} Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {235--265},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_9},
  doi          = {10.1007/978-3-030-26948-7\_9},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareNT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-SassonBHR19,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Yinon Horesh and
                  Michael Riabzev},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Scalable Zero Knowledge with No Trusted Setup},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {701--732},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_23},
  doi          = {10.1007/978-3-030-26954-8\_23},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-SassonBHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyP19,
  author       = {Nir Bitansky and
                  Omer Paneth},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {On Round Optimal Statistical Zero Knowledge Arguments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {128--156},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_5},
  doi          = {10.1007/978-3-030-26954-8\_5},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlockiHKLXZ19,
  author       = {Jeremiah Blocki and
                  Benjamin Harsha and
                  Siteng Kang and
                  Seunghoon Lee and
                  Lu Xing and
                  Samson Zhou},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {573--607},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_20},
  doi          = {10.1007/978-3-030-26951-7\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BlockiHKLXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BogdanovIS19,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Unconditionally Secure Computation Against Low-Complexity Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {387--416},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_14},
  doi          = {10.1007/978-3-030-26951-7\_14},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BogdanovIS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehBCGI19,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_3},
  doi          = {10.1007/978-3-030-26954-8\_3},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehBCGI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehBF19,
  author       = {Dan Boneh and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Batching Techniques for Accumulators with Applications to IOPs and
                  Stateless Blockchains},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {561--586},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_20},
  doi          = {10.1007/978-3-030-26948-7\_20},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BootleLS19,
  author       = {Jonathan Bootle and
                  Vadim Lyubashevsky and
                  Gregor Seiler},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {176--202},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_7},
  doi          = {10.1007/978-3-030-26948-7\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BootleLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCGIKS19,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Lisa Kohl and
                  Peter Scholl},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Efficient Pseudorandom Correlation Generators: Silent {OT} Extension
                  and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {489--518},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_16},
  doi          = {10.1007/978-3-030-26954-8\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCGIKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BradleyJX19,
  author       = {Tatiana Bradley and
                  Stanislaw Jarecki and
                  Jiayu Xu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Strong Asymmetric {PAKE} Based on Trapdoor {CKEM}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {798--825},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_26},
  doi          = {10.1007/978-3-030-26954-8\_26},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BradleyJX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BronchainHMOS19,
  author       = {Olivier Bronchain and
                  Julien M. Hendrickx and
                  Cl{\'{e}}ment Massart and
                  Alex Olshevsky and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Leakage Certification Revisited: Bounding Model Errors in Side-Channel
                  Security Evaluations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {713--737},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_25},
  doi          = {10.1007/978-3-030-26948-7\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BronchainHMOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CastagnosCLST19,
  author       = {Guilhem Castagnos and
                  Dario Catalano and
                  Fabien Laguillaumie and
                  Federico Savasta and
                  Ida Tucker},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Two-Party {ECDSA} from Hash Proof Systems and Efficient Instantiations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {191--221},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_7},
  doi          = {10.1007/978-3-030-26954-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CastagnosCLST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChandranCOV19,
  author       = {Nishanth Chandran and
                  Wutichai Chongchitmate and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Universally Composable Secure Computation with Corrupted Tokens},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {432--461},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_14},
  doi          = {10.1007/978-3-030-26954-8\_14},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChandranCOV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaseDIKLOV19,
  author       = {Melissa Chase and
                  Yevgeniy Dodis and
                  Yuval Ishai and
                  Daniel Kraschewski and
                  Tianren Liu and
                  Rafail Ostrovsky and
                  Vinod Vaikuntanathan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Reusable Non-Interactive Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {462--488},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_15},
  doi          = {10.1007/978-3-030-26954-8\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaseDIKLOV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenCHM19,
  author       = {Binyi Chen and
                  Yilei Chen and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Pratyay Mukherjee},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {467--495},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_17},
  doi          = {10.1007/978-3-030-26948-7\_17},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenCHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenLM19,
  author       = {Yu Long Chen and
                  Eran Lambooij and
                  Bart Mennink},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {How to Build Pseudorandom Functions from Public Random Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {266--293},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_10},
  doi          = {10.1007/978-3-030-26948-7\_10},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenT19,
  author       = {Binyi Chen and
                  Stefano Tessaro},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Memory-Hard Functions from Cryptographic Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {543--572},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_19},
  doi          = {10.1007/978-3-030-26951-7\_19},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CheonCH0L19,
  author       = {Jung Hee Cheon and
                  Wonhee Cho and
                  Minki Hhan and
                  Jiseung Kim and
                  Changmin Lee},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Statistical Zeroizing Attack: Cryptanalysis of Candidates of {BP}
                  Obfuscation over {GGH15} Multilinear Map},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {253--283},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_9},
  doi          = {10.1007/978-3-030-26954-8\_9},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CheonCH0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenSW19,
  author       = {Ran Cohen and
                  Abhi Shelat and
                  Daniel Wichs},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Adaptively Secure {MPC} with Sublinear Communication Complexity},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {30--60},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_2},
  doi          = {10.1007/978-3-030-26951-7\_2},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Cohn-GordonCGJJ19,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Highly Efficient Key Exchange Protocols with Optimal Tightness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {767--797},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_25},
  doi          = {10.1007/978-3-030-26954-8\_25},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Cohn-GordonCGJJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CorettiDKT19,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Stefano Tessaro},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Seedless Fruit Is the Sweetest: Random Number Generation, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {205--234},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_8},
  doi          = {10.1007/978-3-030-26948-7\_8},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CorettiDKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CzajkowskiHS19,
  author       = {Jan Czajkowski and
                  Andreas H{\"{u}}lsing and
                  Christian Schaffner},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Quantum Indistinguishability of Random Sponges},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {296--325},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_11},
  doi          = {10.1007/978-3-030-26951-7\_11},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CzajkowskiHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardGO19,
  author       = {Ivan Damg{\aa}rd and
                  Chaya Ganesh and
                  Claudio Orlandi},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Proofs of Replicated Storage Without Timing Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {355--380},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_13},
  doi          = {10.1007/978-3-030-26948-7\_13},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardGO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardLN19,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Green Larsen and
                  Jesper Buus Nielsen},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Communication Lower Bounds for Statistically Secure MPC, With or Without
                  Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {61--84},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_3},
  doi          = {10.1007/978-3-030-26951-7\_3},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DonFMS19,
  author       = {Jelle Don and
                  Serge Fehr and
                  Christian Majenz and
                  Christian Schaffner},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle
                  Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {356--383},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_13},
  doi          = {10.1007/978-3-030-26951-7\_13},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DonFMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingGIMMO19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Yuval Ishai and
                  Giulio Malavolta and
                  Tamer Mour and
                  Rafail Ostrovsky},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Trapdoor Hash Functions and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_1},
  doi          = {10.1007/978-3-030-26954-8\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingGIMMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasPW19,
  author       = {L{\'{e}}o Ducas and
                  Maxime Plan{\c{c}}on and
                  Benjamin Wesolowski},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {322--351},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_12},
  doi          = {10.1007/978-3-030-26948-7\_12},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DucasPW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EsginSLL19,
  author       = {Muhammed F. Esgin and
                  Ron Steinfeld and
                  Joseph K. Liu and
                  Dongxi Liu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and
                  Faster Constructions and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {115--146},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_5},
  doi          = {10.1007/978-3-030-26948-7\_5},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EsginSLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Faonio019,
  author       = {Antonio Faonio and
                  Daniele Venturi},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Non-malleable Secret Sharing in the Computational Setting: Adaptive
                  Tampering, Noisy-Leakage Resilience, and Improved Rate},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {448--479},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_16},
  doi          = {10.1007/978-3-030-26951-7\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Faonio019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FreitagKP19,
  author       = {Cody Freitag and
                  Ilan Komargodski and
                  Rafael Pass},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {98--127},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_4},
  doi          = {10.1007/978-3-030-26954-8\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FreitagKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GhoshS19,
  author       = {Satrajit Ghosh and
                  Mark Simkin},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {The Communication Complexity of Threshold Private Set Intersection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {3--29},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_1},
  doi          = {10.1007/978-3-030-26951-7\_1},
  timestamp    = {Mon, 26 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GhoshS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Gohr19,
  author       = {Aron Gohr},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {150--179},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_6},
  doi          = {10.1007/978-3-030-26951-7\_6},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Gohr19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GongWW19,
  author       = {Junqing Gong and
                  Brent Waters and
                  Hoeteck Wee},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {{ABE} for {DFA} from k-Lin},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {732--764},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_25},
  doi          = {10.1007/978-3-030-26951-7\_25},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GongWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalJS19,
  author       = {Vipul Goyal and
                  Aayush Jain and
                  Amit Sahai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {608--637},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_21},
  doi          = {10.1007/978-3-030-26951-7\_21},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalKMWW19,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Nathan Manohar and
                  Brent Waters and
                  David J. Wu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Watermarking Public-Key Cryptographic Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {367--398},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_12},
  doi          = {10.1007/978-3-030-26954-8\_12},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalKMWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalLS19,
  author       = {Vipul Goyal and
                  Yanyi Liu and
                  Yifan Song},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Communication-Efficient Unconditional {MPC} with Guaranteed Output
                  Delivery},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {85--114},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_4},
  doi          = {10.1007/978-3-030-26951-7\_4},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalQWW19,
  author       = {Rishab Goyal and
                  Willy Quach and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Broadcast and Trace with N{\(\epsilon\)} Ciphertext Size from Standard
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {826--855},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_27},
  doi          = {10.1007/978-3-030-26954-8\_27},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalQWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuoPS19,
  author       = {Yue Guo and
                  Rafael Pass and
                  Elaine Shi},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Synchronous, with a Chance of Partition Tolerance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {499--529},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_18},
  doi          = {10.1007/978-3-030-26948-7\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuoPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HamlinHWW19,
  author       = {Ariel Hamlin and
                  Justin Holmgren and
                  Mor Weiss and
                  Daniel Wichs},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {On the Plausibility of Fully Homomorphic Encryption for RAMs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {589--619},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_21},
  doi          = {10.1007/978-3-030-26948-7\_21},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HamlinHWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HanLLG19,
  author       = {Shuai Han and
                  Shengli Liu and
                  Lin Lyu and
                  Dawu Gu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof
                  System},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {417--447},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_15},
  doi          = {10.1007/978-3-030-26951-7\_15},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HanLLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/InoueIMP19,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Bertram Poettering},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_1},
  doi          = {10.1007/978-3-030-26948-7\_1},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/InoueIMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKOS19,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Cryptographic Sensing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {583--604},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_19},
  doi          = {10.1007/978-3-030-26954-8\_19},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JaquesS19,
  author       = {Samuel Jaques and
                  John M. Schanck},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Quantum Cryptanalysis in the {RAM} Model: Claw-Finding Attacks on
                  {SIKE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {32--61},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_2},
  doi          = {10.1007/978-3-030-26948-7\_2},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JaquesS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiK19,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Non-interactive Non-malleability from Quantum Supremacy},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {552--582},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_18},
  doi          = {10.1007/978-3-030-26954-8\_18},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KatsumataN0Y19,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Exploring Constructions of Compact NIZKs from Various Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {639--669},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_21},
  doi          = {10.1007/978-3-030-26954-8\_21},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KatsumataN0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimW19,
  author       = {Sam Kim and
                  David J. Wu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Watermarking PRFs from Lattices: Stronger Security via Extractable
                  PRFs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {335--366},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_11},
  doi          = {10.1007/978-3-030-26954-8\_11},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kitagawa0T19,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {{CCA} Security and Trapdoor Functions via Key-Dependent-Message Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {33--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_2},
  doi          = {10.1007/978-3-030-26954-8\_2},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kitagawa0T19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KitagawaNTY19,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka and
                  Takashi Yamakawa},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Adaptively Secure and Succinct Functional Encryption: Improving Security
                  and Efficiency, Simultaneously},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {521--551},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_17},
  doi          = {10.1007/978-3-030-26954-8\_17},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KitagawaNTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KoppulaW19,
  author       = {Venkata Koppula and
                  Brent Waters},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Realizing Chosen Ciphertext Security Generically in Attribute-Based
                  Encryption and Predicate Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {671--700},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_23},
  doi          = {10.1007/978-3-030-26951-7\_23},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KoppulaW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LaVigneLW19,
  author       = {Rio LaVigne and
                  Andrea Lincoln and
                  Virginia Vassilevska Williams},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Public-Key Cryptography in the Fine-Grained Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {605--635},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_20},
  doi          = {10.1007/978-3-030-26954-8\_20},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LaVigneLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LaiM19,
  author       = {Russell W. F. Lai and
                  Giulio Malavolta},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Subvector Commitments with Application to Succinct Arguments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {530--560},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_19},
  doi          = {10.1007/978-3-030-26948-7\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LaiM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LeurentS19,
  author       = {Ga{\"{e}}tan Leurent and
                  Ferdinand Sibleyras},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR
                  Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {210--235},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_8},
  doi          = {10.1007/978-3-030-26951-7\_8},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LeurentS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuDMIWC19,
  author       = {Fukang Liu and
                  Christoph Dobraunig and
                  Florian Mendel and
                  Takanori Isobe and
                  Gaoli Wang and
                  Zhenfu Cao},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Efficient Collision Attack Frameworks for {RIPEMD-160}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {117--149},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_5},
  doi          = {10.1007/978-3-030-26951-7\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuDMIWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuZ19,
  author       = {Qipeng Liu and
                  Mark Zhandry},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Revisiting Post-quantum Fiat-Shamir},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {326--355},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_12},
  doi          = {10.1007/978-3-030-26951-7\_12},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LombardiQRWW19,
  author       = {Alex Lombardi and
                  Willy Quach and
                  Ron D. Rothblum and
                  Daniel Wichs and
                  David J. Wu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {New Constructions of Reusable Designated-Verifier NIZKs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {670--700},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_22},
  doi          = {10.1007/978-3-030-26954-8\_22},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LombardiQRWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MalavoltaT19,
  author       = {Giulio Malavolta and
                  Sri Aravinda Krishnan Thyagarajan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Homomorphic Time-Lock Puzzles and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {620--649},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_22},
  doi          = {10.1007/978-3-030-26948-7\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MalavoltaT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MoranO19,
  author       = {Tal Moran and
                  Ilan Orlov},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Simple Proofs of Space-Time and Rational Proofs of Storage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {381--409},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_14},
  doi          = {10.1007/978-3-030-26948-7\_14},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MoranO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ParkS19,
  author       = {Sunoo Park and
                  Adam Sealfon},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {It Wasn't Me! - Repudiability and Claimability of Ring Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {159--190},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_6},
  doi          = {10.1007/978-3-030-26954-8\_6},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ParkS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PattonS19,
  author       = {Christopher Patton and
                  Thomas Shrimpton},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Security in the Presence of Key Reuse: Context-Separable Interfaces
                  and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {738--768},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_26},
  doi          = {10.1007/978-3-030-26948-7\_26},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PattonS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PeikertS19,
  author       = {Chris Peikert and
                  Sina Shiehian},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Noninteractive Zero Knowledge for {NP} from (Plain) Learning with
                  Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {89--114},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_4},
  doi          = {10.1007/978-3-030-26948-7\_4},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PeikertS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PinkasRTY19,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT}
                  Extension},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {401--431},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_13},
  doi          = {10.1007/978-3-030-26954-8\_13},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PinkasRTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PrestGMP19,
  author       = {Thomas Prest and
                  Dahmun Goudarzi and
                  Ange Martinelli and
                  Alain Passel{\`{e}}gue},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Unifying Leakage Models on a R{\'{e}}nyi Day},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {683--712},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_24},
  doi          = {10.1007/978-3-030-26948-7\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PrestGMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShiSSLH19,
  author       = {Danping Shi and
                  Siwei Sun and
                  Yu Sasaki and
                  Chaoyun Li and
                  Lei Hu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions
                  of Full {\textbackslash}mathsf {MORUS}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {180--209},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_7},
  doi          = {10.1007/978-3-030-26951-7\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ShiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SrinivasanV19,
  author       = {Akshayaram Srinivasan and
                  Prashant Nalini Vasudevan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Leakage Resilient Secret Sharing and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {480--509},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_17},
  doi          = {10.1007/978-3-030-26951-7\_17},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SrinivasanV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Tsabary19,
  author       = {Rotem Tsabary},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Fully Secure Attribute-Based Encryption for t-CNF from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {62--85},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_3},
  doi          = {10.1007/978-3-030-26948-7\_3},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Tsabary19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TyagiGLMR19,
  author       = {Nirvan Tyagi and
                  Paul Grubbs and
                  Julia Len and
                  Ian Miers and
                  Thomas Ristenpart},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Asymmetric Message Franking: Content Moderation for Metadata-Private
                  End-to-End Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {222--250},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_8},
  doi          = {10.1007/978-3-030-26954-8\_8},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/TyagiGLMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/XieZZPS19,
  author       = {Tiancheng Xie and
                  Jiaheng Zhang and
                  Yupeng Zhang and
                  Charalampos Papamanthou and
                  Dawn Song},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {733--764},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_24},
  doi          = {10.1007/978-3-030-26954-8\_24},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/XieZZPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Xu0HWP19,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Huaxiong Wang and
                  Yanbin Pan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {New Results on Modular Inversion Hidden Number Problem and Inversive
                  Congruential Generator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {297--321},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_11},
  doi          = {10.1007/978-3-030-26948-7\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Xu0HWP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YangAZXYW19,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Zhenfei Zhang and
                  Qiuliang Xu and
                  Zuoxia Yu and
                  William Whyte},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness:
                  Construction and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {147--175},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_6},
  doi          = {10.1007/978-3-030-26948-7\_6},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YangAZXYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry19,
  author       = {Mark Zhandry},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {How to Record Quantum Queries, and Applications to Quantum Indifferentiability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {239--268},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_9},
  doi          = {10.1007/978-3-030-26951-7\_9},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2019-1,
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7},
  doi          = {10.1007/978-3-030-26948-7},
  isbn         = {978-3-030-26947-0},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2019-2,
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7},
  doi          = {10.1007/978-3-030-26951-7},
  isbn         = {978-3-030-26950-0},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2019-3,
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8},
  doi          = {10.1007/978-3-030-26954-8},
  isbn         = {978-3-030-26953-1},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2019-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaCFGU18,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Dario Fiore and
                  Romain Gay and
                  Bogdan Ursu},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Multi-Input Functional Encryption for Inner Products: Function-Hiding
                  Realizations and Constructions Without Pairings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {597--627},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_20},
  doi          = {10.1007/978-3-319-96884-1\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaCFGU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalJPS18,
  author       = {Divesh Aggarwal and
                  Antoine Joux and
                  Anupam Prakash and
                  Miklos Santha},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {A New Public-Key Cryptosystem via Mersenne Numbers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {459--482},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_16},
  doi          = {10.1007/978-3-319-96878-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalJPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGM18,
  author       = {Shashank Agrawal and
                  Chaya Ganesh and
                  Payman Mohassel},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Non-Interactive Zero-Knowledge Proofs for Composite Statements},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {643--673},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_22},
  doi          = {10.1007/978-3-319-96878-0\_22},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthCG018,
  author       = {Prabhanjan Ananth and
                  Arka Rai Choudhuri and
                  Aarushi Goel and
                  Abhishek Jain},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Round-Optimal Secure Multiparty Computation with Honest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {395--424},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_14},
  doi          = {10.1007/978-3-319-96881-0\_14},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthCG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthIS18,
  author       = {Prabhanjan Ananth and
                  Yuval Ishai and
                  Amit Sahai},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Private Circuits: {A} Modular Approach},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {427--455},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_15},
  doi          = {10.1007/978-3-319-96878-0\_15},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AonoNSS18,
  author       = {Yoshinori Aono and
                  Phong Q. Nguyen and
                  Takenobu Seito and
                  Junji Shikata},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Lower Bounds on Lattice Enumeration with Extreme Pruning},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {608--637},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_21},
  doi          = {10.1007/978-3-319-96881-0\_21},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AonoNSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AsharovEKP18,
  author       = {Gilad Asharov and
                  Naomi Ephraim and
                  Ilan Komargodski and
                  Rafael Pass},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On the Complexity of Compressing Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {753--783},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_26},
  doi          = {10.1007/978-3-319-96878-0\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AsharovEKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AsharovSS18,
  author       = {Gilad Asharov and
                  Gil Segev and
                  Ido Shahaf},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Tight Tradeoffs in Searchable Symmetric Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {407--436},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_14},
  doi          = {10.1007/978-3-319-96884-1\_14},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AsharovSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Attrapadung0N0Y18,
  author       = {Nuttapong Attrapadung and
                  Takahiro Matsuda and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Constrained PRFs for {\textbackslash}mathrmNC1 in Traditional Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {543--574},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_19},
  doi          = {10.1007/978-3-319-96881-0\_19},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Attrapadung0N0Y18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BadrinarayananG18,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Promise Zero Knowledge and Its Applications to Round Optimal {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {459--487},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_16},
  doi          = {10.1007/978-3-319-96881-0\_16},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BadrinarayananG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BallRSV18,
  author       = {Marshall Ball and
                  Alon Rosen and
                  Manuel Sabin and
                  Prashant Nalini Vasudevan},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Proofs of Work From Worst-Case Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {789--819},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_26},
  doi          = {10.1007/978-3-319-96884-1\_26},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BallRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18,
  author       = {Achiya Bar{-}On and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
                  Data and Memory Complexities},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {185--212},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_7},
  doi          = {10.1007/978-3-319-96881-0\_7},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Bar-OnDKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarbosaF18,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Indifferentiable Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {187--220},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_7},
  doi          = {10.1007/978-3-319-96884-1\_7},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarbosaF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BauerFM18,
  author       = {Balthazar Bauer and
                  Pooya Farshim and
                  Sogol Mazaheri},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Combiners for Backdoored Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {272--302},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_10},
  doi          = {10.1007/978-3-319-96881-0\_10},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BauerFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaumBCPGL18,
  author       = {Carsten Baum and
                  Jonathan Bootle and
                  Andrea Cerulli and
                  Rafa{\"{e}}l del Pino and
                  Jens Groth and
                  Vadim Lyubashevsky},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Sub-linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {669--699},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_23},
  doi          = {10.1007/978-3-319-96881-0\_23},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaumBCPGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-ZviKT18,
  author       = {Adi Ben{-}Zvi and
                  Arkadius G. Kalka and
                  Boaz Tsaban},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Cryptanalysis via Algebraic Spans},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {255--274},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_9},
  doi          = {10.1007/978-3-319-96884-1\_9},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-ZviKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaDIR18,
  author       = {Fabrice Benhamouda and
                  Akshay Degwekar and
                  Yuval Ishai and
                  Tal Rabin},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On the Local Leakage Resilience of Linear Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {531--561},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_18},
  doi          = {10.1007/978-3-319-96884-1\_18},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaDIR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BermanDRV18,
  author       = {Itay Berman and
                  Akshay Degwekar and
                  Ron D. Rothblum and
                  Prashant Nalini Vasudevan},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {From Laconic Zero-Knowledge to Public-Key Cryptography - Extended
                  Abstract},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {674--697},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_23},
  doi          = {10.1007/978-3-319-96878-0\_23},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BermanDRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BishopKMP0S18,
  author       = {Allison Bishop and
                  Lucas Kowalczyk and
                  Tal Malkin and
                  Valerio Pastro and
                  Mariana Raykova and
                  Kevin Shi},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {731--752},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_25},
  doi          = {10.1007/978-3-319-96878-0\_25},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BishopKMP0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehBBF18,
  author       = {Dan Boneh and
                  Joseph Bonneau and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Verifiable Delay Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {757--788},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_25},
  doi          = {10.1007/978-3-319-96884-1\_25},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehBBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Aayush Jain and
                  Sam Kim and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {565--596},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_19},
  doi          = {10.1007/978-3-319-96884-1\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehGGJKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BourseMMP18,
  author       = {Florian Bourse and
                  Michele Minelli and
                  Matthias Minihold and
                  Pascal Paillier},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {483--512},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_17},
  doi          = {10.1007/978-3-319-96878-0\_17},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BourseMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCDH18,
  author       = {Elette Boyle and
                  Ran Cohen and
                  Deepesh Data and
                  Pavel Hub{\'{a}}cek},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Must the Communication Graph of {MPC} Protocols be an Expander?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {243--272},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_9},
  doi          = {10.1007/978-3-319-96878-0\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleIP18,
  author       = {Elette Boyle and
                  Yuval Ishai and
                  Antigoni Polychroniadou},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Limits of Practical Sublinear Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {302--332},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_11},
  doi          = {10.1007/978-3-319-96878-0\_11},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleIP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Brakerski18,
  author       = {Zvika Brakerski},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Quantum {FHE} (Almost) As Secure As Classical},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {67--95},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_3},
  doi          = {10.1007/978-3-319-96878-0\_3},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Brakerski18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CascudoCXY18,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Amortized Complexity of Information-Theoretically Secure {MPC} Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {395--426},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_14},
  doi          = {10.1007/978-3-319-96878-0\_14},
  timestamp    = {Sat, 25 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CascudoCXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenVW18,
  author       = {Yilei Chen and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {{GGH15} Beyond Permutation Branching Programs: Proofs, Attacks, and
                  Candidates},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {577--607},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_20},
  doi          = {10.1007/978-3-319-96881-0\_20},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CheonHKL18,
  author       = {Jung Hee Cheon and
                  Minki Hhan and
                  Jiseung Kim and
                  Changmin Lee},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Cryptanalyses of Branching Program Obfuscations over {GGH13} Multilinear
                  Map from the {NTRU} Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {184--210},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_7},
  doi          = {10.1007/978-3-319-96878-0\_7},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CheonHKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChidaGHIKLN18,
  author       = {Koji Chida and
                  Daniel Genkin and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Yehuda Lindell and
                  Ariel Nof},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {34--64},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_2},
  doi          = {10.1007/978-3-319-96878-0\_2},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChidaGHIKLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CogliatiDKLSTZ18,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yevgeniy Dodis and
                  Jonathan Katz and
                  Jooyoung Lee and
                  John P. Steinberger and
                  Aishwarya Thiruvengadam and
                  Zhe Zhang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation
                  Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {722--753},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_24},
  doi          = {10.1007/978-3-319-96884-1\_24},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CogliatiDKLSTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CorettiDG18,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Siyao Guo},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group
                  Models},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {693--721},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_23},
  doi          = {10.1007/978-3-319-96884-1\_23},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CorettiDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDESX18,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Peter Scholl and
                  Chaoping Xing},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC}
                  mod 2\({}^{\mbox{k}}\) for Dishonest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {769--798},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_26},
  doi          = {10.1007/978-3-319-96881-0\_26},
  timestamp    = {Mon, 12 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDESX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardOS18,
  author       = {Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Mark Simkin},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Yet Another Compiler for Active Security or: Efficient {MPC} Over
                  Arbitrary Rings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {799--829},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_27},
  doi          = {10.1007/978-3-319-96881-0\_27},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DattaDNY18,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Kan Yasuda},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based
                  {MAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {631--661},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_21},
  doi          = {10.1007/978-3-319-96884-1\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DattaDNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DemertzisPP18,
  author       = {Ioannis Demertzis and
                  Dimitrios Papadopoulos and
                  Charalampos Papamanthou},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Searchable Encryption with Optimal Locality: Achieving Sublogarithmic
                  Read Efficiency},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {371--406},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_13},
  doi          = {10.1007/978-3-319-96884-1\_13},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DemertzisPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurKK18,
  author       = {Itai Dinur and
                  Nathan Keller and
                  Ohad Klein},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {An Optimal Distributed Discrete Log Protocol with Applications to
                  Homomorphic Secret Sharing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {213--242},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_8},
  doi          = {10.1007/978-3-319-96878-0\_8},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DobraunigE0LLLM18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Lorenzo Grassi and
                  Virginie Lallemand and
                  Gregor Leander and
                  Eik List and
                  Florian Mendel and
                  Christian Rechberger},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Rasta: {A} Cipher with Low ANDdepth and Few ANDs per Bit},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {662--692},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_22},
  doi          = {10.1007/978-3-319-96884-1\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DobraunigE0LLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisGRW18,
  author       = {Yevgeniy Dodis and
                  Paul Grubbs and
                  Thomas Ristenpart and
                  Joanne Woodage},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Message Franking: From Invisible Salamanders to Encryptment},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {155--186},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_6},
  doi          = {10.1007/978-3-319-96884-1\_6},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisGRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EsserHK0S18,
  author       = {Andre Esser and
                  Felix Heuer and
                  Robert K{\"{u}}bler and
                  Alexander May and
                  Christian Sohler},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Dissection-BKW},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {638--666},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_22},
  doi          = {10.1007/978-3-319-96881-0\_22},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EsserHK0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FrederiksenLOP18,
  author       = {Tore Kasper Frederiksen and
                  Yehuda Lindell and
                  Valery Osheter and
                  Benny Pinkas},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Distributed {RSA} Key Generation for Semi-honest and Malicious
                  Adversaries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {331--361},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_12},
  doi          = {10.1007/978-3-319-96881-0\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FrederiksenLOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuWDM18,
  author       = {Ximing Fu and
                  Xiaoyun Wang and
                  Xiaoyang Dong and
                  Willi Meier},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {A Key-Recovery Attack on 855-round Trivium},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {160--184},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_6},
  doi          = {10.1007/978-3-319-96881-0\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FuWDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuchsbauerKL18,
  author       = {Georg Fuchsbauer and
                  Eike Kiltz and
                  Julian Loss},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {The Algebraic Group Model and its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {33--62},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_2},
  doi          = {10.1007/978-3-319-96881-0\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FuchsbauerKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargH18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Trapdoor Functions from the Computational Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {362--391},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_13},
  doi          = {10.1007/978-3-319-96881-0\_13},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargHMM18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Limits on the Power of Garbling Techniques for Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {335--364},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_12},
  doi          = {10.1007/978-3-319-96878-0\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GargHMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargMMM18,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Daniel Masny and
                  Izaak Meckler},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On the Round Complexity of {OT} Extension},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {545--574},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_19},
  doi          = {10.1007/978-3-319-96878-0\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GargMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargMS18,
  author       = {Sanjam Garg and
                  Peihan Miao and
                  Akshayaram Srinivasan},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Two-Round Multiparty Secure Computation Minimizing Public Key Operations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {273--301},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_10},
  doi          = {10.1007/978-3-319-96878-0\_10},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargOS18,
  author       = {Sanjam Garg and
                  Rafail Ostrovsky and
                  Akshayaram Srinivasan},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Adaptive Garbled {RAM} from Laconic Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {515--544},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_18},
  doi          = {10.1007/978-3-319-96878-0\_18},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GjosteenJ18,
  author       = {Kristian Gj{\o}steen and
                  Tibor Jager},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Practical and Tightly-Secure Digital Signatures and Authenticated
                  Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {95--125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_4},
  doi          = {10.1007/978-3-319-96881-0\_4},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GjosteenJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Goyal018,
  author       = {Vipul Goyal and
                  Ashutosh Kumar},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Non-malleable Secret Sharing for General Access Structures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {501--530},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_17},
  doi          = {10.1007/978-3-319-96884-1\_17},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Goyal018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalKRW18,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Andrew Russell and
                  Brent Waters},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Risky Traitor Tracing and New Differential Privacy Negative Results},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {467--497},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_16},
  doi          = {10.1007/978-3-319-96884-1\_16},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalKRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GrothKMMM18,
  author       = {Jens Groth and
                  Markulf Kohlweiss and
                  Mary Maller and
                  Sarah Meiklejohn and
                  Ian Miers},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Updatable and Universal Common Reference Strings with Applications
                  to zk-SNARKs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {698--728},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_24},
  doi          = {10.1007/978-3-319-96878-0\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GrothKMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviHPV18,
  author       = {Shai Halevi and
                  Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Round-Optimal Secure Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {488--520},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_17},
  doi          = {10.1007/978-3-319-96881-0\_17},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviHPV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviS18,
  author       = {Shai Halevi and
                  Victor Shoup},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Faster Homomorphic Linear Transformations in HElib},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {93--120},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_4},
  doi          = {10.1007/978-3-319-96884-1\_4},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HazayOSS18,
  author       = {Carmit Hazay and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Eduardo Soria{-}Vazquez},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {TinyKeys: {A} New Approach to Efficient Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_1},
  doi          = {10.1007/978-3-319-96878-0\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HazayOSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HesseHK18,
  author       = {Julia Hesse and
                  Dennis Hofheinz and
                  Lisa Kohl},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On Tightly Secure Non-Interactive Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {65--94},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_3},
  doi          = {10.1007/978-3-319-96881-0\_3},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HesseHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangTT18,
  author       = {Viet Tung Hoang and
                  Stefano Tessaro and
                  Ni Trieu},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {The Curse of Small Domains: New Attacks on Format-Preserving Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {221--251},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_8},
  doi          = {10.1007/978-3-319-96884-1\_8},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JaegerS18,
  author       = {Joseph Jaeger and
                  Igors Stepanovs},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Optimal Channel Security Against Fine-Grained State Compromise: The
                  Safety of Messaging},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {33--62},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_2},
  doi          = {10.1007/978-3-319-96884-1\_2},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JaegerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JiL018,
  author       = {Zhengfeng Ji and
                  Yi{-}Kai Liu and
                  Fang Song},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Pseudorandom Quantum States},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {126--152},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_5},
  doi          = {10.1007/978-3-319-96878-0\_5},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/JiL018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JiangZCWM18,
  author       = {Haodong Jiang and
                  Zhenfeng Zhang and
                  Long Chen and
                  Hong Wang and
                  Zhi Ma},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle
                  Model, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {96--125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_4},
  doi          = {10.1007/978-3-319-96878-0\_4},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JiangZCWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KamaraMO18,
  author       = {Seny Kamara and
                  Tarik Moataz and
                  Olga Ohrimenko},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Structured Encryption and Leakage Suppression},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {339--370},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_12},
  doi          = {10.1007/978-3-319-96884-1\_12},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KamaraMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KatzRR018,
  author       = {Jonathan Katz and
                  Samuel Ranellucci and
                  Mike Rosulek and
                  Xiao Wang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {365--391},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_13},
  doi          = {10.1007/978-3-319-96878-0\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KatzRR018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiayiasLT18,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Non-Malleable Codes for Partial Functions with Manipulation Detection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {577--607},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_20},
  doi          = {10.1007/978-3-319-96878-0\_20},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiayiasLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimW18,
  author       = {Sam Kim and
                  David J. Wu},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Multi-Theorem Preprocessing NIZKs from Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {733--765},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_25},
  doi          = {10.1007/978-3-319-96881-0\_25},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KomargodskiY18,
  author       = {Ilan Komargodski and
                  Eylon Yogev},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On Distributional Collision Resistant Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {303--327},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_11},
  doi          = {10.1007/978-3-319-96881-0\_11},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KomargodskiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KowalczykMUW18,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Daniel Wichs},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Hardness of Non-interactive Differential Privacy from One-Way Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {437--466},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_15},
  doi          = {10.1007/978-3-319-96884-1\_15},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KowalczykMUW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LarsenN18,
  author       = {Kasper Green Larsen and
                  Jesper Buus Nielsen},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Yes, There is an Oblivious {RAM} Lower Bound!},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {523--542},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_18},
  doi          = {10.1007/978-3-319-96881-0\_18},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LarsenN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LeurentNS18,
  author       = {Ga{\"{e}}tan Leurent and
                  Mridul Nandi and
                  Ferdinand Sibleyras},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Generic Attacks Against Beyond-Birthday-Bound MACs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {306--336},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_11},
  doi          = {10.1007/978-3-319-96884-1\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LeurentNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertLNW18,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Lattice-Based Zero-Knowledge Arguments for Integer Relations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {700--732},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_24},
  doi          = {10.1007/978-3-319-96881-0\_24},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertLNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Nandi18,
  author       = {Mridul Nandi},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Bernstein Bound on {WCS} is Tight - Repairing Luykx-Preneel Optimal
                  Forgeries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {213--238},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_8},
  doi          = {10.1007/978-3-319-96881-0\_8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Nandi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OstrovskyP0V18,
  author       = {Rafail Ostrovsky and
                  Giuseppe Persiano and
                  Daniele Venturi and
                  Ivan Visconti},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Continuously Non-Malleable Codes in the Split-State Model from Minimal
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {608--639},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_21},
  doi          = {10.1007/978-3-319-96878-0\_21},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OstrovskyP0V18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PatraR18,
  author       = {Arpita Patra and
                  Divya Ravi},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {On the Exact Round Complexity of Secure Three-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {425--458},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_15},
  doi          = {10.1007/978-3-319-96881-0\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/PatraR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Pellet-Mary18,
  author       = {Alice Pellet{-}Mary},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Quantum Attacks Against Indistinguishablility Obfuscators Proved Secure
                  in the Weak Multilinear Map Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {153--183},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_6},
  doi          = {10.1007/978-3-319-96878-0\_6},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Pellet-Mary18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PoetteringR18,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Towards Bidirectional Ratcheted Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_1},
  doi          = {10.1007/978-3-319-96884-1\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PoetteringR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ReparazMBANNS18,
  author       = {Oscar Reparaz and
                  Lauren De Meyer and
                  Beg{\"{u}}l Bilgin and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Nigel P. Smart},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {{CAPA:} The Spirit of Beaver Against Physical Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_5},
  doi          = {10.1007/978-3-319-96884-1\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ReparazMBANNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RogawayZ18,
  author       = {Phillip Rogaway and
                  Yusi Zhang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Simplifying Game-Based Definitions - Indistinguishability up to Correctness
                  and Its Application to Stateful {AE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_1},
  doi          = {10.1007/978-3-319-96881-0\_1},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RogawayZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RotemS18,
  author       = {Lior Rotem and
                  Gil Segev},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Out-of-Band Authentication in Group Messaging: Computational, Statistical,
                  Optimal},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {63--89},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_3},
  doi          = {10.1007/978-3-319-96884-1\_3},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RotemS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Russell0YZ18,
  author       = {Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Correcting Subverted Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {241--271},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_9},
  doi          = {10.1007/978-3-319-96881-0\_9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Russell0YZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TodoIMAZ18,
  author       = {Yosuke Todo and
                  Takanori Isobe and
                  Willi Meier and
                  Kazumaro Aoki and
                  Bin Zhang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a,
                  Grain-128, and Grain-v1},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {129--159},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_5},
  doi          = {10.1007/978-3-319-96881-0\_5},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/TodoIMAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangHTLIM18,
  author       = {Qingju Wang and
                  Yonglin Hao and
                  Yosuke Todo and
                  Chaoyun Li and
                  Takanori Isobe and
                  Willi Meier},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Improved Division Property Based Cube Attacks Exploiting Algebraic
                  Properties of Superpoly},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {275--305},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_10},
  doi          = {10.1007/978-3-319-96884-1\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WangHTLIM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-1,
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1},
  doi          = {10.1007/978-3-319-96884-1},
  isbn         = {978-3-319-96883-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-2,
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0},
  doi          = {10.1007/978-3-319-96881-0},
  isbn         = {978-3-319-96880-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-3,
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0},
  doi          = {10.1007/978-3-319-96878-0},
  isbn         = {978-3-319-96877-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2018-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001M17,
  author       = {Felix G{\"{u}}nther and
                  Sogol Mazaheri},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {A Formal Treatment of Multi-key Channels},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {587--618},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_20},
  doi          = {10.1007/978-3-319-63697-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001M17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001Y17,
  author       = {Fang Song and
                  Aaram Yun},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Quantum Security of {NMAC} and Related Constructions - {PRF} Domain
                  Extension Against Quantum attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {283--309},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_10},
  doi          = {10.1007/978-3-319-63715-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0002KKR17,
  author       = {Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Ron Rothblum},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Distinguisher-Dependent Simulation in Two Rounds and its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {158--189},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_6},
  doi          = {10.1007/978-3-319-63715-0\_6},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0002KKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeHNOP17,
  author       = {Masayuki Abe and
                  Dennis Hofheinz and
                  Ryo Nishimaki and
                  Miyako Ohkubo and
                  Jiaxin Pan},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Compact Structure-Preserving Signatures with Almost Tight Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {548--580},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_19},
  doi          = {10.1007/978-3-319-63715-0\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeHNOP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Agrawal17,
  author       = {Shweta Agrawal},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Stronger Security for Reusable Garbled Circuits, General Definitions
                  and Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {3--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_1},
  doi          = {10.1007/978-3-319-63688-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Agrawal17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AkaviaLM17,
  author       = {Adi Akavia and
                  Rio LaVigne and
                  Tal Moran},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Topology-Hiding Computation on All Graphs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {447--467},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_15},
  doi          = {10.1007/978-3-319-63688-7\_15},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AkaviaLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlagicM17,
  author       = {Gorjan Alagic and
                  Christian Majenz},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Quantum Non-malleability and Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {310--341},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_11},
  doi          = {10.1007/978-3-319-63715-0\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlagicM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AmbronaBS17,
  author       = {Miguel Ambrona and
                  Gilles Barthe and
                  Benedikt Schmidt},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Generic Transformations of Predicate Encodings: Constructions and
                  Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {36--66},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_2},
  doi          = {10.1007/978-3-319-63688-7\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AmbronaBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ananth0S17,
  author       = {Prabhanjan Ananth and
                  Abhishek Jain and
                  Amit Sahai},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Indistinguishability Obfuscation for Turing Machines: Constant Overhead
                  and Amortization},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {252--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_9},
  doi          = {10.1007/978-3-319-63715-0\_9},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ananth0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthC017,
  author       = {Prabhanjan Ananth and
                  Arka Rai Choudhuri and
                  Abhishek Jain},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {A New Approach to Round-Optimal Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {468--499},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_16},
  doi          = {10.1007/978-3-319-63688-7\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthC017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumARV17,
  author       = {Benny Applebaum and
                  Barak Arkis and
                  Pavel Raykov and
                  Prashant Nalini Vasudevan},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Conditional Disclosure of Secrets: Amplification, Closure, Amortization,
                  Lower-Bounds, and Separations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {727--757},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_24},
  doi          = {10.1007/978-3-319-63688-7\_24},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumARV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumDI0Z17,
  author       = {Benny Applebaum and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Michael Nielsen and
                  Lior Zichron},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Secure Arithmetic Computation with Constant Computational Overhead},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {223--254},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_8},
  doi          = {10.1007/978-3-319-63688-7\_8},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumDI0Z17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AshurDL17,
  author       = {Tomer Ashur and
                  Orr Dunkelman and
                  Atul Luykx},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Boosting Authenticated Encryption Robustness with Minimal Modifications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_1},
  doi          = {10.1007/978-3-319-63697-9\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AshurDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AuerbachCFK17,
  author       = {Benedikt Auerbach and
                  David Cash and
                  Manuel Fersch and
                  Eike Kiltz},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Memory-Tight Reductions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {101--132},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_4},
  doi          = {10.1007/978-3-319-63688-7\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AuerbachCFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BadertscherMTZ17,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Bitcoin as a Transaction Ledger: {A} Composable Treatment},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {324--356},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_11},
  doi          = {10.1007/978-3-319-63688-7\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BadertscherMTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BalticoCFG17,
  author       = {Carmen Elisabetta Zaira Baltico and
                  Dario Catalano and
                  Dario Fiore and
                  Romain Gay},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Practical Functional Encryption for Quadratic Functions with Applications
                  to Predicate Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {67--98},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_3},
  doi          = {10.1007/978-3-319-63688-7\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BalticoCFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bao00G17,
  author       = {Zhenzhen Bao and
                  Lei Wang and
                  Jian Guo and
                  Dawu Gu},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on
                  Hash Combiners},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {404--427},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_14},
  doi          = {10.1007/978-3-319-63715-0\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Bao00G17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleCLR17,
  author       = {Christof Beierle and
                  Anne Canteaut and
                  Gregor Leander and
                  Yann Rotella},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Proving Resistance Against Invariant Attacks: How to Choose the Round
                  Constants},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {647--678},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_22},
  doi          = {10.1007/978-3-319-63715-0\_22},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeierleCLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelaidBPPTV17,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Emmanuel Prouff and
                  Adrian Thillard and
                  Damien Vergnaud},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Private Multiplication over Finite Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {397--426},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_14},
  doi          = {10.1007/978-3-319-63697-9\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BelaidBPPTV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareSJNS17,
  author       = {Mihir Bellare and
                  Asha Camper Singh and
                  Joseph Jaeger and
                  Maya Nyayapati and
                  Igors Stepanovs},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Ratcheted Encryption and Key Exchange: The Security of Messaging},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {619--650},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_21},
  doi          = {10.1007/978-3-319-63697-9\_21},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareSJNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaKR17,
  author       = {Fabrice Benhamouda and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Robust Non-interactive Multiparty Computation Against Constant-Size
                  Collusion},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {391--419},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_13},
  doi          = {10.1007/978-3-319-63688-7\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyDV17,
  author       = {Nir Bitansky and
                  Akshay Degwekar and
                  Vinod Vaikuntanathan},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Structure vs. Hardness Through the Obfuscation Lens},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {696--723},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_23},
  doi          = {10.1007/978-3-319-63688-7\_23},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyDV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlockMN17,
  author       = {Alexander R. Block and
                  Hemanta K. Maji and
                  Hai H. Nguyen},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Secure Computation Based on Leaky Correlations: High Resilience Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_1},
  doi          = {10.1007/978-3-319-63715-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlockMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoldyrevaPS17,
  author       = {Alexandra Boldyreva and
                  Christopher Patton and
                  Thomas Shrimpton},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Hedging Public-Key Encryption in the Real World},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {462--494},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_16},
  doi          = {10.1007/978-3-319-63697-9\_16},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoldyrevaPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyenL17,
  author       = {Xavier Boyen and
                  Qinyi Li},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {298--331},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_11},
  doi          = {10.1007/978-3-319-63697-9\_11},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyenL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrendelF0J17,
  author       = {Jacqueline Brendel and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Christian Janson},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {{PRF-ODH:} Relations, Instantiations, and Impossibility Results},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {651--681},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_22},
  doi          = {10.1007/978-3-319-63697-9\_22},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrendelF0J17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischDL17,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Anja Lehmann},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Anonymous Attestation with Subverted TPMs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {427--461},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_15},
  doi          = {10.1007/978-3-319-63697-9\_15},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CamenischDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CastagnosIL17,
  author       = {Guilhem Castagnos and
                  Laurent Imbert and
                  Fabien Laguillaumie},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Encryption Switching Protocols Revisited: Switching Modulo p},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {255--287},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_9},
  doi          = {10.1007/978-3-319-63688-7\_9},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CastagnosIL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoDG0MP17,
  author       = {Chongwon Cho and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Antigoni Polychroniadou},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Laconic Oblivious Transfer and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {33--65},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_2},
  doi          = {10.1007/978-3-319-63715-0\_2},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoDG0MP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CiampiOSV17,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Four-Round Concurrent Non-Malleable Commitments from One-Way Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {127--157},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_5},
  doi          = {10.1007/978-3-319-63715-0\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CiampiOSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaiHT17,
  author       = {Wei Dai and
                  Viet Tung Hoang and
                  Stefano Tessaro},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Information-Theoretic Indistinguishability via the Chi-Squared Method},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {497--523},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_17},
  doi          = {10.1007/978-3-319-63697-9\_17},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaiHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaiSST17,
  author       = {Yuanxi Dai and
                  Yannick Seurin and
                  John P. Steinberger and
                  Aishwarya Thiruvengadam},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized
                  Key-Schedules: Five Rounds Are Necessary and Sufficient},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {524--555},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_18},
  doi          = {10.1007/978-3-319-63697-9\_18},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaiSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardN0R17,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Michael Nielsen and
                  Samuel Ranellucci},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling
                  Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {167--187},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_6},
  doi          = {10.1007/978-3-319-63688-7\_6},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardN0R17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurN17,
  author       = {Itai Dinur and
                  Niv Nadler},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Time-Memory Tradeoff Attacks on the {MTP} Proof-of-Work Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {375--403},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_13},
  doi          = {10.1007/978-3-319-63715-0\_13},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingG17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Identity-Based Encryption from the Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {537--569},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_18},
  doi          = {10.1007/978-3-319-63688-7\_18},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DurakV17,
  author       = {F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Breaking the {FF3} Format-Preserving Encryption Standard over Small
                  Domains},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {679--707},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_23},
  doi          = {10.1007/978-3-319-63715-0\_23},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DurakV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EsserKM17,
  author       = {Andre Esser and
                  Robert K{\"{u}}bler and
                  Alexander May},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {{LPN} Decoded},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {486--514},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_17},
  doi          = {10.1007/978-3-319-63715-0\_17},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EsserKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EverspaughPRS17,
  author       = {Adam Everspaugh and
                  Kenneth G. Paterson and
                  Thomas Ristenpart and
                  Samuel Scott},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Key Rotation for Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {98--129},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_4},
  doi          = {10.1007/978-3-319-63697-9\_4},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EverspaughPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FaustHM017,
  author       = {Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}} and
                  Pratyay Mukherjee and
                  Daniele Venturi},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Non-Malleable Codes for Space-Bounded Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {95--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_4},
  doi          = {10.1007/978-3-319-63715-0\_4},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FaustHM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaboritHPT17,
  author       = {Philippe Gaborit and
                  Adrien Hauteville and
                  Duong Hieu Phan and
                  Jean{-}Pierre Tillich},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Identity-Based Encryption from Codes with Rank Metric},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {194--224},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_7},
  doi          = {10.1007/978-3-319-63697-9\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GaboritHPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayIOZ17,
  author       = {Juan A. Garay and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {The Price of Low Communication in Secure Multi-party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {420--446},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_14},
  doi          = {10.1007/978-3-319-63688-7\_14},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarayIOZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarayKL17,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {291--323},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_10},
  doi          = {10.1007/978-3-319-63688-7\_10},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarayKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargMM17,
  author       = {Sanjam Garg and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {661--695},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_22},
  doi          = {10.1007/978-3-319-63688-7\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GargMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargP17,
  author       = {Sanjam Garg and
                  Omkant Pandey},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Incremental Program Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {193--223},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_7},
  doi          = {10.1007/978-3-319-63715-0\_7},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargYZ17,
  author       = {Sumegha Garg and
                  Henry Yuen and
                  Mark Zhandry},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {New Security Notions and Feasibility Results for Authentication of
                  Quantum Data},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {342--371},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_12},
  doi          = {10.1007/978-3-319-63715-0\_12},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GayHK17,
  author       = {Romain Gay and
                  Dennis Hofheinz and
                  Lisa Kohl},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Kurosawa-Desmedt Meets Tight Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {133--160},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_5},
  doi          = {10.1007/978-3-319-63697-9\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GayHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GrothM17,
  author       = {Jens Groth and
                  Mary Maller},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable
                  SNARKs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {581--612},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_20},
  doi          = {10.1007/978-3-319-63715-0\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GrothM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GrubbsLR17,
  author       = {Paul Grubbs and
                  Jiahui Lu and
                  Thomas Ristenpart},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Message Franking via Committing Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {66--97},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_3},
  doi          = {10.1007/978-3-319-63697-9\_3},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GrubbsLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuoCSLYM17,
  author       = {Fuchun Guo and
                  Rongmao Chen and
                  Willy Susilo and
                  Jianchang Lai and
                  Guomin Yang and
                  Yi Mu},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities
                  with a Counterexample},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {517--547},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_18},
  doi          = {10.1007/978-3-319-63715-0\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GuoCSLYM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IwataMPS17,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Thomas Peyrin and
                  Yannick Seurin},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message
                  Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {34--65},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_2},
  doi          = {10.1007/978-3-319-63697-9\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/IwataMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JafargholiKKKPW17,
  author       = {Zahra Jafargholi and
                  Chethan Kamath and
                  Karen Klein and
                  Ilan Komargodski and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Be Adaptive, Avoid Overcommitting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {133--163},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_5},
  doi          = {10.1007/978-3-319-63688-7\_5},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JafargholiKKKPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiRR17,
  author       = {Yael Tauman Kalai and
                  Guy N. Rothblum and
                  Ron D. Rothblum},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {From Obfuscation to the Security of Fiat-Shamir for Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {224--251},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_8},
  doi          = {10.1007/978-3-319-63715-0\_8},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiayiasRDO17,
  author       = {Aggelos Kiayias and
                  Alexander Russell and
                  Bernardo David and
                  Roman Oliynykov},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Ouroboros: {A} Provably Secure Proof-of-Stake Blockchain Protocol},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {357--388},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_12},
  doi          = {10.1007/978-3-319-63688-7\_12},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiayiasRDO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimW17,
  author       = {Sam Kim and
                  David J. Wu},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {503--536},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_17},
  doi          = {10.1007/978-3-319-63688-7\_17},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KondiP17,
  author       = {Yashvanth Kondi and
                  Arpita Patra},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {188--222},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_7},
  doi          = {10.1007/978-3-319-63688-7\_7},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KondiP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertSSS17,
  author       = {Beno{\^{\i}}t Libert and
                  Amin Sakzad and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext
                  Security from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {332--364},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_12},
  doi          = {10.1007/978-3-319-63697-9\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Lin17,
  author       = {Huijia Lin},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Indistinguishability Obfuscation from {SXDH} on 5-Linear Maps and
                  Locality-5 PRGs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {599--629},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_20},
  doi          = {10.1007/978-3-319-63688-7\_20},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Lin17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinT17,
  author       = {Huijia Lin and
                  Stefano Tessaro},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Indistinguishability Obfuscation from Trilinear Maps and Block-Wise
                  Local PRGs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {630--660},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_21},
  doi          = {10.1007/978-3-319-63688-7\_21},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Lindell17,
  author       = {Yehuda Lindell},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Fast Secure Two-Party {ECDSA} Signing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {613--644},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_21},
  doi          = {10.1007/978-3-319-63715-0\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Lindell17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Liu17,
  author       = {Meicheng Liu},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Degree Evaluation of NFSR-Based Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {227--249},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_8},
  doi          = {10.1007/978-3-319-63697-9\_8},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Liu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuVW17,
  author       = {Tianren Liu and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Conditional Disclosure of Secrets via Non-linear Reconstruction},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {758--790},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_25},
  doi          = {10.1007/978-3-319-63688-7\_25},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LuO17,
  author       = {Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Black-Box Parallel Garbled {RAM}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {66--92},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_3},
  doi          = {10.1007/978-3-319-63715-0\_3},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LuO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Mennink17,
  author       = {Bart Mennink},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Insuperability of the Standard Versus Ideal Model Gap for Tweakable
                  Blockcipher Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {708--732},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_24},
  doi          = {10.1007/978-3-319-63715-0\_24},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Mennink17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MenninkN17,
  author       = {Bart Mennink and
                  Samuel Neves},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using
                  Mirror Theory},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {556--583},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_19},
  doi          = {10.1007/978-3-319-63697-9\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MenninkN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Micciancio017,
  author       = {Daniele Micciancio and
                  Michael Walter},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {455--485},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_16},
  doi          = {10.1007/978-3-319-63715-0\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Micciancio017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PinoL17,
  author       = {Rafa{\"{e}}l del Pino and
                  Vadim Lyubashevsky},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Amortization with Fewer Equations for Proving Knowledge of Small Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {365--394},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_13},
  doi          = {10.1007/978-3-319-63697-9\_13},
  timestamp    = {Tue, 15 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PinoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RoscaSSS17,
  author       = {Miruna Rosca and
                  Amin Sakzad and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Middle-Product Learning with Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {283--297},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_10},
  doi          = {10.1007/978-3-319-63697-9\_10},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RoscaSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SongLG17,
  author       = {Ling Song and
                  Guohong Liao and
                  Jian Guo},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Non-full Sbox Linearization: Applications to Collision Attacks on
                  Round-Reduced Keccak},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {428--451},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_15},
  doi          = {10.1007/978-3-319-63715-0\_15},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/SongLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StevensBKAM17,
  author       = {Marc Stevens and
                  Elie Bursztein and
                  Pierre Karpman and
                  Ange Albertini and
                  Yarik Markov},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {The First Collision for Full {SHA-1}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {570--596},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_19},
  doi          = {10.1007/978-3-319-63688-7\_19},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/StevensBKAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TodoIHM17,
  author       = {Yosuke Todo and
                  Takanori Isobe and
                  Yonglin Hao and
                  Willi Meier},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Cube Attacks on Non-Blackbox Polynomials Based on Division Property},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {250--279},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_9},
  doi          = {10.1007/978-3-319-63697-9\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/TodoIHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WoodageCDJR17,
  author       = {Joanne Woodage and
                  Rahul Chatterjee and
                  Yevgeniy Dodis and
                  Ari Juels and
                  Thomas Ristenpart},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {A New Distribution-Sensitive Secure Sketch and Popularity-Proportional
                  Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {682--710},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_23},
  doi          = {10.1007/978-3-319-63697-9\_23},
  timestamp    = {Thu, 13 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/WoodageCDJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Yamada17,
  author       = {Shota Yamada},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable
                  Random Functions via Generalized Partitioning Techniques},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {161--193},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_6},
  doi          = {10.1007/978-3-319-63697-9\_6},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Yamada17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-1,
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7},
  doi          = {10.1007/978-3-319-63688-7},
  isbn         = {978-3-319-63687-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-2,
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0},
  doi          = {10.1007/978-3-319-63715-0},
  isbn         = {978-3-319-63714-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-3,
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9},
  doi          = {10.1007/978-3-319-63697-9},
  isbn         = {978-3-319-63696-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2017-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001B16,
  author       = {Taechan Kim and
                  Razvan Barbulescu},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Extended Tower Number Field Sieve: {A} New Complexity for the Medium
                  Prime Case},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {543--571},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_20},
  doi          = {10.1007/978-3-662-53018-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001B16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeHO16,
  author       = {Masayuki Abe and
                  Fumitaka Hoshino and
                  Miyako Ohkubo},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type
                  Conversion Using Integer Programming},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {387--415},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_14},
  doi          = {10.1007/978-3-662-53015-3\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalLS16,
  author       = {Shweta Agrawal and
                  Beno{\^{\i}}t Libert and
                  Damien Stehl{\'{e}}},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Fully Secure Functional Encryption for Inner Products, from Standard
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {333--362},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_12},
  doi          = {10.1007/978-3-662-53015-3\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlamatiP16,
  author       = {Navid Alamati and
                  Chris Peikert},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Three's Compromised Too: Circular Insecurity for Any Cycle Length
                  from (Ring-)LWE},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {659--680},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_23},
  doi          = {10.1007/978-3-662-53008-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlamatiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtBD16,
  author       = {Martin R. Albrecht and
                  Shi Bai and
                  L{\'{e}}o Ducas},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {A Subfield Lattice Attack on Overstretched {NTRU} Assumptions - Cryptanalysis
                  of Some {FHE} and Graded Encoding Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {153--178},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_6},
  doi          = {10.1007/978-3-662-53018-4\_6},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlbrechtBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenB16,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Efficiently Computing Data-Independent Memory-Hard Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {241--271},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_9},
  doi          = {10.1007/978-3-662-53008-5\_9},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthJNSY16,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Moni Naor and
                  Amit Sahai and
                  Eylon Yogev},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Universal Constructions and Robust Combiners for Indistinguishability
                  Obfuscation and Witness Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {491--520},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_17},
  doi          = {10.1007/978-3-662-53008-5\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthJNSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumR16,
  author       = {Benny Applebaum and
                  Pavel Raykov},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {On the Relationship Between Statistical Zero-Knowledge and Statistical
                  Randomized Encodings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {449--477},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_16},
  doi          = {10.1007/978-3-662-53015-3\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bar-OnK16,
  author       = {Achiya Bar{-}On and
                  Nathan Keller},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {A 270 Attack on the Full {MISTY1}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {435--456},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_16},
  doi          = {10.1007/978-3-662-53018-4\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Bar-OnK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaumDLN16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Kasper Green Larsen and
                  Michael Nielsen},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {How to Prove Knowledge of Small Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {478--498},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_17},
  doi          = {10.1007/978-3-662-53015-3\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaumDLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleJKL0PSSS16,
  author       = {Christof Beierle and
                  J{\'{e}}r{\'{e}}my Jean and
                  Stefan K{\"{o}}lbl and
                  Gregor Leander and
                  Amir Moradi and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Pascal Sasdrich and
                  Siang Meng Sim},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {The {SKINNY} Family of Block Ciphers and Its Low-Latency Variant {MANTIS}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {123--153},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_5},
  doi          = {10.1007/978-3-662-53008-5\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeierleJKL0PSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleKL16,
  author       = {Christof Beierle and
                  Thorsten Kranz and
                  Gregor Leander},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Lightweight Multiplication in GF(2n) with Applications to {MDS} Matrices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {625--653},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_23},
  doi          = {10.1007/978-3-662-53018-4\_23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeierleKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareKR16,
  author       = {Mihir Bellare and
                  Daniel Kane and
                  Phillip Rogaway},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Big-Key Symmetric Encryption: Resisting Key Exfiltration},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {373--402},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_14},
  doi          = {10.1007/978-3-662-53018-4\_14},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareT16,
  author       = {Mihir Bellare and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {The Multi-user Security of Authenticated Encryption: {AES-GCM} in
                  {TLS} 1.3},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {247--276},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_10},
  doi          = {10.1007/978-3-662-53018-4\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-ZviBT16,
  author       = {Adi Ben{-}Zvi and
                  Simon R. Blackburn and
                  Boaz Tsaban},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {A Practical Cryptanalysis of the Algebraic Eraser},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {179--189},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_7},
  doi          = {10.1007/978-3-662-53018-4\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-ZviBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BogdanovIVW16,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Emanuele Viola and
                  Christopher Williamson},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Bounded Indistinguishability and the Complexity of Recovering Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {593--618},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_21},
  doi          = {10.1007/978-3-662-53015-3\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BogdanovIVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BouraC16,
  author       = {Christina Boura and
                  Anne Canteaut},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Another View of the Division Property},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {654--682},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_24},
  doi          = {10.1007/978-3-662-53018-4\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BouraC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoursePMW16,
  author       = {Florian Bourse and
                  Rafa{\"{e}}l Del Pino and
                  Michele Minelli and
                  Hoeteck Wee},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {{FHE} Circuit Privacy Almost for Free},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {62--89},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_3},
  doi          = {10.1007/978-3-662-53008-5\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoursePMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleGI16,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Breaking the Circuit Size Barrier for Secure Computation Under {DDH}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {509--539},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_19},
  doi          = {10.1007/978-3-662-53018-4\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiBF16,
  author       = {Zvika Brakerski and
                  Christina Brzuska and
                  Nils Fleischhacker},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {On Statistically Secure Obfuscation with Approximate Correctness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {551--578},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_19},
  doi          = {10.1007/978-3-662-53008-5\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiP16,
  author       = {Zvika Brakerski and
                  Renen Perlman},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Lattice-Based Fully Dynamic Multi-key {FHE} with Short Ciphertexts},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {190--213},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_8},
  doi          = {10.1007/978-3-662-53018-4\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiV16,
  author       = {Zvika Brakerski and
                  Vinod Vaikuntanathan},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Circuit-ABE from {LWE:} Unbounded Attributes and Semi-adaptive Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {363--384},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_13},
  doi          = {10.1007/978-3-662-53015-3\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischDR16,
  author       = {Jan Camenisch and
                  Maria Dubovitskaya and
                  Alfredo Rial},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {{UC} Commitments for Modular Protocol Design and Applications to Revocation
                  and Attribute Tokens},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {208--239},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_8},
  doi          = {10.1007/978-3-662-53015-3\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CamenischDR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CarmerR16,
  author       = {Brent Carmer and
                  Mike Rosulek},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Linicrypt: {A} Model for Practical Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {416--445},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_15},
  doi          = {10.1007/978-3-662-53015-3\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CarmerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CascudoDDDN16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {179--207},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_7},
  doi          = {10.1007/978-3-662-53015-3\_7},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CascudoDDDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaseGM16,
  author       = {Melissa Chase and
                  Chaya Ganesh and
                  Payman Mohassel},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements
                  with Applications to Privacy Preserving Credentials},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {499--530},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_18},
  doi          = {10.1007/978-3-662-53015-3\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaseGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CiampiOSV16,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Concurrent Non-Malleable Commitments (and More) in 3 Rounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {270--299},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_10},
  doi          = {10.1007/978-3-662-53015-3\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CiampiOSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CogliatiS16,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {{EWCDM:} An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant
                  {MAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {121--149},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_5},
  doi          = {10.1007/978-3-662-53018-4\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CogliatiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenCGZ16,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Probabilistic Termination and Composability of Cryptographic Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {240--269},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_9},
  doi          = {10.1007/978-3-662-53015-3\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenCGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLLT16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Cryptanalysis of {GGH15} Multilinear Maps},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {607--628},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_21},
  doi          = {10.1007/978-3-662-53008-5\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronLLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CostelloLN16,
  author       = {Craig Costello and
                  Patrick Longa and
                  Michael Naehrig},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Efficient Algorithms for Supersingular Isogeny Diffie-Hellman},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {572--601},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_21},
  doi          = {10.1007/978-3-662-53018-4\_21},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CostelloLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CouteauPP16,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Encryption Switching Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {308--338},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_12},
  doi          = {10.1007/978-3-662-53018-4\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CouteauPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaiS16,
  author       = {Yuanxi Dai and
                  John P. Steinberger},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Indifferentiability of 8-Round Feistel Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {95--120},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_4},
  doi          = {10.1007/978-3-662-53018-4\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardNPR16,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Antigoni Polychroniadou and
                  Michael A. Raskin},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {On the Communication Required for Unconditionally Secure Multiplication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {459--488},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_16},
  doi          = {10.1007/978-3-662-53008-5\_16},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardNPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DegabrielePSW16,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Joanne Woodage},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility
                  Results},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {403--432},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_15},
  doi          = {10.1007/978-3-662-53018-4\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DegabrielePSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DegwekarVV16,
  author       = {Akshay Degwekar and
                  Vinod Vaikuntanathan and
                  Prashant Nalini Vasudevan},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Fine-Grained Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {533--562},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_19},
  doi          = {10.1007/978-3-662-53015-3\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DegwekarVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DerbezF16,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Automatic Search of Meet-in-the-Middle and Impossible Differential
                  Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {157--184},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_6},
  doi          = {10.1007/978-3-662-53008-5\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DerbezF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS16,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Memory-Efficient Algorithms for Finding Needles in Haystacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_7},
  doi          = {10.1007/978-3-662-53008-5\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurDKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisHRW16,
  author       = {Yevgeniy Dodis and
                  Shai Halevi and
                  Ron D. Rothblum and
                  Daniel Wichs},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Spooky Encryption and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {93--122},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_4},
  doi          = {10.1007/978-3-662-53015-3\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisHRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisMS16,
  author       = {Yevgeniy Dodis and
                  Ilya Mironov and
                  Noah Stephens{-}Davidowitz},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Message Transmission with Reverse Firewalls - Secure Communication
                  on Corrupted Machines},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {341--372},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_13},
  doi          = {10.1007/978-3-662-53018-4\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingFKS16,
  author       = {Nico D{\"{o}}ttling and
                  Nils Fleischhacker and
                  Johannes Krupp and
                  Dominique Schr{\"{o}}der},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {619--648},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_22},
  doi          = {10.1007/978-3-662-53015-3\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingFKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DulekSS16,
  author       = {Yfke Dulek and
                  Christian Schaffner and
                  Florian Speelman},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Quantum Homomorphic Encryption for Polynomial-Sized Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_1},
  doi          = {10.1007/978-3-662-53015-3\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DulekSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DupuisFLS16,
  author       = {Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Serge Fehr and
                  Philippe Lamontagne and
                  Louis Salvail},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with
                  Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {33--59},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_2},
  doi          = {10.1007/978-3-662-53015-3\_2},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DupuisFLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DuvalLR16,
  author       = {S{\'{e}}bastien Duval and
                  Virginie Lallemand and
                  Yann Rotella},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Cryptanalysis of the {FLIP} Family of Stream Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {457--475},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_17},
  doi          = {10.1007/978-3-662-53018-4\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DuvalLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkNR16,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Guy N. Rothblum},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message
                  Argument Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {123--145},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_5},
  doi          = {10.1007/978-3-662-53015-3\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFHJM16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Gottfried Herold and
                  Anthony Journault and
                  Daniel Masny and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {272--301},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_10},
  doi          = {10.1007/978-3-662-53008-5\_10},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiFHJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischlinHNS16,
  author       = {Marc Fischlin and
                  Amir Herzberg and
                  Hod Bin Noon and
                  Haya Schulmann},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Obfuscation Combiners},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {521--550},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_18},
  doi          = {10.1007/978-3-662-53008-5\_18},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischlinHNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GagliardoniHS16,
  author       = {Tommaso Gagliardoni and
                  Andreas H{\"{u}}lsing and
                  Christian Schaffner},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Semantic Security and Indistinguishability in the Quantum World},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {60--89},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_3},
  doi          = {10.1007/978-3-662-53015-3\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GagliardoniHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargMP16,
  author       = {Sanjam Garg and
                  Payman Mohassel and
                  Charalampos Papamanthou},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {{TWORAM:} Efficient Oblivious {RAM} in Two Rounds with Applications
                  to Searchable Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {563--592},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_20},
  doi          = {10.1007/978-3-662-53015-3\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargPS16,
  author       = {Sanjam Garg and
                  Omkant Pandey and
                  Akshayaram Srinivasan},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {579--604},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_20},
  doi          = {10.1007/978-3-662-53008-5\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HazayV16,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {On the Power of Secure Two-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {397--429},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_14},
  doi          = {10.1007/978-3-662-53008-5\_14},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HazayV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HemenwayJOSW16,
  author       = {Brett Hemenway and
                  Zahra Jafargholi and
                  Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Daniel Wichs},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Adaptively Secure Garbled Circuits from One-Way Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {149--178},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_6},
  doi          = {10.1007/978-3-662-53015-3\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HemenwayJOSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtMTZ16,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Network-Hiding Communication and Applications to Multi-party Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {335--365},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_12},
  doi          = {10.1007/978-3-662-53008-5\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtMTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangT16,
  author       = {Viet Tung Hoang and
                  Stefano Tessaro},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and
                  Multi-user Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_1},
  doi          = {10.1007/978-3-662-53018-4\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKPSY16,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Ching{-}Hua Yu},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Secure Protocol Transformations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {430--458},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_15},
  doi          = {10.1007/978-3-662-53008-5\_15},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KaplanLLN16,
  author       = {Marc Kaplan and
                  Ga{\"{e}}tan Leurent and
                  Anthony Leverrier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Breaking Symmetric Cryptosystems Using Quantum Period Finding},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {207--237},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_8},
  doi          = {10.1007/978-3-662-53008-5\_8},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KaplanLLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzMP16,
  author       = {Eike Kiltz and
                  Daniel Masny and
                  Jiaxin Pan},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Optimal Security Proofs for Signatures from Identification Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {33--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_2},
  doi          = {10.1007/978-3-662-53008-5\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiltzMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KoppulaW16,
  author       = {Venkata Koppula and
                  Brent Waters},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Circular Security Separations for Arbitrary Length Cycles from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {681--700},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_24},
  doi          = {10.1007/978-3-662-53008-5\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KoppulaW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KumaresanRS16,
  author       = {Ranjit Kumaresan and
                  Srinivasan Raghuraman and
                  Adam Sealfon},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Network Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {366--396},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_13},
  doi          = {10.1007/978-3-662-53008-5\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KumaresanRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Mennink16,
  author       = {Bart Mennink},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {{XPX:} Generalized Tweakable Even-Mansour with Improved Security Guarantees},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {64--94},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_3},
  doi          = {10.1007/978-3-662-53018-4\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Mennink16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MilesSZ16,
  author       = {Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability
                  Obfuscation over {GGH13}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {629--658},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_22},
  doi          = {10.1007/978-3-662-53008-5\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MilesSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PerrinUB16,
  author       = {L{\'{e}}o Perrin and
                  Aleksei Udovenko and
                  Alex Biryukov},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Cryptanalysis of a Theorem: Decomposing the Only Known Solution to
                  the Big {APN} Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {93--122},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_4},
  doi          = {10.1007/978-3-662-53008-5\_4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PerrinUB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PeyrinS16,
  author       = {Thomas Peyrin and
                  Yannick Seurin},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block
                  Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_2},
  doi          = {10.1007/978-3-662-53018-4\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/PeyrinS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Schneider0G16,
  author       = {Tobias Schneider and
                  Amir Moradi and
                  Tim G{\"{u}}neysu},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {ParTI - Towards Combined Hardware Countermeasures Against Side-Channel
                  and Fault-Injection Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {302--332},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_11},
  doi          = {10.1007/978-3-662-53008-5\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Schneider0G16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShrimptonSW16,
  author       = {Thomas Shrimpton and
                  Martijn Stam and
                  Bogdan Warinschi},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {277--307},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_11},
  doi          = {10.1007/978-3-662-53018-4\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ShrimptonSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SunL0QR16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Longjiang Qu and
                  Vincent Rijmen},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {New Insights on AES-Like {SPN} Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {605--624},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_22},
  doi          = {10.1007/978-3-662-53018-4\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SunL0QR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Yamakawa0HK16,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring
                  Semi-smooth {RSA} Subgroup Moduli},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_1},
  doi          = {10.1007/978-3-662-53008-5\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Yamakawa0HK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YuZ16,
  author       = {Yu Yu and
                  Jiang Zhang},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Cryptography with Auxiliary Input and Trapdoor from Constant-Noise
                  {LPN}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {214--243},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_9},
  doi          = {10.1007/978-3-662-53018-4\_9},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YuZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry16,
  author       = {Mark Zhandry},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {The Magic of ELFs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {479--508},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_18},
  doi          = {10.1007/978-3-662-53018-4\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ZhangCZ16,
  author       = {Jiang Zhang and
                  Yu Chen and
                  Zhenfeng Zhang},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Programmable Hash Functions from Lattices: Short Signatures and IBEs
                  with Small Key Sizes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {303--332},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_11},
  doi          = {10.1007/978-3-662-53015-3\_11},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ZhangCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-1,
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4},
  doi          = {10.1007/978-3-662-53018-4},
  isbn         = {978-3-662-53017-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-2,
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5},
  doi          = {10.1007/978-3-662-53008-5},
  isbn         = {978-3-662-53007-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-3,
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3},
  doi          = {10.1007/978-3-662-53015-3},
  isbn         = {978-3-662-53014-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2016-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001IMS15,
  author       = {Divya Gupta and
                  Yuval Ishai and
                  Hemanta K. Maji and
                  Amit Sahai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Secure Computation from Leaky Correlated Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {701--720},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_34},
  doi          = {10.1007/978-3-662-48000-7\_34},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001IMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {An Algebraic Framework for Pseudorandom Functions and Applications
                  to Related-Key Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {388--409},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_19},
  doi          = {10.1007/978-3-662-47989-6\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Agrawal0MPP15,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {538--557},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_26},
  doi          = {10.1007/978-3-662-47989-6\_26},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Agrawal0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenOZZ15,
  author       = {Jo{\"{e}}l Alwen and
                  Rafail Ostrovsky and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Incoercible Multi-party Computation and Universally Composable Receipt-Free
                  Voting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {763--780},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_37},
  doi          = {10.1007/978-3-662-48000-7\_37},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenOZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthBSV15,
  author       = {Prabhanjan Ananth and
                  Zvika Brakerski and
                  Gil Segev and
                  Vinod Vaikuntanathan},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {From Selective to Adaptive Security in Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {657--677},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_32},
  doi          = {10.1007/978-3-662-48000-7\_32},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthBSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthJ15,
  author       = {Prabhanjan Ananth and
                  Abhishek Jain},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Indistinguishability Obfuscation from Compact Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {308--326},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_15},
  doi          = {10.1007/978-3-662-47989-6\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AndrychowiczD15,
  author       = {Marcin Andrychowicz and
                  Stefan Dziembowski},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {PoW-Based Distributed Cryptography with No Trusted Setup},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {379--399},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_19},
  doi          = {10.1007/978-3-662-48000-7\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AndrychowiczD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaCPW15,
  author       = {Fabrice Benhamouda and
                  Geoffroy Couteau and
                  David Pointcheval and
                  Hoeteck Wee},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
                  Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {107--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_6},
  doi          = {10.1007/978-3-662-48000-7\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaCPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BiryukovP15,
  author       = {Alex Biryukov and
                  L{\'{e}}o Perrin},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {116--140},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_6},
  doi          = {10.1007/978-3-662-47989-6\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BiryukovP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlondeauPW15,
  author       = {C{\'{e}}line Blondeau and
                  Thomas Peyrin and
                  Lei Wang},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Known-Key Distinguisher on Full {PRESENT}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {455--474},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_22},
  doi          = {10.1007/978-3-662-47989-6\_22},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BlondeauPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleCP15,
  author       = {Elette Boyle and
                  Kai{-}Min Chung and
                  Rafael Pass},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Large-Scale Secure Computation: Multi-party Computation for (Parallel)
                  {RAM} Programs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {742--762},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_36},
  doi          = {10.1007/978-3-662-48000-7\_36},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BroadbentJ15,
  author       = {Anne Broadbent and
                  Stacey Jeffery},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {609--629},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_30},
  doi          = {10.1007/978-3-662-48000-7\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BroadbentJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiCL15,
  author       = {Ran Canetti and
                  Asaf Cohen and
                  Yehuda Lindell},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {A Simpler Variant of Universally Composable Security for Standard
                  Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_1},
  doi          = {10.1007/978-3-662-48000-7\_1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiG015,
  author       = {Ran Canetti and
                  Vipul Goyal and
                  Abhishek Jain},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Concurrent Secure Computation with Optimal Query Complexity},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {43--62},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_3},
  doi          = {10.1007/978-3-662-48000-7\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CarletPRR15,
  author       = {Claude Carlet and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Algebraic Decomposition for Probing Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {742--763},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_36},
  doi          = {10.1007/978-3-662-47989-6\_36},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CarletPRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CatalanoFN15,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Luca Nizzardo},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Programmable Hash Functions Go Private: Constructions and Applications
                  to (Homomorphic) Signatures with Shorter Public Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {254--274},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_13},
  doi          = {10.1007/978-3-662-48000-7\_13},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CatalanoFN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChitambarFH15,
  author       = {Eric Chitambar and
                  Benjamin Fortescue and
                  Min{-}Hsiu Hsieh},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Distributions Attaining Secret Key at a Rate of the Conditional Mutual
                  Information},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {443--462},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_22},
  doi          = {10.1007/978-3-662-48000-7\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChitambarFH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChungLP15,
  author       = {Kai{-}Min Chung and
                  Huijia Lin and
                  Rafael Pass},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Constant-Round Concurrent Zero-Knowledge from Indistinguishability
                  Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {287--307},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_14},
  doi          = {10.1007/978-3-662-47989-6\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChungLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ClearM15,
  author       = {Michael Clear and
                  Ciaran McGoldrick},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Multi-identity and Multi-key Leveled {FHE} from Learning with Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {630--656},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_31},
  doi          = {10.1007/978-3-662-48000-7\_31},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ClearM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CogliatiLS15,
  author       = {Benoit Cogliati and
                  Rodolphe Lampe and
                  Yannick Seurin},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Tweaking Even-Mansour Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {189--208},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_9},
  doi          = {10.1007/978-3-662-47989-6\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CogliatiLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Hemanta K. Maji and
                  Eric Miles and
                  Mariana Raykova and
                  Amit Sahai and
                  Mehdi Tibouchi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_12},
  doi          = {10.1007/978-3-662-47989-6\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLT15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {New Multilinear Maps Over the Integers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {267--286},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_13},
  doi          = {10.1007/978-3-662-47989-6\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {New Attacks on Feistel Structures with Improved Memory Complexities},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {433--454},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_21},
  doi          = {10.1007/978-3-662-47989-6\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurDKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisY15,
  author       = {Yevgeniy Dodis and
                  Yanqing Yao},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Privacy with Imperfect Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {463--482},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_23},
  doi          = {10.1007/978-3-662-48000-7\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingS15,
  author       = {Nico D{\"{o}}ttling and
                  Dominique Schr{\"{o}}der},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Pseudorandom Functions via On-the-Fly Adaptation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {329--350},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_16},
  doi          = {10.1007/978-3-662-47989-6\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiFKP15,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Vladimir Kolmogorov and
                  Krzysztof Pietrzak},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Proofs of Space},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {585--605},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_29},
  doi          = {10.1007/978-3-662-48000-7\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiFKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EliasLOS15,
  author       = {Yara Elias and
                  Kristin E. Lauter and
                  Ekin Ozman and
                  Katherine E. Stange},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Provably Weak Instances of Ring-LWE},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {63--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_4},
  doi          = {10.1007/978-3-662-47989-6\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EliasLOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EspitauFK15,
  author       = {Thomas Espitau and
                  Pierre{-}Alain Fouque and
                  Pierre Karpman},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Higher-Order Differential Meet-in-the-middle Preimage Attacks on {SHA-1}
                  and {BLAKE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {683--701},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_33},
  doi          = {10.1007/978-3-662-47989-6\_33},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EspitauFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FehrF15,
  author       = {Serge Fehr and
                  Max Fillinger},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Multi-prover Commitments Against Non-signaling Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {403--421},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_20},
  doi          = {10.1007/978-3-662-48000-7\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FehrF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischlinGMP15,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Giorgia Azzurra Marson and
                  Kenneth G. Paterson},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Data Is a Stream: Security of Stream-Based Channels},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {545--564},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_27},
  doi          = {10.1007/978-3-662-48000-7\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischlinGMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FouqueLLT15,
  author       = {Pierre{-}Alain Fouque and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Cryptanalysis of the Co-ACD Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {561--580},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_27},
  doi          = {10.1007/978-3-662-47989-6\_27},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FouqueLLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuchsbauerHS15,
  author       = {Georg Fuchsbauer and
                  Christian Hanser and
                  Daniel Slamanig},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Practical Round-Optimal Blind Signatures in the Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {233--253},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_12},
  doi          = {10.1007/978-3-662-48000-7\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FuchsbauerHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuchsbauerJP15,
  author       = {Georg Fuchsbauer and
                  Zahra Jafargholi and
                  Krzysztof Pietrzak},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {A Quasipolynomial Reduction for Generalized Selective Decryption on
                  Trees},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {601--620},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_29},
  doi          = {10.1007/978-3-662-47989-6\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FuchsbauerJP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargIKOS15,
  author       = {Sanjam Garg and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Cryptography with One-Way Communication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_10},
  doi          = {10.1007/978-3-662-48000-7\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargIKOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GayKW15,
  author       = {Romain Gay and
                  Iordanis Kerenidis and
                  Hoeteck Wee},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Communication Complexity of Conditional Disclosure of Secrets and
                  Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {485--502},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_24},
  doi          = {10.1007/978-3-662-48000-7\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GayKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaziPT15,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {The Exact {PRF} Security of Truncation: Tight Bounds for Keyed Sponges
                  and Truncated {CBC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {368--387},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_18},
  doi          = {10.1007/978-3-662-47989-6\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GaziPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GenkinIP15,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Antigoni Polychroniadou},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Multi-party Computation: From Passive to Active Security
                  via Secure {SIMD} Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {721--741},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_35},
  doi          = {10.1007/978-3-662-48000-7\_35},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GenkinIP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GilbertPT15,
  author       = {Henri Gilbert and
                  J{\'{e}}r{\^{o}}me Pl{\^{u}}t and
                  Joana Treger},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Key-Recovery Attack on the {ASASA} Cryptosystem with Expanding S-Boxes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {475--490},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_23},
  doi          = {10.1007/978-3-662-47989-6\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GilbertPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GorbunovVW15,
  author       = {Sergey Gorbunov and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Predicate Encryption for Circuits from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {503--523},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_25},
  doi          = {10.1007/978-3-662-48000-7\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GorbunovVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GordonLS15,
  author       = {S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Elaine Shi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Constant-Round {MPC} with Fairness and Guarantee of Output Delivery},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {63--82},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_4},
  doi          = {10.1007/978-3-662-48000-7\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GordonLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Goyal0S15,
  author       = {Vipul Goyal and
                  Divya Gupta and
                  Amit Sahai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Concurrent Secure Computation via Non-Black Box Simulation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_2},
  doi          = {10.1007/978-3-662-48000-7\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Goyal0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GuoJS15,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Paul Stankovski},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Coded-BKW: Solving {LWE} Using Lattice Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_2},
  doi          = {10.1007/978-3-662-47989-6\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GuoJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaitnerIOS15,
  author       = {Iftach Haitner and
                  Yuval Ishai and
                  Eran Omri and
                  Ronen Shaltiel},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Parallel Hashing via List Recoverability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {173--190},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_9},
  doi          = {10.1007/978-3-662-48000-7\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaitnerIOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HajiabadiK15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {224--243},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_11},
  doi          = {10.1007/978-3-662-47989-6\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HajiabadiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Hamburg15,
  author       = {Mike Hamburg},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Decaf: Eliminating Cofactors Through Point Compression},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {705--723},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_34},
  doi          = {10.1007/978-3-662-47989-6\_34},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Hamburg15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangRRV15,
  author       = {Viet Tung Hoang and
                  Reza Reyhanitabar and
                  Phillip Rogaway and
                  Damian Viz{\'{a}}r},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {493--517},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_24},
  doi          = {10.1007/978-3-662-47989-6\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangRRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HuMR15,
  author       = {Zhangxiang Hu and
                  Payman Mohassel and
                  Mike Rosulek},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear
                  Amortized Cost},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {150--169},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_8},
  doi          = {10.1007/978-3-662-48000-7\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HuMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HuangKY15,
  author       = {Ming{-}Deh A. Huang and
                  Michiel Kosters and
                  Sze Ling Yeo},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Last Fall Degree, HFE, and Weil Descent Attacks on {ECDLP}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {581--600},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_28},
  doi          = {10.1007/978-3-662-47989-6\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HuangKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HuangVLN15,
  author       = {Jialin Huang and
                  Serge Vaudenay and
                  Xuejia Lai and
                  Kaisa Nyberg},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Capacity and Data Complexity in Multidimensional Linear Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {141--160},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_7},
  doi          = {10.1007/978-3-662-47989-6\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HuangVLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKKP15,
  author       = {Yuval Ishai and
                  Ranjit Kumaresan and
                  Eyal Kushilevitz and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Secure Computation with Minimal Interaction, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {359--378},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_18},
  doi          = {10.1007/978-3-662-48000-7\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiR15,
  author       = {Yael Tauman Kalai and
                  Ron D. Rothblum},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Arguments of Proximity - [Extended Abstract]},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {422--442},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_21},
  doi          = {10.1007/978-3-662-48000-7\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KarpmanPS15,
  author       = {Pierre Karpman and
                  Thomas Peyrin and
                  Marc Stevens},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Practical Free-Start Collision Attacks on 76-step {SHA-1}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {623--642},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_30},
  doi          = {10.1007/978-3-662-47989-6\_30},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KarpmanPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KellerOS15,
  author       = {Marcel Keller and
                  Emmanuela Orsini and
                  Peter Scholl},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Actively Secure {OT} Extension with Optimal Overhead},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {724--741},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_35},
  doi          = {10.1007/978-3-662-47989-6\_35},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KellerOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzPW15,
  author       = {Eike Kiltz and
                  Jiaxin Pan and
                  Hoeteck Wee},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Structure-Preserving Signatures from Standard Assumptions, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {275--295},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_14},
  doi          = {10.1007/978-3-662-48000-7\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiltzPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KirchnerF15,
  author       = {Paul Kirchner and
                  Pierre{-}Alain Fouque},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {An Improved {BKW} Algorithm for {LWE} with Applications to Cryptography
                  and Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {43--62},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_3},
  doi          = {10.1007/978-3-662-47989-6\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KirchnerF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kiyoshima15,
  author       = {Susumu Kiyoshima},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Statistical Concurrent Non-malleable Zero-Knowledge from One-Way Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {85--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_5},
  doi          = {10.1007/978-3-662-48000-7\_5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kiyoshima15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KolblLT15,
  author       = {Stefan K{\"{o}}lbl and
                  Gregor Leander and
                  Tyge Tiessen},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Observations on the {SIMON} Block Cipher Family},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {161--185},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_8},
  doi          = {10.1007/978-3-662-47989-6\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KolblLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KowalczykL15,
  author       = {Lucas Kowalczyk and
                  Allison Bishop Lewko},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Bilinear Entropy Expansion from the Decisional Linear Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {524--541},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_26},
  doi          = {10.1007/978-3-662-48000-7\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KowalczykL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Laarhoven15,
  author       = {Thijs Laarhoven},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive
                  Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_1},
  doi          = {10.1007/978-3-662-47989-6\_1},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Laarhoven15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LallemandN15,
  author       = {Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Cryptanalysis of Full Sprout},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {663--682},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_32},
  doi          = {10.1007/978-3-662-47989-6\_32},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LallemandN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Short Group Signatures via Structure-Preserving Signatures: Standard
                  Model Security from Simple Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {296--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_15},
  doi          = {10.1007/978-3-662-48000-7\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LindellPSY15,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Constant Round Multi-party Computation Combining {BMR} and
                  {SPDZ}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_16},
  doi          = {10.1007/978-3-662-48000-7\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LindellPSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MandalR15,
  author       = {Avradip Mandal and
                  Arnab Roy},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Relational Hash: Probabilistic Hash for Verifying Relations, Secure
                  Against Forgery and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {518--537},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_25},
  doi          = {10.1007/978-3-662-47989-6\_25},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MandalR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MinaudS15,
  author       = {Brice Minaud and
                  Yannick Seurin},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {The Iterated Random Permutation Problem with Applications to Cascade
                  Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {351--367},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_17},
  doi          = {10.1007/978-3-662-47989-6\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MinaudS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MouhaL15,
  author       = {Nicky Mouha and
                  Atul Luykx},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Multi-key Security: The Even-Mansour Construction Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {209--223},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_10},
  doi          = {10.1007/978-3-662-47989-6\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MouhaL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorY15,
  author       = {Moni Naor and
                  Eylon Yogev},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Bloom Filters in Adversarial Environments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {565--584},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_28},
  doi          = {10.1007/978-3-662-48000-7\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OstrovskyPV15,
  author       = {Rafail Ostrovsky and
                  Giuseppe Persiano and
                  Ivan Visconti},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Impossibility of Black-Box Simulation Against Leakage Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_7},
  doi          = {10.1007/978-3-662-48000-7\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OstrovskyPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OstrovskyRS15,
  author       = {Rafail Ostrovsky and
                  Silas Richelson and
                  Alessandra Scafuro},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Round-Optimal Black-Box Two-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {339--358},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_17},
  doi          = {10.1007/978-3-662-48000-7\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OstrovskyRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ReparazBNGV15,
  author       = {Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Consolidating Masking Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {764--783},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_37},
  doi          = {10.1007/978-3-662-47989-6\_37},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ReparazBNGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SunLRLCWAL15,
  author       = {Bing Sun and
                  Zhiqiang Liu and
                  Vincent Rijmen and
                  Ruilin Li and
                  Lei Cheng and
                  Qingju Wang and
                  Hoda AlKhzaimi and
                  Chao Li},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Links Among Impossible Differential, Integral and Zero Correlation
                  Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {95--115},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_5},
  doi          = {10.1007/978-3-662-47989-6\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SunLRLCWAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Todo15,
  author       = {Yosuke Todo},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Integral Cryptanalysis on Full {MISTY1}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {413--432},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_20},
  doi          = {10.1007/978-3-662-47989-6\_20},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Todo15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Waters15,
  author       = {Brent Waters},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {A Punctured Programming Approach to Adaptively Secure Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {678--697},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_33},
  doi          = {10.1007/978-3-662-48000-7\_33},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Waters15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YuGLW15,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li and
                  Jian Weng},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way
                  Functions and Beyond},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {209--229},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_11},
  doi          = {10.1007/978-3-662-48000-7\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/YuGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ZhangXM15,
  author       = {Bin Zhang and
                  Chao Xu and
                  Willi Meier},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Fast Correlation Attacks over Extension Fields, Large-Unit Linear
                  Approximation and Cryptanalysis of {SNOW} 2.0},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {643--662},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_31},
  doi          = {10.1007/978-3-662-47989-6\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ZhangXM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-1,
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6},
  doi          = {10.1007/978-3-662-47989-6},
  isbn         = {978-3-662-47988-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-2,
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7},
  doi          = {10.1007/978-3-662-48000-7},
  isbn         = {978-3-662-47999-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2015-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001P14,
  author       = {Abhishek Banerjee and
                  Chris Peikert},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {New and Improved Key-Homomorphic Pseudorandom Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {353--370},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_20},
  doi          = {10.1007/978-3-662-44371-2\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001P14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001PSW14,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Lei Wang},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Updates on Generic Attacks against {HMAC} and {NMAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {131--148},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_8},
  doi          = {10.1007/978-3-662-44371-2\_8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/0001PSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBPP14,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Kenneth G. Paterson},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Related-Key Security for Pseudorandom Functions Beyond the Linear
                  Barrier},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_5},
  doi          = {10.1007/978-3-662-44371-2\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeGOT14,
  author       = {Masayuki Abe and
                  Jens Groth and
                  Miyako Ohkubo and
                  Takeya Tango},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear
                  Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {241--260},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_14},
  doi          = {10.1007/978-3-662-44371-2\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeGOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeGOT14a,
  author       = {Masayuki Abe and
                  Jens Groth and
                  Miyako Ohkubo and
                  Mehdi Tibouchi},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Structure-Preserving Signatures from Type {II} Pairings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {390--407},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_22},
  doi          = {10.1007/978-3-662-44371-2\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeGOT14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalDJMR14,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Zahra Jafargholi and
                  Eric Miles and
                  Leonid Reyzin},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Amplifying Privacy in Privacy Amplification},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_11},
  doi          = {10.1007/978-3-662-44381-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalDJMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlbrechtDKLPY14,
  author       = {Martin R. Albrecht and
                  Benedikt Driessen and
                  Elif Bilge Kavun and
                  Gregor Leander and
                  Christof Paar and
                  Tolga Yal{\c{c}}in},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Block Ciphers - Focus on the Linear Layer (feat. {PRIDE)}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_4},
  doi          = {10.1007/978-3-662-44371-2\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlbrechtDKLPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Alperin-SheriffP14,
  author       = {Jacob Alperin{-}Sheriff and
                  Chris Peikert},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Faster Bootstrapping with Polynomial Error},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {297--314},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_17},
  doi          = {10.1007/978-3-662-44371-2\_17},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Alperin-SheriffP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthGP14,
  author       = {Prabhanjan Ananth and
                  Vipul Goyal and
                  Omkant Pandey},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Interactive Proofs under Continual Memory Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {164--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_10},
  doi          = {10.1007/978-3-662-44381-1\_10},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AustrinCMPS14,
  author       = {Per Austrin and
                  Kai{-}Min Chung and
                  Mohammad Mahmoody and
                  Rafael Pass and
                  Karn Seth},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {On the Impossibility of Cryptography with Tamperable Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {462--479},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_26},
  doi          = {10.1007/978-3-662-44371-2\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AustrinCMPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartheFFMSS14,
  author       = {Gilles Barthe and
                  Edvard Fagerholm and
                  Dario Fiore and
                  John C. Mitchell and
                  Andre Scedrov and
                  Benedikt Schmidt},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Automated Analysis of Cryptographic Assumptions in Generic Group Models},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_6},
  doi          = {10.1007/978-3-662-44371-2\_6},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartheFFMSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelGIKMP14,
  author       = {Amos Beimel and
                  Ariel Gabizon and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Sigurd Meldgaard and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Non-Interactive Secure Multiparty Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {387--404},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_22},
  doi          = {10.1007/978-3-662-44381-1\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelGIKMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareHK14,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Sriram Keelveedhi},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Cryptography from Compression Functions: The {UCE} Bridge to the {ROM}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {169--187},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_10},
  doi          = {10.1007/978-3-662-44371-2\_10},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellarePR14,
  author       = {Mihir Bellare and
                  Kenneth G. Paterson and
                  Phillip Rogaway},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Security of Symmetric Encryption against Mass Surveillance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_1},
  doi          = {10.1007/978-3-662-44371-2\_1},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellarePR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-SassonCTV14,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Eran Tromer and
                  Madars Virza},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Scalable Zero Knowledge via Cycles of Elliptic Curves},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {276--294},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_16},
  doi          = {10.1007/978-3-662-44381-1\_16},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-SassonCTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BentovK14,
  author       = {Iddo Bentov and
                  Ranjit Kumaresan},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {How to Use Bitcoin to Design Fair Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {421--439},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_24},
  doi          = {10.1007/978-3-662-44381-1\_24},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BentovK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BhargavanFKPSB14,
  author       = {Karthikeyan Bhargavan and
                  C{\'{e}}dric Fournet and
                  Markulf Kohlweiss and
                  Alfredo Pironti and
                  Pierre{-}Yves Strub and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Proving the {TLS} Handshake Secure (As It Is)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {235--255},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_14},
  doi          = {10.1007/978-3-662-44381-1\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BhargavanFKPSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyCCGKPR14,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Henry Cohn and
                  Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Alon Rosen},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {The Impossibility of Obfuscation with Auxiliary Input or a Universal
                  Simulator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {71--89},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_5},
  doi          = {10.1007/978-3-662-44381-1\_5},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyCCGKPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyCKP14,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {On Virtual Grey Box Obfuscation for General Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_7},
  doi          = {10.1007/978-3-662-44381-1\_7},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyCKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyDL14,
  author       = {Nir Bitansky and
                  Dana Dachman{-}Soled and
                  Huijia Lin},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Leakage-Tolerant Computation with Input-Independent Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_9},
  doi          = {10.1007/978-3-662-44381-1\_9},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlazyKP14,
  author       = {Olivier Blazy and
                  Eike Kiltz and
                  Jiaxin Pan},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {408--425},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_23},
  doi          = {10.1007/978-3-662-44371-2\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlazyKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehWZ14,
  author       = {Dan Boneh and
                  Brent Waters and
                  Mark Zhandry},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Low Overhead Broadcast Encryption from Multilinear Maps},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_12},
  doi          = {10.1007/978-3-662-44371-2\_12},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehZ14,
  author       = {Dan Boneh and
                  Mark Zhandry},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from
                  Indistinguishability Obfuscation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {480--499},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_27},
  doi          = {10.1007/978-3-662-44371-2\_27},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrzuskaFM14,
  author       = {Christina Brzuska and
                  Pooya Farshim and
                  Arno Mittelbach},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Indistinguishability Obfuscation and UCEs: The Case of Computationally
                  Unpredictable Sources},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {188--205},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_11},
  doi          = {10.1007/978-3-662-44371-2\_11},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrzuskaFM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischLLN14,
  author       = {Jan Camenisch and
                  Anja Lehmann and
                  Anna Lysyanskaya and
                  Gregory Neven},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Memento: How to Reconstruct Your Secrets from a Single Password in
                  a Hostile Environment},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {256--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_15},
  doi          = {10.1007/978-3-662-44381-1\_15},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CamenischLLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Canetti0P14,
  author       = {Ran Canetti and
                  Abhishek Jain and
                  Omer Paneth},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed
                  Complexity},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {337--350},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_19},
  doi          = {10.1007/978-3-662-44381-1\_19},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Canetti0P14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CatalanoFW14,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Homomorphic Signatures with Efficient Verification for Polynomial
                  Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {371--389},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_21},
  doi          = {10.1007/978-3-662-44371-2\_21},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CatalanoFW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenLLSS14,
  author       = {Shan Chen and
                  Rodolphe Lampe and
                  Jooyoung Lee and
                  Yannick Seurin and
                  John P. Steinberger},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Minimizing the Two-Round Even-Mansour Cipher},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_3},
  doi          = {10.1007/978-3-662-44371-2\_3},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenLLSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoiKMZ14,
  author       = {Seung Geol Choi and
                  Jonathan Katz and
                  Alex J. Malozemoff and
                  Vassilis Zikas},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Efficient Three-Party Computation from Cut-and-Choose},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {513--530},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_29},
  doi          = {10.1007/978-3-662-44381-1\_29},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoiKMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledFKLS14,
  author       = {Dana Dachman{-}Soled and
                  Nils Fleischhacker and
                  Jonathan Katz and
                  Anna Lysyanskaya and
                  Dominique Schr{\"{o}}der},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Feasibility and Infeasibility of Secure Computation with Malicious
                  PUFs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {405--420},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_23},
  doi          = {10.1007/978-3-662-44381-1\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledFKLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaiLMS14,
  author       = {Yuanxi Dai and
                  Jooyoung Lee and
                  Bart Mennink and
                  John P. Steinberger},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {The Security of Multiple Encryption in the Ideal Cipher Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {20--38},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_2},
  doi          = {10.1007/978-3-662-44371-2\_2},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaiLMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DataPP14,
  author       = {Deepesh Data and
                  Manoj Prabhakaran and
                  Vinod M. Prabhakaran},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {On the Communication Complexity of Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {199--216},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_12},
  doi          = {10.1007/978-3-662-44381-1\_12},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DataPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurL14,
  author       = {Itai Dinur and
                  Ga{\"{e}}tan Leurent},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Improved Generic Attacks against Hash-Based MACs and {HAIFA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {149--168},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_9},
  doi          = {10.1007/978-3-662-44371-2\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisSSW14,
  author       = {Yevgeniy Dodis and
                  Adi Shamir and
                  Noah Stephens{-}Davidowitz and
                  Daniel Wichs},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies
                  for Compromised RNGs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_3},
  doi          = {10.1007/978-3-662-44381-1\_3},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisSSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasM14,
  author       = {L{\'{e}}o Ducas and
                  Daniele Micciancio},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Improved Short Lattice Signatures in the Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {335--352},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_19},
  doi          = {10.1007/978-3-662-44371-2\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DucasM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FarrasHKP14,
  author       = {Oriol Farr{\`{a}}s and
                  Torben Brandt Hansen and
                  Tarik Kaced and
                  Carles Padr{\'{o}}},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Optimal Non-perfect Uniform Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {217--234},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_13},
  doi          = {10.1007/978-3-662-44381-1\_13},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FarrasHKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischFN14,
  author       = {Ben Fisch and
                  Daniel Freund and
                  Moni Naor},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Physical Zero-Knowledge Proofs of Physical Properties},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {313--336},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_18},
  doi          = {10.1007/978-3-662-44381-1\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischFN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargGHW14,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Wichs},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {On the Implausibility of Differing-Inputs Obfuscation and Extractable
                  Witness Encryption with Auxiliary Input},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {518--535},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_29},
  doi          = {10.1007/978-3-662-44371-2\_29},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargGHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaziPR14,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Michal Ryb{\'{a}}r},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {The Exact PRF-Security of {NMAC} and {HMAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {113--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_7},
  doi          = {10.1007/978-3-662-44371-2\_7},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GaziPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GenkinST14,
  author       = {Daniel Genkin and
                  Adi Shamir and
                  Eran Tromer},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {444--461},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_25},
  doi          = {10.1007/978-3-662-44371-2\_25},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GenkinST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryLW14,
  author       = {Craig Gentry and
                  Allison B. Lewko and
                  Brent Waters},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Witness Encryption from Instance Independent Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {426--443},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_24},
  doi          = {10.1007/978-3-662-44371-2\_24},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GrangerKZ14,
  author       = {Robert Granger and
                  Thorsten Kleinjung and
                  Jens Zumbr{\"{a}}gel},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Breaking '128-bit Secure' Supersingular Binary Curves - (Or How to
                  Solve Discrete Logarithms in F\({}_{\mbox{2\({}^{\mbox{4 1223}}\)}}\)
                  and F\({}_{\mbox{2\({}^{\mbox{12 367}}\)}}\))},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {126--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_8},
  doi          = {10.1007/978-3-662-44381-1\_8},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GrangerKZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviS14,
  author       = {Shai Halevi and
                  Victor Shoup},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Algorithms in HElib},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {554--571},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_31},
  doi          = {10.1007/978-3-662-44371-2\_31},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HeroldHHRR14,
  author       = {Gottfried Herold and
                  Julia Hesse and
                  Dennis Hofheinz and
                  Carla R{\`{a}}fols and
                  Andy Rupp},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Polynomial Spaces: {A} New Framework for Composite-to-Prime-Order
                  Transformations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_15},
  doi          = {10.1007/978-3-662-44371-2\_15},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HeroldHHRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HuangKKKM14,
  author       = {Yan Huang and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Ranjit Kumaresan and
                  Alex J. Malozemoff},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Amortizing Garbled Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {458--475},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_26},
  doi          = {10.1007/978-3-662-44381-1\_26},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HuangKKKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiOZ14,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Secure Multi-Party Computation with Identifiable Abort},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {369--386},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_21},
  doi          = {10.1007/978-3-662-44381-1\_21},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiOZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JutlaR14,
  author       = {Charanjit S. Jutla and
                  Arnab Roy},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Switching Lemma for Bilinear Tests and Constant-Size {NIZK} Proofs
                  for Linear Subspaces},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_17},
  doi          = {10.1007/978-3-662-44381-1\_17},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JutlaR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kiyoshima14,
  author       = {Susumu Kiyoshima},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Round-Efficient Black-Box Construction of Composable Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_20},
  doi          = {10.1007/978-3-662-44381-1\_20},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kiyoshima14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KolesnikovMR14,
  author       = {Vladimir Kolesnikov and
                  Payman Mohassel and
                  Mike Rosulek},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {FleXOR: Flexible Garbling for {XOR} Gates That Beats Free-XOR},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {440--457},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_25},
  doi          = {10.1007/978-3-662-44381-1\_25},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KolesnikovMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LarraiaOS14,
  author       = {Enrique Larraia and
                  Emmanuela Orsini and
                  Nigel P. Smart},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Dishonest Majority Multi-Party Computation for Binary Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {495--512},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_28},
  doi          = {10.1007/978-3-662-44381-1\_28},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LarraiaOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LeeS14,
  author       = {Hyung Tae Lee and
                  Jae Hong Seo},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Security Analysis of Multilinear Maps over the Integers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {224--240},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_13},
  doi          = {10.1007/978-3-662-44371-2\_13},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LeeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LenstraS14,
  author       = {Hendrik W. Lenstra Jr. and
                  Alice Silverberg},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Revisiting the Gentry-Szydlo Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {280--296},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_16},
  doi          = {10.1007/978-3-662-44371-2\_16},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LenstraS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LindellR14,
  author       = {Yehuda Lindell and
                  Ben Riva},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Cut-and-Choose Yao-Based Secure Computation in the Online/Offline
                  and Batch Settings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {476--494},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_27},
  doi          = {10.1007/978-3-662-44381-1\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/LindellR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LingPSS14,
  author       = {San Ling and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Hardness of k-LWE and Applications in Traitor Tracing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {315--334},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_18},
  doi          = {10.1007/978-3-662-44371-2\_18},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LingPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Liu14,
  author       = {Yi{-}Kai Liu},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Single-Shot Security for One-Time Memories in the Isolated Qubits
                  Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_2},
  doi          = {10.1007/978-3-662-44381-1\_2},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Liu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OstrovskyPP14,
  author       = {Rafail Ostrovsky and
                  Anat Paskin{-}Cherniavsky and
                  Beni Paskin{-}Cherniavsky},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Maliciously Circuit-Private {FHE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {536--553},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_30},
  doi          = {10.1007/978-3-662-44371-2\_30},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OstrovskyPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PapakonstantinouY14,
  author       = {Periklis A. Papakonstantinou and
                  Guang Yang},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Cryptography with Streaming Algorithms},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_4},
  doi          = {10.1007/978-3-662-44381-1\_4},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/PapakonstantinouY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PassST14,
  author       = {Rafael Pass and
                  Karn Seth and
                  Sidharth Telang},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Indistinguishability Obfuscation from Semantically-Secure Multilinear
                  Encodings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {500--517},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_28},
  doi          = {10.1007/978-3-662-44371-2\_28},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PassST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Unruh14,
  author       = {Dominique Unruh},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Quantum Position Verification in the Random Oracle Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_1},
  doi          = {10.1007/978-3-662-44381-1\_1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Unruh14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Yamakawa0HK14,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Self-bilinear Map on Unknown Order Groups from Indistinguishability
                  Obfuscation and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_6},
  doi          = {10.1007/978-3-662-44381-1\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Yamakawa0HK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2},
  doi          = {10.1007/978-3-662-44371-2},
  isbn         = {978-3-662-44370-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2014-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-2,
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1},
  doi          = {10.1007/978-3-662-44381-1},
  isbn         = {978-3-662-44380-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2014-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0003XF13,
  author       = {Bin Zhang and
                  Chao Xu and
                  Dengguo Feng},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking
                  - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {165--182},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_10},
  doi          = {10.1007/978-3-642-40041-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0003XF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiBMRS13,
  author       = {Mart{\'{\i}}n Abadi and
                  Dan Boneh and
                  Ilya Mironov and
                  Ananth Raghunathan and
                  Gil Segev},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Message-Locked Encryption for Lock-Dependent Messages},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {374--391},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_21},
  doi          = {10.1007/978-3-642-40041-4\_21},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbadiBMRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGVW13,
  author       = {Shweta Agrawal and
                  Sergey Gorbunov and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Functional Encryption: New Perspectives and Lower Bounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {500--518},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_28},
  doi          = {10.1007/978-3-642-40084-1\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalP13,
  author       = {Shashank Agrawal and
                  Manoj Prabhakaran},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {On Fair Exchange, Fair Coins and Fair Sampling},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {259--276},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_15},
  doi          = {10.1007/978-3-642-40041-4\_15},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Alperin-SheriffP13,
  author       = {Jacob Alperin{-}Sheriff and
                  Chris Peikert},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Practical Bootstrapping in Quasilinear Time},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_1},
  doi          = {10.1007/978-3-642-40041-4\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Alperin-SheriffP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenKPW13,
  author       = {Jo{\"{e}}l Alwen and
                  Stephan Krenn and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Learning with Rounding, Revisited - New Reduction, Properties and
                  Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {57--74},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_4},
  doi          = {10.1007/978-3-642-40041-4\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenKPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AndreevaBDMS13,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Yevgeniy Dodis and
                  Bart Mennink and
                  John P. Steinberger},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {On the Indifferentiability of Key-Alternating Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {531--550},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_29},
  doi          = {10.1007/978-3-642-40041-4\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AndreevaBDMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumIKW13,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Encoding Functions with Constant Online Rate or How to Compress Garbled
                  Circuits Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {166--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_10},
  doi          = {10.1007/978-3-642-40084-1\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumIKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareHK13,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Sriram Keelveedhi},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Instantiating Random Oracles via UCEs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {398--415},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_23},
  doi          = {10.1007/978-3-642-40084-1\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-SassonCGTV13,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Daniel Genkin and
                  Eran Tromer and
                  Madars Virza},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {SNARKs for {C:} Verifying Program Executions Succinctly and in Zero
                  Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {90--108},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_6},
  doi          = {10.1007/978-3-642-40084-1\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-SassonCGTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BenhamoudaBCPV13,
  author       = {Fabrice Benhamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {New Techniques for SPHFs and Efficient One-Round {PAKE} Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {449--475},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_25},
  doi          = {10.1007/978-3-642-40041-4\_25},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BenhamoudaBCPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlondeauBL13,
  author       = {C{\'{e}}line Blondeau and
                  Andrey Bogdanov and
                  Gregor Leander},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Bounds in Shallows and in Miseries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_12},
  doi          = {10.1007/978-3-642-40041-4\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlondeauBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BogdanovL13,
  author       = {Andrej Bogdanov and
                  Chin Ho Lee},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Limits of Provable Security for Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_7},
  doi          = {10.1007/978-3-642-40041-4\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BogdanovL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehLMR13,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  Hart William Montgomery and
                  Ananth Raghunathan},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Key Homomorphic PRFs and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {410--428},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_23},
  doi          = {10.1007/978-3-642-40041-4\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehLMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehRS13,
  author       = {Dan Boneh and
                  Ananth Raghunathan and
                  Gil Segev},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Function-Private Identity-Based Encryption: Hiding the Function in
                  Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {461--478},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_26},
  doi          = {10.1007/978-3-642-40084-1\_26},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehZ13,
  author       = {Dan Boneh and
                  Mark Zhandry},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing
                  World},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {361--379},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_21},
  doi          = {10.1007/978-3-642-40084-1\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyleG0KS13,
  author       = {Elette Boyle and
                  Sanjam Garg and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Amit Sahai},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Secure Computation against Adaptive Auxiliary Information},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_18},
  doi          = {10.1007/978-3-642-40041-4\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyleG0KS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiR13,
  author       = {Zvika Brakerski and
                  Guy N. Rothblum},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Obfuscating Conjunctions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {416--434},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_24},
  doi          = {10.1007/978-3-642-40084-1\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BroadbentGS13,
  author       = {Anne Broadbent and
                  Gus Gutoski and
                  Douglas Stebila},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Quantum One-Time Programs - (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {344--360},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_20},
  doi          = {10.1007/978-3-642-40084-1\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BroadbentGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanteautNV13,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Bastien Vayssi{\`{e}}re},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Sieve-in-the-Middle: Improved {MITM} Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {222--240},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_13},
  doi          = {10.1007/978-3-642-40041-4\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanteautNV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CaroIJOPP13,
  author       = {Angelo De Caro and
                  Vincenzo Iovino and
                  Abhishek Jain and
                  Adam O'Neill and
                  Omer Paneth and
                  Giuseppe Persiano},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {On the Achievability of Simulation-Based Security for Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {519--535},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_29},
  doi          = {10.1007/978-3-642-40084-1\_29},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CaroIJOPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CashJJKRS13,
  author       = {David Cash and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean
                  Queries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {353--373},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_20},
  doi          = {10.1007/978-3-642-40041-4\_20},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CashJJKRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenW13,
  author       = {Jie Chen and
                  Hoeteck Wee},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Fully, (Almost) Tightly Secure {IBE} and Dual System Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {435--460},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_25},
  doi          = {10.1007/978-3-642-40084-1\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenDIKMRR13,
  author       = {Gil Cohen and
                  Ivan Bjerre Damg{\aa}rd and
                  Yuval Ishai and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen and
                  Ran Raz and
                  Ron D. Rothblum},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae -
                  (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_11},
  doi          = {10.1007/978-3-642-40084-1\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenDIKMRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronLT13,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Practical Multilinear Maps over the Integers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {476--493},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_26},
  doi          = {10.1007/978-3-642-40041-4\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucasDLL13,
  author       = {L{\'{e}}o Ducas and
                  Alain Durmus and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Lattice Signatures and Bimodal Gaussians},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_3},
  doi          = {10.1007/978-3-642-40041-4\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DucasDLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DupuisFW13,
  author       = {Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Omar Fawzi and
                  Stephanie Wehner},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Achieving the Limits of the Noisy-Storage Model Using Entanglement
                  Sampling},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {326--343},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_19},
  doi          = {10.1007/978-3-642-40084-1\_19},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DupuisFW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DziembowskiKO13,
  author       = {Stefan Dziembowski and
                  Tomasz Kazana and
                  Maciej Obremski},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Non-malleable Codes from Two-Source Extractors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {239--257},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_14},
  doi          = {10.1007/978-3-642-40084-1\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DziembowskiKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/EscalaHKRV13,
  author       = {Alex Escala and
                  Gottfried Herold and
                  Eike Kiltz and
                  Carla R{\`{a}}fols and
                  Jorge L. Villar},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {An Algebraic Framework for Diffie-Hellman Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {129--147},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_8},
  doi          = {10.1007/978-3-642-40084-1\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/EscalaHKRV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FazioGPS13,
  author       = {Nelly Fazio and
                  Rosario Gennaro and
                  Irippuge Milinda Perera and
                  William E. Skeith III},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {148--165},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_9},
  doi          = {10.1007/978-3-642-40084-1\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FazioGPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FouqueJP13,
  author       = {Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Structural Evaluation of {AES} and Chosen-Key Distinguisher of 9-Round
                  {AES-128}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {183--203},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_11},
  doi          = {10.1007/978-3-642-40041-4\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FouqueJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FranklinGOS13,
  author       = {Matthew K. Franklin and
                  Ran Gelles and
                  Rafail Ostrovsky and
                  Leonard J. Schulman},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Optimal Coding for Streaming Authentication and Interactive Communication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {258--276},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_15},
  doi          = {10.1007/978-3-642-40084-1\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FranklinGOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FreireHPS13,
  author       = {Eduarda S. V. Freire and
                  Dennis Hofheinz and
                  Kenneth G. Paterson and
                  Christoph Striecks},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Programmable Hash Functions in the Multilinear Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {513--530},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_28},
  doi          = {10.1007/978-3-642-40041-4\_28},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FreireHPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargGHSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Attribute-Based Encryption for Circuits from Multilinear Maps},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {479--499},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_27},
  doi          = {10.1007/978-3-642-40084-1\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargGHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Gazi13,
  author       = {Peter Gazi},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Plain versus Randomized Cascading-Based Key-Length Extension for Block
                  Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {551--570},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_30},
  doi          = {10.1007/978-3-642-40041-4\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Gazi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentrySW13,
  author       = {Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler,
                  Asymptotically-Faster, Attribute-Based},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_5},
  doi          = {10.1007/978-3-642-40041-4\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentrySW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserKPVZ13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {How to Run Turing Machines on Encrypted Data},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {536--553},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_30},
  doi          = {10.1007/978-3-642-40084-1\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserKPVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GologluGMZ13,
  author       = {Faruk G{\"{o}}loglu and
                  Robert Granger and
                  Gary McGuire and
                  Jens Zumbr{\"{a}}gel},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {On the Function Field Sieve and the Impact of Higher Splitting Probabilities
                  - Application to Discrete Logarithms in and},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_7},
  doi          = {10.1007/978-3-642-40084-1\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GologluGMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalG013,
  author       = {Vipul Goyal and
                  Divya Gupta and
                  Abhishek Jain},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {What Information Is Leaked under Concurrent Composition?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {220--238},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_13},
  doi          = {10.1007/978-3-642-40084-1\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalG013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalMPS13,
  author       = {Vipul Goyal and
                  Ilya Mironov and
                  Omkant Pandey and
                  Amit Sahai},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {298--315},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_17},
  doi          = {10.1007/978-3-642-40041-4\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalMPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtML13,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {A Dynamic Tradeoff between Active and Passive Corruptions in Secure
                  Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {203--219},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_12},
  doi          = {10.1007/978-3-642-40084-1\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtML13a,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Erratum: {A} Dynamic Tradeoff between Active and Passive Corruptions
                  in Secure Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_31},
  doi          = {10.1007/978-3-642-40084-1\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtML13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HohenbergerSW13,
  author       = {Susan Hohenberger and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based
                  Aggregate Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {494--512},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_27},
  doi          = {10.1007/978-3-642-40041-4\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HohenbergerSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HuangKE13,
  author       = {Yan Huang and
                  Jonathan Katz and
                  David Evans},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_2},
  doi          = {10.1007/978-3-642-40084-1\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HuangKE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HubacekNR13,
  author       = {Pavel Hub{\'{a}}cek and
                  Jesper Buus Nielsen and
                  Alon Rosen},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Limits on the Power of Cryptographic Cheap Talk},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {277--297},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_16},
  doi          = {10.1007/978-3-642-40041-4\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HubacekNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzPS13,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Mario Szegedy},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Digital Signatures with Minimal Overhead from Indifferentiable Random
                  Invertible Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {571--588},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_31},
  doi          = {10.1007/978-3-642-40041-4\_31},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiltzPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KolesnikovK13,
  author       = {Vladimir Kolesnikov and
                  Ranjit Kumaresan},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Improved {OT} Extension for Transferring Short Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {54--70},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_4},
  doi          = {10.1007/978-3-642-40084-1\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KolesnikovK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KrawczykPW13,
  author       = {Hugo Krawczyk and
                  Kenneth G. Paterson and
                  Hoeteck Wee},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {On the Security of the {TLS} Protocol: {A} Systematic Analysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {429--448},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_24},
  doi          = {10.1007/978-3-642-40041-4\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KrawczykPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Leurent13,
  author       = {Ga{\"{e}}tan Leurent},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Construction of Differential Characteristics in {ARX} Designs Application
                  to Skein},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {241--258},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_14},
  doi          = {10.1007/978-3-642-40041-4\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Leurent13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPJY13,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {289--307},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_17},
  doi          = {10.1007/978-3-642-40084-1\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPJY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Lindell13,
  author       = {Yehuda Lindell},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_1},
  doi          = {10.1007/978-3-642-40084-1\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Lindell13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LyubashevskyM13,
  author       = {Vadim Lyubashevsky and
                  Daniel Masny},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Man-in-the-Middle Secure Authentication Schemes from {LPN} and Weak
                  PRFs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {308--325},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_18},
  doi          = {10.1007/978-3-642-40084-1\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LyubashevskyM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicciancioP13,
  author       = {Daniele Micciancio and
                  Chris Peikert},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Hardness of {SIS} and {LWE} with Small Parameters},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_2},
  doi          = {10.1007/978-3-642-40041-4\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/MicciancioP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MohasselR13,
  author       = {Payman Mohassel and
                  Ben Riva},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Garbled Circuits Checking Garbled Circuits: More Efficient and Secure
                  Two-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {36--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_3},
  doi          = {10.1007/978-3-642-40084-1\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MohasselR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MolleviPY13,
  author       = {Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Carles Padr{\'{o}} and
                  An Yang},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Secret Sharing, Rank Inequalities and Information Inequalities},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {277--288},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_16},
  doi          = {10.1007/978-3-642-40084-1\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MolleviPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RistenpartY13,
  author       = {Thomas Ristenpart and
                  Scott Yilek},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against {N}
                  Queries},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {392--409},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_22},
  doi          = {10.1007/978-3-642-40041-4\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RistenpartY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StandaertPY13,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Yu Yu},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Leakage-Resilient Symmetric Cryptography under Empirically Verifiable
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {335--352},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_19},
  doi          = {10.1007/978-3-642-40041-4\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/StandaertPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Stevens13,
  author       = {Marc Stevens},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Counter-Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_8},
  doi          = {10.1007/978-3-642-40041-4\_8},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Stevens13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StrobelDKLOSP13,
  author       = {Daehyun Strobel and
                  Benedikt Driessen and
                  Timo Kasper and
                  Gregor Leander and
                  David F. Oswald and
                  Falk Schellenberg and
                  Christof Paar},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital
                  Locking and Access Control System},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {147--164},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_9},
  doi          = {10.1007/978-3-642-40041-4\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/StrobelDKLOSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Thaler13,
  author       = {Justin Thaler},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Time-Optimal Interactive Proofs for Circuit Evaluation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {71--89},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_5},
  doi          = {10.1007/978-3-642-40084-1\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Thaler13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Unruh13,
  author       = {Dominique Unruh},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Everlasting Multi-party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {380--397},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_22},
  doi          = {10.1007/978-3-642-40084-1\_22},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Unruh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/VadhanZ13,
  author       = {Salil P. Vadhan and
                  Colin Jia Zheng},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {A Uniform Min-Max Theorem with Applications in Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_6},
  doi          = {10.1007/978-3-642-40041-4\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/VadhanZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4},
  doi          = {10.1007/978-3-642-40041-4},
  isbn         = {978-3-642-40040-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2013-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-2,
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1},
  doi          = {10.1007/978-3-642-40084-1},
  isbn         = {978-3-642-40083-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2013-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdelraheemABL12,
  author       = {Mohamed Ahmed Abdelraheem and
                  Martin {\AA}gren and
                  Peter Beelen and
                  Gregor Leander},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {On the Distribution of Linear Biases: Three Instructive Examples},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {50--67},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_4},
  doi          = {10.1007/978-3-642-32009-5\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdelraheemABL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGJPS12,
  author       = {Shweta Agrawal and
                  Vipul Goyal and
                  Abhishek Jain and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {New Impossibility Results for Concurrent Composition and a Non-interactive
                  Completeness Theorem for Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {443--460},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_26},
  doi          = {10.1007/978-3-642-32009-5\_26},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGJPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenKMZ12,
  author       = {Jo{\"{e}}l Alwen and
                  Jonathan Katz and
                  Ueli Maurer and
                  Vassilis Zikas},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Collusion-Preserving Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {124--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_9},
  doi          = {10.1007/978-3-642-32009-5\_9},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenKMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BardouFKSST12,
  author       = {Romain Bardou and
                  Riccardo Focardi and
                  Yusuke Kawamoto and
                  Lorenzo Simionato and
                  Graham Steel and
                  Joe{-}Kai Tsay},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Efficient Padding Oracle Attacks on Cryptographic Hardware},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {608--625},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_36},
  doi          = {10.1007/978-3-642-32009-5\_36},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BardouFKSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BayMV12,
  author       = {Asl{\'{\i}} Bay and
                  Atefeh Mashatan and
                  Serge Vaudenay},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Resistance against Iterated Attacks by Decorrelation Revisited,},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {741--757},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_43},
  doi          = {10.1007/978-3-642-32009-5\_43},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BayMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeimelFM12,
  author       = {Amos Beimel and
                  Oriol Farr{\`{a}}s and
                  Yuval Mintz},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Secret Sharing Schemes for Very Dense Graphs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_10},
  doi          = {10.1007/978-3-642-32009-5\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BeimelFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareRT12,
  author       = {Mihir Bellare and
                  Thomas Ristenpart and
                  Stefano Tessaro},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Multi-instance Security and Its Application to Password-Based Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {312--329},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_19},
  doi          = {10.1007/978-3-642-32009-5\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareTV12,
  author       = {Mihir Bellare and
                  Stefano Tessaro and
                  Alexander Vardy},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Semantic Security for the Wiretap Channel},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {294--311},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_18},
  doi          = {10.1007/978-3-642-32009-5\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-SassonFO12,
  author       = {Eli Ben{-}Sasson and
                  Serge Fehr and
                  Rafail Ostrovsky},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest
                  Minority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {663--680},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_39},
  doi          = {10.1007/978-3-642-32009-5\_39},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-SassonFO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BertaFW12,
  author       = {Mario Berta and
                  Omar Fawzi and
                  Stephanie Wehner},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Quantum to Classical Randomness Extractors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {776--793},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_45},
  doi          = {10.1007/978-3-642-32009-5\_45},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BertaFW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyC12,
  author       = {Nir Bitansky and
                  Alessandro Chiesa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Succinct Arguments from Multi-prover Interactive Proofs and Their
                  Efficiency Benefits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {255--272},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_16},
  doi          = {10.1007/978-3-642-32009-5\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Brakerski12,
  author       = {Zvika Brakerski},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Fully Homomorphic Encryption without Modulus Switching from Classical
                  GapSVP},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {868--886},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_50},
  doi          = {10.1007/978-3-642-32009-5\_50},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Brakerski12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Brickell12,
  author       = {Ernie Brickell},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Recent Advances and Existing Research Questions in Platform Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {570},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_33},
  doi          = {10.1007/978-3-642-32009-5\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Brickell12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaseV12,
  author       = {Melissa Chase and
                  Ivan Visconti},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Secure Database Commitments and Universal Arguments of Quasi Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {236--254},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_15},
  doi          = {10.1007/978-3-642-32009-5\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaseV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledK12,
  author       = {Dana Dachman{-}Soled and
                  Yael Tauman Kalai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Securing Circuits against Constant-Rate Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {533--551},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_31},
  doi          = {10.1007/978-3-642-32009-5\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardPSZ12,
  author       = {Ivan Damg{\aa}rd and
                  Valerio Pastro and
                  Nigel P. Smart and
                  Sarah Zakarias},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Multiparty Computation from Somewhat Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {643--662},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_38},
  doi          = {10.1007/978-3-642-32009-5\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardPSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS12,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis,
                  Knapsacks, and Combinatorial Search Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {719--740},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_42},
  doi          = {10.1007/978-3-642-32009-5\_42},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurDKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisLMV12,
  author       = {Yevgeniy Dodis and
                  Adriana L{\'{o}}pez{-}Alt and
                  Ilya Mironov and
                  Salil P. Vadhan},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Differential Privacy with Imperfect Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {497--516},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_29},
  doi          = {10.1007/978-3-642-32009-5\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisLMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisRST12,
  author       = {Yevgeniy Dodis and
                  Thomas Ristenpart and
                  John P. Steinberger and
                  Stefano Tessaro},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {To Hash or Not to Hash Again? (In)Differentiability Results for {H}
                  2 and {HMAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {348--366},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_21},
  doi          = {10.1007/978-3-642-32009-5\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisRST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DucJ12,
  author       = {Alexandre Duc and
                  Dimitar Jetchev},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Hardness of Computing Individual Bits for One-Way Functions on Elliptic
                  Curves},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {832--849},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_48},
  doi          = {10.1007/978-3-642-32009-5\_48},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DucJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DupuisNS12,
  author       = {Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Jesper Buus Nielsen and
                  Louis Salvail},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Actively Secure Two-Party Evaluation of Any Quantum Operation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {794--811},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_46},
  doi          = {10.1007/978-3-642-32009-5\_46},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DupuisNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargKOV12,
  author       = {Sanjam Garg and
                  Abishek Kumarasubramanian and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Impossibility Results for Static Input Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {424--442},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_25},
  doi          = {10.1007/978-3-642-32009-5\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargKOV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargS12,
  author       = {Sanjam Garg and
                  Amit Sahai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Adaptively Secure Multi-Party Computation with Dishonest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {105--123},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_8},
  doi          = {10.1007/978-3-642-32009-5\_8},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GehrkeHLP12,
  author       = {Johannes Gehrke and
                  Michael Hay and
                  Edward Lui and
                  Rafael Pass},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Crowd-Blending Privacy},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {479--496},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_28},
  doi          = {10.1007/978-3-642-32009-5\_28},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GehrkeHLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Homomorphic Evaluation of the {AES} Circuit},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {850--867},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_49},
  doi          = {10.1007/978-3-642-32009-5\_49},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GorbunovVW12,
  author       = {Sergey Gorbunov and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Functional Encryption with Bounded Collusions via Multi-party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {162--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_11},
  doi          = {10.1007/978-3-642-32009-5\_11},
  timestamp    = {Mon, 29 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GorbunovVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HanaokaMS12,
  author       = {Goichiro Hanaoka and
                  Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {On the Impossibility of Constructing Efficient Key Encapsulation and
                  Programmable Hash Functions in Prime Order Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {812--831},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_47},
  doi          = {10.1007/978-3-642-32009-5\_47},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HanaokaMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangMR12,
  author       = {Viet Tung Hoang and
                  Ben Morris and
                  Phillip Rogaway},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {An Enciphering Scheme Based on a Card Shuffle},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_1},
  doi          = {10.1007/978-3-642-32009-5\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HofheinzJ12,
  author       = {Dennis Hofheinz and
                  Tibor Jager},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Tightly Secure Signatures and Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {590--607},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_35},
  doi          = {10.1007/978-3-642-32009-5\_35},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HofheinzJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IwataOM12,
  author       = {Tetsu Iwata and
                  Keisuke Ohashi and
                  Kazuhiko Minematsu},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Breaking and Repairing {GCM} Security Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {31--49},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_3},
  doi          = {10.1007/978-3-642-32009-5\_3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/IwataOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JagerKSS12,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {On the Security of {TLS-DHE} in the Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {273--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_17},
  doi          = {10.1007/978-3-642-32009-5\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/JagerKSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnellwolfK12,
  author       = {Simon Knellwolf and
                  Dmitry Khovratovich},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {New Preimage Attacks against Reduced {SHA-1}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {367--383},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_22},
  doi          = {10.1007/978-3-642-32009-5\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KnellwolfK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LandeckerST12,
  author       = {Will Landecker and
                  Thomas Shrimpton and
                  R. Seth Terashima},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Tweakable Blockciphers with Beyond Birthday-Bound Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {14--30},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_2},
  doi          = {10.1007/978-3-642-32009-5\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LandeckerST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LenstraHABKW12,
  author       = {Arjen K. Lenstra and
                  James P. Hughes and
                  Maxime Augier and
                  Joppe W. Bos and
                  Thorsten Kleinjung and
                  Christophe Wachter},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Public Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {626--642},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_37},
  doi          = {10.1007/978-3-642-32009-5\_37},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LenstraHABKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LewkoW12,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security
                  through Selective Techniques},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {180--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_12},
  doi          = {10.1007/978-3-642-32009-5\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LewkoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LibertPY12,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Group Signatures with Almost-for-Free Revocation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {571--589},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_34},
  doi          = {10.1007/978-3-642-32009-5\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LibertPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinP12,
  author       = {Huijia Lin and
                  Rafael Pass},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Black-Box Constructions of Composable Protocols without Set-Up},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {461--478},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_27},
  doi          = {10.1007/978-3-642-32009-5\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LiuL12,
  author       = {Feng{-}Hao Liu and
                  Anna Lysyanskaya},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Tamper and Leakage Resilience in the Split-State Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {517--532},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_30},
  doi          = {10.1007/978-3-642-32009-5\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LiuL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MahmoodyP12,
  author       = {Mohammad Mahmoody and
                  Rafael Pass},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {The Curious Case of Non-Interactive Commitments - On the Power of
                  Black-Box vs. Non-Black-Box Use of Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {701--718},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_41},
  doi          = {10.1007/978-3-642-32009-5\_41},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MahmoodyP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MenninkP12,
  author       = {Bart Mennink and
                  Bart Preneel},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Hash Functions Based on Three Permutations: {A} Generic Security Analysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {330--347},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_20},
  doi          = {10.1007/978-3-642-32009-5\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MenninkP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MilesV12,
  author       = {Eric Miles and
                  Emanuele Viola},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Substitution-Permutation Networks, Pseudorandom Functions, and Natural
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {68--85},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_5},
  doi          = {10.1007/978-3-642-32009-5\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MilesV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NielsenNOB12,
  author       = {Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Claudio Orlandi and
                  Sai Sheshank Burra},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {A New Approach to Practical Active-Secure Two-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {681--700},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_40},
  doi          = {10.1007/978-3-642-32009-5\_40},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/NielsenNOB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rosulek12,
  author       = {Mike Rosulek},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Must You Know the Code of f to Securely Compute f?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {87--104},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_7},
  doi          = {10.1007/978-3-642-32009-5\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rosulek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rosulek12a,
  author       = {Mike Rosulek},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Universal Composability from Essentially Any Trusted Setup},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {406--423},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_24},
  doi          = {10.1007/978-3-642-32009-5\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rosulek12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rothblum12,
  author       = {Guy N. Rothblum},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {How to Compute under {\textdollar}\{{\textbackslash}cal\{AC\}\}\{{\textbackslash}sf0\}{\textdollar}
                  Leakage without Secure Hardware},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {552--569},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_32},
  doi          = {10.1007/978-3-642-32009-5\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rothblum12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SahaiSW12,
  author       = {Amit Sahai and
                  Hakan Seyalioglu and
                  Brent Waters},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based
                  Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {199--217},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_13},
  doi          = {10.1007/978-3-642-32009-5\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SahaiSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SteinbergerSY12,
  author       = {John P. Steinberger and
                  Xiaoming Sun and
                  Zhe Yang},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Stam's Conjecture and Threshold Phenomena in Collision Resistance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {384--405},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_23},
  doi          = {10.1007/978-3-642-32009-5\_23},
  timestamp    = {Wed, 26 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SteinbergerSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Waters12,
  author       = {Brent Waters},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Functional Encryption for Regular Languages},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {218--235},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_14},
  doi          = {10.1007/978-3-642-32009-5\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Waters12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zhandry12,
  author       = {Mark Zhandry},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Secure Identity-Based Encryption in the Quantum Random Oracle Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {758--775},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_44},
  doi          = {10.1007/978-3-642-32009-5\_44},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zhandry12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Zittrain12,
  author       = {Jonathan Zittrain},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {The End of Crypto},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {86},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_6},
  doi          = {10.1007/978-3-642-32009-5\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Zittrain12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2012,
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5},
  doi          = {10.1007/978-3-642-32009-5},
  isbn         = {978-3-642-32008-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeGHO11,
  author       = {Masayuki Abe and
                  Jens Groth and
                  Kristiyan Haralambiev and
                  Miyako Ohkubo},
  editor       = {Phillip Rogaway},
  title        = {Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {649--666},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_37},
  doi          = {10.1007/978-3-642-22792-9\_37},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeGHO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AsharovLR11,
  author       = {Gilad Asharov and
                  Yehuda Lindell and
                  Tal Rabin},
  editor       = {Phillip Rogaway},
  title        = {Perfectly-Secure Multiplication for Any \emph{t {\textless} n}/3},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {240--258},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_14},
  doi          = {10.1007/978-3-642-22792-9\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AsharovLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BaecherF11,
  author       = {Paul Baecher and
                  Marc Fischlin},
  editor       = {Phillip Rogaway},
  title        = {Random Oracle Reducibility},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_2},
  doi          = {10.1007/978-3-642-22792-9\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BaecherF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11,
  author       = {Boaz Barak and
                  Yevgeniy Dodis and
                  Hugo Krawczyk and
                  Olivier Pereira and
                  Krzysztof Pietrzak and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  editor       = {Phillip Rogaway},
  title        = {Leftover Hash Lemma, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_1},
  doi          = {10.1007/978-3-642-22792-9\_1},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BarakDKPPSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartheGHB11,
  author       = {Gilles Barthe and
                  Benjamin Gr{\'{e}}goire and
                  Sylvain Heraud and
                  Santiago Zanella B{\'{e}}guelin},
  editor       = {Phillip Rogaway},
  title        = {Computer-Aided Security Proofs for the Working Cryptographer},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {71--90},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_5},
  doi          = {10.1007/978-3-642-22792-9\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartheGHB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics