Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/crypto:"
more than 1000 matches, exporting first 1000 hits only!
@inproceedings{DBLP:conf/crypto/AbrahamJMMS23, author = {Ittai Abraham and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {39--70}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_2}, doi = {10.1007/978-3-031-38557-5\_2}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbrahamJMMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbramWZ23, author = {Damiano Abram and Brent Waters and Mark Zhandry}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Security-Preserving Distributed Samplers: How to Generate Any {CRS} in One Round Without Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {489--514}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_16}, doi = {10.1007/978-3-031-38557-5\_16}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbramWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AcharyaHPV23, author = {Anasuya Acharya and Carmit Hazay and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Best of Both Worlds - Revisiting the Spymasters Double Agent Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {328--359}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_11}, doi = {10.1007/978-3-031-38557-5\_11}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AcharyaHPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalCO23, author = {Divesh Aggarwal and Eldon Chung and Maciej Obremski}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Extractors: Low Entropy Requirements Colliding with Non-malleability}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {580--610}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_19}, doi = {10.1007/978-3-031-38545-2\_19}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalCO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalRYY23, author = {Shweta Agrawal and M{\'{e}}lissa Rossi and Anshu Yadav and Shota Yamada}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {532--564}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_17}, doi = {10.1007/978-3-031-38551-3\_17}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalRYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalTY23, author = {Shweta Agrawal and Junichi Tomida and Anshu Yadav}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Attribute-Based Multi-input {FE} (and More) for Attribute-Weighted Sums}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {464--497}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_15}, doi = {10.1007/978-3-031-38551-3\_15}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenMT23, author = {Jo{\"{e}}l Alwen and Marta Mularczyk and Yiannis Tselekounis}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Fork-Resilient Continuous Group Key Agreement}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {396--429}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_13}, doi = {10.1007/978-3-031-38551-3\_13}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthKL22, author = {Prabhanjan Ananth and Fatih Kaleoglu and Qipeng Liu}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Cloning Games: {A} General Framework for Unclonable Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {66--98}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_3}, doi = {10.1007/978-3-031-38554-4\_3}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumNP23, author = {Benny Applebaum and Oded Nir and Benny Pinkas}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {How to Recover a Secret with O(n) Additions}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {236--262}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_8}, doi = {10.1007/978-3-031-38557-5\_8}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AragonDG23, author = {Nicolas Aragon and Victor Dyseryn and Philippe Gaborit}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Analysis of the Security of the {PSSI} Problem and Cryptanalysis of the Durandal Signature Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {127--149}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_5}, doi = {10.1007/978-3-031-38548-3\_5}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AragonDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BachoCLL23, author = {Renas Bacho and Daniel Collins and Chen{-}Da Liu{-}Zhang and Julian Loss}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Network-Agnostic Security Comes (Almost) for Free in {DKG} and {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {71--106}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_3}, doi = {10.1007/978-3-031-38557-5\_3}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BachoCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BackendalBGS23, author = {Matilda Backendal and Mihir Bellare and Felix G{\"{u}}nther and Matteo Scarlata}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {When Messages Are Keys: Is {HMAC} a Dual-PRF?}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {661--693}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_22}, doi = {10.1007/978-3-031-38548-3\_22}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BackendalBGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaeCKPS23, author = {Youngjin Bae and Jung Hee Cheon and Jaehyung Kim and Jai Hyun Park and Damien Stehl{\'{e}}}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {{HERMES:} Efficient Ring Packing Using {MLWE} Ciphertexts and Application to Transciphering}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {37--69}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_2}, doi = {10.1007/978-3-031-38551-3\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaeCKPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarbosaBDDFGHHLW22, author = {Manuel Barbosa and Gilles Barthe and Christian Doczkal and Jelle Don and Serge Fehr and Benjamin Gr{\'{e}}goire and Yu{-}Hsuan Huang and Andreas H{\"{u}}lsing and Yi Lee and Xiaodi Wu}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {358--389}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_12}, doi = {10.1007/978-3-031-38554-4\_12}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BarbosaBDDFGHHLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarbosaDGHMS22, author = {Manuel Barbosa and Fran{\c{c}}ois Dupressoir and Benjamin Gr{\'{e}}goire and Andreas H{\"{u}}lsing and Matthias Meijers and Pierre{-}Yves Strub}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Machine-Checked Security for rmXMSS as in {RFC} 8391 and {\textdollar}{\textbackslash}mathrm \{SPHINCS\{+\}\} {\textdollar}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {421--454}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_14}, doi = {10.1007/978-3-031-38554-4\_14}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarbosaDGHMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarootiCCHV23, author = {Khashayar Barooti and Daniel Collins and Simone Colombo and Lo{\"{\i}}s Huguenin{-}Dumittan and Serge Vaudenay}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On Active Attack Detection in Messaging with Immediate Decryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {362--395}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_12}, doi = {10.1007/978-3-031-38551-3\_12}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarootiCCHV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekK22, author = {James Bartusek and Dakshita Khurana}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Cryptography with Certified Deletion}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {192--223}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_7}, doi = {10.1007/978-3-031-38554-4\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartusekK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekKP22, author = {James Bartusek and Dakshita Khurana and Alexander Poremba}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Publicly-Verifiable Deletion via Target-Collapsing Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {99--128}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_4}, doi = {10.1007/978-3-031-38554-4\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartusekKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekKS22, author = {James Bartusek and Dakshita Khurana and Akshayaram Srinivasan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Secure Computation with Shared {EPR} Pairs (Or: How to Teleport in Zero-Knowledge)}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {224--257}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_8}, doi = {10.1007/978-3-031-38554-4\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartusekKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaumBGKORS22, author = {Carsten Baum and Lennart Braun and Cyprien Delpech de Saint Guilhem and Michael Kloo{\ss} and Emmanuela Orsini and Lawrence Roy and Peter Scholl}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures from VOLE-in-the-Head}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {581--615}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_19}, doi = {10.1007/978-3-031-38554-4\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BaumBGKORS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleFLNS23, author = {Christof Beierle and Patrick Felke and Gregor Leander and Patrick Neumann and Lukas Stennes}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On Perfect Linear Approximations and Differentials over Two-Round SPNs}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {209--239}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_8}, doi = {10.1007/978-3-031-38548-3\_8}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BeierleFLNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BelaidCRT23, author = {Sonia Bela{\"{\i}}d and Ga{\"{e}}tan Cassiers and Matthieu Rivain and Abdul Rahman Taleb}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Unifying Freedom and Separation for Tight Probing-Secure Composition}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {440--472}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_15}, doi = {10.1007/978-3-031-38548-3\_15}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BelaidCRT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellesMunozUS23, author = {Marta Bell{\'{e}}s{-}Mu{\~{n}}oz and Jorge Jim{\'{e}}nez Urroz and Javier Silva}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Revisiting Cycles of Pairing-Friendly Elliptic Curves}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {3--37}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_1}, doi = {10.1007/978-3-031-38545-2\_1}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellesMunozUS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BerndtEFGOS23, author = {Sebastian Berndt and Thomas Eisenbarth and Sebastian Faust and Marc Gourjon and Maximilian Orlt and Okan Seker}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Combined Fault and Leakage Resilience: Composability, Constructions and Compiler}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {377--409}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_13}, doi = {10.1007/978-3-031-38548-3\_13}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BerndtEFGOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Beullens23, author = {Ward Beullens}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {101--126}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_4}, doi = {10.1007/978-3-031-38548-3\_4}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Beullens23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeullensS22, author = {Ward Beullens and Gregor Seiler}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {LaBRADOR: Compact Proofs for {R1CS} from Module-SIS}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {518--548}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_17}, doi = {10.1007/978-3-031-38554-4\_17}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeullensS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BienstockEP23, author = {Alexander Bienstock and Daniel Escudero and Antigoni Polychroniadou}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On Linear Communication Complexity for (Maximally) Fluid {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {263--294}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_9}, doi = {10.1007/978-3-031-38557-5\_9}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BienstockEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyPSS23, author = {Nir Bitansky and Omer Paneth and Dana Shamir and Tomer Solomon}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Non-interactive Universal Arguments}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {132--158}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_5}, doi = {10.1007/978-3-031-38545-2\_5}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BombarCCD23, author = {Maxime Bombar and Geoffroy Couteau and Alain Couvreur and Cl{\'{e}}ment Ducros}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {567--601}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_18}, doi = {10.1007/978-3-031-38551-3\_18}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BombarCCD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehBCGI23, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Arithmetic Sketching}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {171--202}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_6}, doi = {10.1007/978-3-031-38557-5\_6}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehBCGI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BootleCS23, author = {Jonathan Bootle and Alessandro Chiesa and Katerina Sotiraki}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Lattice-Based Succinct Arguments for {NP} with Polylogarithmic-Time Verification}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {227--251}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_8}, doi = {10.1007/978-3-031-38545-2\_8}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BootleCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BootleLNS23, author = {Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Alessandro Sorniotti}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {A Framework for Practical Anonymous Credentials from Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {384--417}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_13}, doi = {10.1007/978-3-031-38545-2\_13}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BootleLNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BouraDDLN23, author = {Christina Boura and Nicolas David and Patrick Derbez and Gregor Leander and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Differential Meet-In-The-Middle Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {240--272}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_9}, doi = {10.1007/978-3-031-38548-3\_9}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BouraDDLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BouvierBCPSVW23, author = {Cl{\'{e}}mence Bouvier and Pierre Briaud and Pyrros Chaidos and L{\'{e}}o Perrin and Robin Salen and Vesselin Velichkov and Danny Willems}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {507--539}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_17}, doi = {10.1007/978-3-031-38548-3\_17}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BouvierBCPSVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Brakerski22, author = {Zvika Brakerski}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Black-Hole Radiation Decoding Is Quantum Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {37--65}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_2}, doi = {10.1007/978-3-031-38554-4\_2}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Brakerski22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiBKLP23, author = {Zvika Brakerski and Maya Farber Brodsky and Yael Tauman Kalai and Alex Lombardi and Omer Paneth}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {SNARGs for Monotone Policy Batch {NP}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {252--283}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_9}, doi = {10.1007/978-3-031-38545-2\_9}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiBKLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiGKPV22, author = {Zvika Brakerski and Alexandru Gheorghiu and Gregory D. Kahanamoku{-}Meyer and Eitan Porat and Thomas Vidick}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Simple Tests of Quantumness Also Certify Qubits}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {162--191}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_6}, doi = {10.1007/978-3-031-38554-4\_6}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiGKPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrancoDS23, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {A Framework for Statistically Sender Private {OT} with Optimal Rate}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {548--576}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_18}, doi = {10.1007/978-3-031-38557-5\_18}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrancoDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BraunDO23, author = {Lennart Braun and Ivan Damg{\aa}rd and Claudio Orlandi}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Secure Multiparty Computation from Threshold Encryption Based on Class Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {613--645}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_20}, doi = {10.1007/978-3-031-38557-5\_20}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BraunDO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CastryckHMMBV23, author = {Wouter Castryck and Marc Houben and Simon{-}Philipp Merz and Marzio Mula and Sam van Buuren and Frederik Vercauteren}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Weak Instances of Class Group Action Based Cryptography via Self-pairings}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {762--792}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_25}, doi = {10.1007/978-3-031-38548-3\_25}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CastryckHMMBV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChampionW23, author = {Jeffrey Champion and David J. Wu}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Non-interactive Zero-Knowledge from Non-interactive Batch Arguments}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {38--71}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_2}, doi = {10.1007/978-3-031-38545-2\_2}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChampionW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaseDV23, author = {Melissa Chase and F. Bet{\"{u}}l Durak and Serge Vaudenay}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {418--449}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_14}, doi = {10.1007/978-3-031-38545-2\_14}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaseDV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chen22, author = {Yanbo Chen}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {sfDualMS: Efficient Lattice-Based Two-Round Multi-signature with Trapdoor-Free Simulation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {716--747}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_23}, doi = {10.1007/978-3-031-38554-4\_23}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Chen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenCL23, author = {Yu Long Chen and Wonseok Choi and Changmin Lee}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Improved Multi-user Security Using the Squared-Ratio Method}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {694--724}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_23}, doi = {10.1007/978-3-031-38545-2\_23}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoudhuriGJJZ23, author = {Arka Rai Choudhuri and Sanjam Garg and Abhishek Jain and Zhengzhong Jin and Jiaheng Zhang}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Correlation Intractability and SNARGs from Sub-exponential {DDH}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {635--668}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_20}, doi = {10.1007/978-3-031-38551-3\_20}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoudhuriGJJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChuGRS23, author = {Hien Chu and Paul Gerhart and Tim Ruffing and Dominique Schr{\"{o}}der}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Practical Schnorr Threshold Signatures Without the Algebraic Group Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {743--773}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_24}, doi = {10.1007/978-3-031-38557-5\_24}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChuGRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CiampiOSW23, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Hendrik Waldner}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {List Oblivious Transfer and Applications to Round-Optimal Black-Box Multiparty Coin Tossing}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {459--488}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_15}, doi = {10.1007/978-3-031-38557-5\_15}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CiampiOSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CiniLM23, author = {Valerio Cini and Russell W. F. Lai and Giulio Malavolta}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Lattice-Based Succinct Arguments from Vanishing Polynomials - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {72--105}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_3}, doi = {10.1007/978-3-031-38545-2\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CiniLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenGZ23, author = {Ran Cohen and Juan A. Garay and Vassilis Zikas}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Completeness Theorems for Adaptively Secure Broadcast}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {3--38}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_1}, doi = {10.1007/978-3-031-38557-5\_1}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenGZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CouteauJJQ23, author = {Geoffroy Couteau and Abhishek Jain and Zhengzhong Jin and Willy Quach}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {A Note on Non-interactive Zero-Knowledge from {CDH}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {731--764}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_23}, doi = {10.1007/978-3-031-38551-3\_23}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CouteauJJQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CritesKM23, author = {Elizabeth C. Crites and Chelsea Komlo and Mary Maller}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Fully Adaptive Schnorr Threshold Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {678--709}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_22}, doi = {10.1007/978-3-031-38557-5\_22}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CritesKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CritesKMTZ23, author = {Elizabeth C. Crites and Chelsea Komlo and Mary Maller and Stefano Tessaro and Chenzhi Zhu}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Snowblind: {A} Threshold Blind Signature in Pairing-Free Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {710--742}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_23}, doi = {10.1007/978-3-031-38557-5\_23}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CritesKMTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DachmanSoledGHK22, author = {Dana Dachman{-}Soled and Huijing Gong and Tom Hanson and Hunter Kippen}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Revisiting Security Estimation for {LWE} with Hints from a Geometric Perspective}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {748--781}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_24}, doi = {10.1007/978-3-031-38554-4\_24}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DachmanSoledGHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaoIJL23, author = {Quang Dao and Yuval Ishai and Aayush Jain and Huijia Lin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Multi-party Homomorphic Secret Sharing and Sublinear {MPC} from Sparse {LPN}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {315--348}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_11}, doi = {10.1007/978-3-031-38545-2\_11}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaoIJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DavidDGIKKLN23, author = {Bernardo David and Giovanni Deligios and Aarushi Goel and Yuval Ishai and Anders Konring and Eyal Kushilevitz and Chen{-}Da Liu{-}Zhang and Varun Narayanan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Perfect {MPC} over Layered Graphs}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {360--392}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_12}, doi = {10.1007/978-3-031-38557-5\_12}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DavidDGIKKLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaviesFGHHHJ23, author = {Gareth T. Davies and Sebastian H. Faller and Kai Gellert and Tobias Handirk and Julia Hesse and M{\'{a}}t{\'{e}} Horv{\'{a}}th and Tibor Jager}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {330--361}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_11}, doi = {10.1007/978-3-031-38551-3\_11}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaviesFGHHHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DeveveyFPS22, author = {Julien Devevey and Pouria Fallahpour and Alain Passel{\`{e}}gue and Damien Stehl{\'{e}}}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {A Detailed Analysis of Fiat-Shamir with Aborts}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {327--357}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_11}, doi = {10.1007/978-3-031-38554-4\_11}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DeveveyFPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisFGHP23, author = {Yevgeniy Dodis and Niels Ferguson and Eli Goldin and Peter Hall and Krzysztof Pietrzak}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {514--546}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_17}, doi = {10.1007/978-3-031-38545-2\_17}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisFGHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DucasEP23, author = {L{\'{e}}o Ducas and Thomas Espitau and Eamonn W. Postlethwaite}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Finding Short Integer Solutions When the Modulus Is Small}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {150--176}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_6}, doi = {10.1007/978-3-031-38548-3\_6}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DucasEP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DucasP23, author = {L{\'{e}}o Ducas and Ludo N. Pulles}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Does the Dual-Sieve Attack on Learning with Errors Even Work?}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {37--69}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_2}, doi = {10.1007/978-3-031-38548-3\_2}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DucasP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DunkelmanKW23, author = {Orr Dunkelman and Nathan Keller and Ariel Weizman}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Practical-Time Related-Key Attack on {GOST} with Secret S-Boxes}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {177--208}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_7}, doi = {10.1007/978-3-031-38548-3\_7}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DunkelmanKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiFL23, author = {Stefan Dziembowski and Sebastian Faust and Tomasz Lizurej}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Individual Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {547--579}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_18}, doi = {10.1007/978-3-031-38545-2\_18}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EsginSLR22, author = {Muhammed F. Esgin and Ron Steinfeld and Dongxi Liu and Sushmita Ruj}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {484--517}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_16}, doi = {10.1007/978-3-031-38554-4\_16}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EsginSLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischLV23, author = {Ben Fisch and Zeyu Liu and Psi Vesely}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Orbweaver: Succinct Linear Functional Commitments from Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {106--131}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_4}, doi = {10.1007/978-3-031-38545-2\_4}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FreitagWW23, author = {Cody Freitag and Brent Waters and David J. Wu}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {498--531}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_16}, doi = {10.1007/978-3-031-38551-3\_16}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FreitagWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FuchsRD23, author = {Jonathan Fuchs and Yann Rotella and Joan Daemen}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On the Security of Keyed Hashing Based on Public Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {607--627}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_20}, doi = {10.1007/978-3-031-38548-3\_20}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FuchsRD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargJMSWZ23, author = {Sanjam Garg and Abhishek Jain and Pratyay Mukherjee and Rohit Sinha and Mingyuan Wang and Yinuo Zhang}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Cryptography with Weights: MPC, Encryption and Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {295--327}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_10}, doi = {10.1007/978-3-031-38557-5\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargJMSWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarimellaRS23, author = {Gayathri Garimella and Mike Rosulek and Jaspal Singh}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Malicious Secure, Structure-Aware Private Set Intersection}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {577--610}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_19}, doi = {10.1007/978-3-031-38557-5\_19}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarimellaRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaziRR23, author = {Peter Gazi and Ling Ren and Alexander Russell}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Practical Settlement Bounds for Longest-Chain Consensus}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {107--138}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_4}, doi = {10.1007/978-3-031-38557-5\_4}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaziRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GeSX22, author = {Jiangxia Ge and Tianshu Shan and Rui Xue}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {292--324}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_10}, doi = {10.1007/978-3-031-38554-4\_10}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GeSX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GellertGJJ23, author = {Kai Gellert and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {297--329}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_10}, doi = {10.1007/978-3-031-38551-3\_10}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GellertGJJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GhoshalT23, author = {Ashrujit Ghoshal and Stefano Tessaro}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {The Query-Complexity of Preprocessing Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {482--513}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_16}, doi = {10.1007/978-3-031-38545-2\_16}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GhoshalT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Giunta23, author = {Emanuele Giunta}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On the Impossibility of Algebraic {NIZK} in Pairing-Free Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {702--730}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_22}, doi = {10.1007/978-3-031-38551-3\_22}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Giunta23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GolovnevGPS23, author = {Alexander Golovnev and Siyao Guo and Spencer Peters and Noah Stephens{-}Davidowitz}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Revisiting Time-Space Tradeoffs for Function Inversion}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {453--481}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_15}, doi = {10.1007/978-3-031-38545-2\_15}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GolovnevGPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GolovnevLSTW23, author = {Alexander Golovnev and Jonathan Lee and Srinath T. V. Setty and Justin Thaler and Riad S. Wahby}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Brakedown: Linear-Time and Field-Agnostic SNARKs for {R1CS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {193--226}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_7}, doi = {10.1007/978-3-031-38545-2\_7}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GolovnevLSTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalLM22, author = {Vipul Goyal and Xiao Liang and Giulio Malavolta}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On Concurrent Multi-party Quantum Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {129--161}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_5}, doi = {10.1007/978-3-031-38554-4\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalSW23, author = {Vipul Goyal and Akshayaram Srinivasan and Mingyuan Wang}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Reusable Secure Computation in the Plain Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {427--458}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_14}, doi = {10.1007/978-3-031-38557-5\_14}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GrassiAHORW23, author = {Lorenzo Grassi and Irati Manterola Ayala and Martha Norberg Hovd and Morten {\O}ygarden and H{\aa}vard Raddum and Qingju Wang}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {305--339}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_11}, doi = {10.1007/978-3-031-38548-3\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GrassiAHORW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GrassiHRSWW23, author = {Lorenzo Grassi and Yonglin Hao and Christian Rechberger and Markus Schofnegger and Roman Walch and Qingju Wang}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {573--606}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_19}, doi = {10.1007/978-3-031-38548-3\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GrassiHRSWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuanKS23, author = {Jiaxin Guan and Alexis Korb and Amit Sahai}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Streaming Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {433--463}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_14}, doi = {10.1007/978-3-031-38551-3\_14}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuanKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GunsingBJMS23, author = {Aldo Gunsing and Ritam Bhaumik and Ashwin Jha and Bart Mennink and Yaobin Shen}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Revisiting the Indifferentiability of the Sum of Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {628--660}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_21}, doi = {10.1007/978-3-031-38548-3\_21}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GunsingBJMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviIKR23, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Additive Randomized Encodings and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {203--235}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_7}, doi = {10.1007/978-3-031-38557-5\_7}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviIKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HanLWG22, author = {Shuai Han and Shengli Liu and Zhedong Wang and Dawu Gu}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Almost Tight Multi-user Security Under Adaptive Corruptions from {LWE} in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {682--715}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_22}, doi = {10.1007/978-3-031-38554-4\_22}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HanLWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HeathKO23, author = {David Heath and Vladimir Kolesnikov and Rafail Ostrovsky}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Tri-State Circuits - {A} Circuit Model that Captures {RAM}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {128--160}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_5}, doi = {10.1007/978-3-031-38551-3\_5}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HeathKO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirchDRM23, author = {Solane El Hirch and Joan Daemen and Raghvendra Rohit and Rusydi H. Makarim}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Twin Column Parity Mixers and Gaston - {A} New Mixing Layer and Permutation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {475--506}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_16}, doi = {10.1007/978-3-031-38548-3\_16}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirchDRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoffmannMMRSU23, author = {Cl{\'{e}}ment Hoffmann and Pierrick M{\'{e}}aux and Charles Momin and Yann Rotella and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Learning with Physical Rounding for Linear and Quadratic Leakage Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {410--439}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_14}, doi = {10.1007/978-3-031-38548-3\_14}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoffmannMMRSU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HofheinzKK23, author = {Dennis Hofheinz and Julia Kastner and Karen Klein}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {The Power of Undirected Rewindings for Adaptive Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {725--758}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_24}, doi = {10.1007/978-3-031-38545-2\_24}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HofheinzKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiJLSZ23, author = {Yuval Ishai and Aayush Jain and Paul Lou and Amit Sahai and Mark Zhandry}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Computational Wiretap Coding from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {263--293}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_9}, doi = {10.1007/978-3-031-38551-3\_9}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiJLSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKNZ23, author = {Yuval Ishai and Mahimna Kelkar and Varun Narayanan and Liav Zafar}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {One-Message Secure Reductions: On the Cost of Converting Correlations}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {515--547}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_17}, doi = {10.1007/978-3-031-38557-5\_17}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKNZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Round-Optimal Black-Box {MPC} in the Plain Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {393--426}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_13}, doi = {10.1007/978-3-031-38557-5\_13}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiOS23, author = {Yuval Ishai and Rafail Ostrovsky and Akash Shah}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Succinct Arguments for {RAM} Programs via Projection Codes}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {159--192}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_6}, doi = {10.1007/978-3-031-38545-2\_6}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JainLLW23, author = {Aayush Jain and Huijia Lin and Ji Luo and Daniel Wichs}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {The Pseudorandom Oracle Model and Ideal Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {233--262}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_8}, doi = {10.1007/978-3-031-38551-3\_8}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JainLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JeudyRS23, author = {Corentin Jeudy and Adeline Roux{-}Langlois and Olivier Sanders}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Lattice Signature with Efficient Protocols, Application to Anonymous Credentials}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {351--383}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_12}, doi = {10.1007/978-3-031-38545-2\_12}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JeudyRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KatsumataLLQ23, author = {Shuichi Katsumata and Yi{-}Fu Lai and Jason T. LeGrow and Ling Qin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {{CSI} -Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {729--761}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_24}, doi = {10.1007/978-3-031-38548-3\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KatsumataLLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimLSS22, author = {Duhyeong Kim and Dongwon Lee and Jinyeong Seo and Yongsoo Song}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Toward Practical Lattice-Based Proof of Knowledge from Hint-MLWE}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {549--580}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_18}, doi = {10.1007/978-3-031-38554-4\_18}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimLSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimLSS23, author = {Miran Kim and Dongwon Lee and Jinyeong Seo and Yongsoo Song}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Accelerating {HE} Operations from Key Decomposition Technique}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {70--92}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_3}, doi = {10.1007/978-3-031-38551-3\_3}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimLSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KleinK23, author = {Ohad Klein and Ilan Komargodski}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {139--170}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_5}, doi = {10.1007/978-3-031-38557-5\_5}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KleinK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KondiOR23, author = {Yashvanth Kondi and Claudio Orlandi and Lawrence Roy}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {646--677}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_21}, doi = {10.1007/978-3-031-38557-5\_21}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KondiOR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KothapalliP23, author = {Abhiram Kothapalli and Bryan Parno}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Algebraic Reductions of Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {669--701}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_21}, doi = {10.1007/978-3-031-38551-3\_21}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KothapalliP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KutylowskiPPYZ23, author = {Miroslaw Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {759--790}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_25}, doi = {10.1007/978-3-031-38545-2\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KutylowskiPPYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LaiM22, author = {Russell W. F. Lai and Giulio Malavolta}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Lattice-Based Timed Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {782--804}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_25}, doi = {10.1007/978-3-031-38554-4\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LaiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LazzarettiP23, author = {Arthur Lazzaretti and Charalampos Papamanthou}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from {DDH}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {284--314}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_10}, doi = {10.1007/978-3-031-38545-2\_10}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LazzarettiP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuGBMI23, author = {Fukang Liu and Lorenzo Grassi and Cl{\'{e}}mence Bouvier and Willi Meier and Takanori Isobe}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Coefficient Grouping for Complex Affine Layers}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {540--572}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_18}, doi = {10.1007/978-3-031-38548-3\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuGBMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuP23, author = {Yanyi Liu and Rafael Pass}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {One-Way Functions and the Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {645--673}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_21}, doi = {10.1007/978-3-031-38545-2\_21}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuPTV23, author = {Tianren Liu and Angelos Pelecanos and Stefano Tessaro and Vinod Vaikuntanathan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Layout Graphs, Random Walks and the t-Wise Independence of {SPN} Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {694--726}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_23}, doi = {10.1007/978-3-031-38548-3\_23}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuPTV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MasureS23, author = {Lo{\"{\i}}c Masure and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {343--376}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_12}, doi = {10.1007/978-3-031-38548-3\_12}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MasureS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MathialaganV23, author = {Surya Mathialagan and Neekon Vafa}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {MacORAMa: Optimal Oblivious {RAM} with Integrity}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {95--127}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_4}, doi = {10.1007/978-3-031-38551-3\_4}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MathialaganV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicciancioS22, author = {Daniele Micciancio and Mark Schultz}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Error Correction and Ciphertext Quantization in Lattice Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {648--681}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_21}, doi = {10.1007/978-3-031-38554-4\_21}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MicciancioS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicheliMPT22, author = {Gabrielle De Micheli and Daniele Micciancio and Alice Pellet{-}Mary and Nam Tran}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Reductions from Module Lattices to Free Module Lattices, and Application to Dequantizing Module-LLL}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {836--865}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_27}, doi = {10.1007/978-3-031-38554-4\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MicheliMPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NewtonR22, author = {Parker Newton and Silas Richelson}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {A Lower Bound for Proving Hardness of Learning with Rounding with Polynomial Modulus}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {805--835}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_26}, doi = {10.1007/978-3-031-38554-4\_26}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NewtonR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PanWZ22, author = {Jiaxin Pan and Benedikt Wagner and Runzhi Zeng}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Lattice-Based Authenticated Key Exchange with Tight Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {616--647}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_20}, doi = {10.1007/978-3-031-38554-4\_20}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PanWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PersianoY23, author = {Giuseppe Persiano and Kevin Yeo}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Limits of Breach-Resistant and Snapshot-Oblivious RAMs}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {161--196}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_6}, doi = {10.1007/978-3-031-38551-3\_6}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PersianoY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RaghuramanRT23, author = {Srinivasan Raghuraman and Peter Rindal and Titouan Tanguy}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Expand-Convolute Codes for Pseudorandom Correlation Generators from {LPN}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {602--632}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_19}, doi = {10.1007/978-3-031-38551-3\_19}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RaghuramanRT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RyanH23, author = {Keegan Ryan and Nadia Heninger}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Fast Practical Lattice Reduction Through Iterated Compression}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {3--36}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_1}, doi = {10.1007/978-3-031-38548-3\_1}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RyanH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Schrottenloher22, author = {Andr{\'{e}} Schrottenloher}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Quantum Linear Key-Recovery Attacks Using the {QFT}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {258--291}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_9}, doi = {10.1007/978-3-031-38554-4\_9}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Schrottenloher22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangLHL23, author = {Shichang Wang and Meicheng Liu and Shiqi Hou and Dongdai Lin}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Moving a Step of ChaCha in Syncopated Rhythm}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {273--304}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_10}, doi = {10.1007/978-3-031-38548-3\_10}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WangLHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangWW23, author = {Tianrui Wang and Anyu Wang and Xiaoyun Wang}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Exploring Decryption Failures of {BIKE:} New Class of Weak Keys and Key Recovery Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {70--100}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_3}, doi = {10.1007/978-3-031-38548-3\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/WangWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WatersW23, author = {Brent Waters and Daniel Wichs}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Universal Amplification of {KDM} Security: From 1-Key Circular to Multi-Key {KDM}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {674--693}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_22}, doi = {10.1007/978-3-031-38545-2\_22}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WatersW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/XiangZDDF23, author = {Binwu Xiang and Jiang Zhang and Yi Deng and Yiran Dai and Dengguo Feng}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Fast Blind Rotation for Bootstrapping FHEs}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {3--36}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_1}, doi = {10.1007/978-3-031-38551-3\_1}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/XiangZDDF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/XiaoD23, author = {Hanshen Xiao and Srinivas Devadas}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {{PAC} Privacy: Automatic Privacy Measurement and Control of Data Processing}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {611--644}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_20}, doi = {10.1007/978-3-031-38545-2\_20}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/XiaoD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yeo23, author = {Kevin Yeo}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {197--230}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_7}, doi = {10.1007/978-3-031-38551-3\_7}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yeo23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YuJW22, author = {Yang Yu and Huiwen Jia and Xiaoyun Wang}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {390--420}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_13}, doi = {10.1007/978-3-031-38554-4\_13}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YuJW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry22c, author = {Mark Zhandry}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Tracing Quantum State Distinguishers via Backtracking}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {3--36}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_1}, doi = {10.1007/978-3-031-38554-4\_1}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry22c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZhangCY22, author = {Kaiyi Zhang and Hongrui Cui and Yu Yu}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Revisiting the Constant-Sum Winternitz One-Time Signature with Applications to SPHINCS\({}^{\mbox{+}}\) and {XMSS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {455--483}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_15}, doi = {10.1007/978-3-031-38554-4\_15}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ZhangCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2023-1, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5}, doi = {10.1007/978-3-031-38557-5}, isbn = {978-3-031-38556-8}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2023-2, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2}, doi = {10.1007/978-3-031-38545-2}, isbn = {978-3-031-38544-5}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2023-3, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3}, doi = {10.1007/978-3-031-38548-3}, isbn = {978-3-031-38547-6}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2023-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2023-4, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3}, doi = {10.1007/978-3-031-38551-3}, isbn = {978-3-031-38550-6}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2023-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2023-5, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4}, doi = {10.1007/978-3-031-38554-4}, isbn = {978-3-031-38553-7}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2023-5.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaEKKR22, author = {Michel Abdalla and Thorsten Eisenhofer and Eike Kiltz and Sabrina Kunzweiler and Doreen Riepel}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Password-Authenticated Key Exchange from Group Actions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {699--728}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_24}, doi = {10.1007/978-3-031-15979-4\_24}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaEKKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbramDOS22, author = {Damiano Abram and Ivan Damg{\aa}rd and Claudio Orlandi and Peter Scholl}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {421--452}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_15}, doi = {10.1007/978-3-031-15985-5\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbramDOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalYY22, author = {Shweta Agrawal and Anshu Yadav and Shota Yamada}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Multi-input Attribute Based Encryption and Predicate Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {590--621}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_21}, doi = {10.1007/978-3-031-15802-5\_21}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AkshimaGL22, author = {Akshima and Siyao Guo and Qipeng Liu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Time-Space Lower Bounds for Finding Collisions in Merkle-Damg{\aa}rd Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {192--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_7}, doi = {10.1007/978-3-031-15982-4\_7}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AkshimaGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlbrechtCLMT22, author = {Martin R. Albrecht and Valerio Cini and Russell W. F. Lai and Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {102--132}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_4}, doi = {10.1007/978-3-031-15979-4\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AlbrechtCLMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenJM22, author = {Jo{\"{e}}l Alwen and Daniel Jost and Marta Mularczyk}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {On the Insider Security of {MLS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {34--68}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_2}, doi = {10.1007/978-3-031-15979-4\_2}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AlwenJM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthKLLZ22, author = {Prabhanjan Ananth and Fatih Kaleoglu and Xingjian Li and Qipeng Liu and Mark Zhandry}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {On the Feasibility of Unclonable Encryption, and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {212--241}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_8}, doi = {10.1007/978-3-031-15979-4\_8}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthKLLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthQY22, author = {Prabhanjan Ananth and Luowen Qian and Henry Yuen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Cryptography from Pseudorandom Quantum States}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {208--236}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_8}, doi = {10.1007/978-3-031-15802-5\_8}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AnanthQY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumIKP22, author = {Benny Applebaum and Yuval Ishai and Or Karni and Arpita Patra}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {453--482}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_16}, doi = {10.1007/978-3-031-15985-5\_16}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumIKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumKP22, author = {Benny Applebaum and Eliran Kachlon and Arpita Patra}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {33--56}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_2}, doi = {10.1007/978-3-031-15985-5\_2}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AttemaF22, author = {Thomas Attema and Serge Fehr}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Parallel Repetition of (k\({}_{\mbox{1, {\dj}ots}}\) , k\({}_{\mbox{{\(\mu\)} }}\))-Special-Sound Multi-round Interactive Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {415--443}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_15}, doi = {10.1007/978-3-031-15802-5\_15}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AttemaF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AustrinCCFLM22, author = {Per Austrin and Hao Chung and Kai{-}Min Chung and Shiuan Fu and Yao{-}Ting Lin and Mohammad Mahmoody}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {On the Impossibility of Key Agreements from Quantum Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {165--194}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_6}, doi = {10.1007/978-3-031-15979-4\_6}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AustrinCCFLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaenaBCPSV22, author = {John Baena and Pierre Briaud and Daniel Cabarcas and Ray A. Perlner and Daniel Smith{-}Tone and Javier A. Verbel}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Improving Support-Minors Rank Attacks: Applications to G{\dj}isplaystyle eMSS and Rainbow}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {376--405}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_13}, doi = {10.1007/978-3-031-15982-4\_13}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaenaBCPSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BallDL22, author = {Marshall Ball and Dana Dachman{-}Soled and Julian Loss}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {(Nondeterministic) Hardness vs. Non-malleability}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {148--177}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_6}, doi = {10.1007/978-3-031-15802-5\_6}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BallDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaoGST22, author = {Zhenzhen Bao and Jian Guo and Danping Shi and Yi Tu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {64--93}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_3}, doi = {10.1007/978-3-031-15802-5\_3}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BaoGST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekKLMMVVY22, author = {James Bartusek and Yael Tauman Kalai and Alex Lombardi and Fermi Ma and Giulio Malavolta and Vinod Vaikuntanathan and Thomas Vidick and Lisa Yang}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Succinct Classical Verification of Quantum Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {195--211}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_7}, doi = {10.1007/978-3-031-15979-4\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BartusekKLMMVVY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaumBMS22, author = {Carsten Baum and Lennart Braun and Alexander Munch{-}Hansen and Peter Scholl}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Moz{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2k\}{\textdollar}arella: Efficient Vector-OLE and Zero-Knowledge Proofs over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2k\}{\textdollar}}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {329--358}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_12}, doi = {10.1007/978-3-031-15985-5\_12}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BaumBMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleBFL22, author = {Christof Beierle and Tim Beyne and Patrick Felke and Gregor Leander}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {748--778}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_25}, doi = {10.1007/978-3-031-15982-4\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeierleBFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareCKMTZ22, author = {Mihir Bellare and Elizabeth C. Crites and Chelsea Komlo and Mary Maller and Stefano Tessaro and Chenzhi Zhu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Better than Advertised Security for Non-interactive Threshold Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {517--550}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_18}, doi = {10.1007/978-3-031-15985-5\_18}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BellareCKMTZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Beullens22, author = {Ward Beullens}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Breaking Rainbow Takes a Weekend on a Laptop}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {464--479}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_16}, doi = {10.1007/978-3-031-15979-4\_16}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Beullens22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeyneC22, author = {Tim Beyne and Yu Long Chen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Provably Secure Reflection Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {234--263}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_9}, doi = {10.1007/978-3-031-15985-5\_9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BeyneC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeyneR22, author = {Tim Beyne and Vincent Rijmen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Differential Cryptanalysis in the Fixed-Key Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {687--716}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_23}, doi = {10.1007/978-3-031-15982-4\_23}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BeyneR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BienstockFGMR22, author = {Alexander Bienstock and Jaiden Fairoze and Sanjam Garg and Pratyay Mukherjee and Srinivasan Raghuraman}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {A More Complete Analysis of the Signal Double Ratchet Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {784--813}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_27}, doi = {10.1007/978-3-031-15802-5\_27}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BienstockFGMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyBK22, author = {Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Constructive Post-Quantum Reductions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {654--683}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_22}, doi = {10.1007/978-3-031-15982-4\_22}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyF22, author = {Nir Bitansky and Sapir Freizeit}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Statistically Sender-Private {OT} from {LPN} and Derandomization}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {625--653}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_21}, doi = {10.1007/978-3-031-15982-4\_21}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlockiH22, author = {Jeremiah Blocki and Blake Holman}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Sustained Space and Cumulative Complexity Trade-Offs for Data-Dependent Memory-Hard Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {222--251}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_8}, doi = {10.1007/978-3-031-15982-4\_8}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BlockiH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BombarCD22, author = {Maxime Bombar and Alain Couvreur and Thomas Debris{-}Alazard}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {On Codes and Learning with Errors over Function Fields}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {513--540}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_18}, doi = {10.1007/978-3-031-15979-4\_18}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BombarCD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehK22, author = {Dan Boneh and Chelsea Komlo}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Threshold Signatures with Private Accountability}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {551--581}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_19}, doi = {10.1007/978-3-031-15985-5\_19}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoschiniTT22, author = {Cecilia Boschini and Akira Takahashi and Mehdi Tibouchi}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {276--305}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_10}, doi = {10.1007/978-3-031-15979-4\_10}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BoschiniTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoudgoustGP22, author = {Katharina Boudgoust and Erell Gachon and Alice Pellet{-}Mary}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {480--509}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_17}, doi = {10.1007/978-3-031-15979-4\_17}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoudgoustGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCGIKRS22, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Nicolas Resch and Peter Scholl}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Correlated Pseudorandomness from Expand-Accumulate Codes}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {603--633}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_21}, doi = {10.1007/978-3-031-15979-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCGIKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleGIK22, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Victor I. Kolobov}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Programmable Distributed Point Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {121--151}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_5}, doi = {10.1007/978-3-031-15985-5\_5}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleGIK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanaleLS22, author = {Federico Canale and Gregor Leander and Lukas Stennes}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {779--808}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_26}, doi = {10.1007/978-3-031-15982-4\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanaleLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiJSV22, author = {Ran Canetti and Palak Jain and Marika Swanberg and Mayank Varia}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Universally Composable End-to-End Secure Messaging}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {3--33}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_1}, doi = {10.1007/978-3-031-15979-4\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiJSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CaoX22, author = {Shujiao Cao and Rui Xue}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {564--595}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_19}, doi = {10.1007/978-3-031-15982-4\_19}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CaoX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chairattana-Apirom22, author = {Rutchathon Chairattana{-}Apirom and Lucjan Hanzlik and Julian Loss and Anna Lysyanskaya and Benedikt Wagner}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {3--31}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_1}, doi = {10.1007/978-3-031-15982-4\_1}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Chairattana-Apirom22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChandranKOS22, author = {Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Short Leakage Resilient and Non-malleable Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {178--207}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_7}, doi = {10.1007/978-3-031-15802-5\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChandranKOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChiaCLY22, author = {Nai{-}Hui Chia and Kai{-}Min Chung and Xiao Liang and Takashi Yamakawa}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Post-quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {533--563}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_18}, doi = {10.1007/978-3-031-15982-4\_18}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChiaCLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenN22, author = {Shahar P. Cohen and Moni Naor}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {252--281}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_9}, doi = {10.1007/978-3-031-15982-4\_9}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CohenN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CremersNPR22, author = {Cas Cremers and Moni Naor and Shahar Paz and Eyal Ronen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {{CHIP} and {CRISP:} Protecting All Parties Against Compromise Through Identity-Binding PAKEs}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {668--698}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_23}, doi = {10.1007/978-3-031-15979-4\_23}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CremersNPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DegabrieleK22, author = {Jean Paul Degabriele and Vukasin Karadzic}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {264--295}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_10}, doi = {10.1007/978-3-031-15985-5\_10}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DegabrieleK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DittmerILO22, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Authenticated Garbling from Simple Correlations}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {57--87}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_3}, doi = {10.1007/978-3-031-15985-5\_3}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DittmerILO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DonFMS22, author = {Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Efficient NIZKs and Signatures from Commit-and-Open Protocols in the {QROM}}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {729--757}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_25}, doi = {10.1007/978-3-031-15979-4\_25}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DonFMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DongGLP22, author = {Xiaoyang Dong and Jian Guo and Shun Li and Phuong Pham}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Triangulating Rebound Attack on AES-like Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {94--124}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_4}, doi = {10.1007/978-3-031-15802-5\_4}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DongGLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DuGG22, author = {Yang Du and Daniel Genkin and Paul Grubbs}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {152--181}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_6}, doi = {10.1007/978-3-031-15985-5\_6}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DuGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EscuderoXY22, author = {Daniel Escudero and Chaoping Xing and Chen Yuan}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {More Efficient Dishonest Majority Secure Computation over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2k\}{\textdollar} via Galois Rings}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {383--412}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_14}, doi = {10.1007/978-3-031-15802-5\_14}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EscuderoXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EspitauTWY22, author = {Thomas Espitau and Mehdi Tibouchi and Alexandre Wallet and Yang Yu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Shorter Hash-and-Sign Lattice-Based Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {245--275}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_9}, doi = {10.1007/978-3-031-15979-4\_9}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/EspitauTWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EsserMVW22, author = {Andre Esser and Alexander May and Javier A. Verbel and Weiqiang Wen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Partial Key Exposure Attacks on BIKE, Rainbow and {NTRU}}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {346--375}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_12}, doi = {10.1007/978-3-031-15982-4\_12}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EsserMVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FeneuilJR22, author = {Thibauld Feneuil and Antoine Joux and Matthieu Rivain}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {541--572}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_19}, doi = {10.1007/978-3-031-15979-4\_19}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FeneuilJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FernandoGKS22, author = {Rex Fernando and Yuval Gelles and Ilan Komargodski and Elaine Shi}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Maliciously Secure Massively Parallel Computation for All-but-One Corruptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {688--718}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_24}, doi = {10.1007/978-3-031-15802-5\_24}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FernandoGKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FitziKPR22, author = {Matthias Fitzi and Aggelos Kiayias and Giorgos Panagiotakos and Alexander Russell}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work - {A} Provably Secure Blockchain Protocol}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {339--369}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_12}, doi = {10.1007/978-3-031-15979-4\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FitziKPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FreitagGK22, author = {Cody Freitag and Ashrujit Ghoshal and Ilan Komargodski}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {131--160}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_5}, doi = {10.1007/978-3-031-15982-4\_5}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FreitagGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarimellaRS22, author = {Gayathri Garimella and Mike Rosulek and Jaspal Singh}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {323--352}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_12}, doi = {10.1007/978-3-031-15802-5\_12}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarimellaRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GhoshalK22, author = {Ashrujit Ghoshal and Ilan Komargodski}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damg{\aa}rd Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {161--191}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_6}, doi = {10.1007/978-3-031-15982-4\_6}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GhoshalK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalIS22, author = {Vipul Goyal and Yuval Ishai and Yifan Song}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Tight Bounds on the Randomness Complexity of Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {483--513}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_17}, doi = {10.1007/978-3-031-15985-5\_17}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalIS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalPS22, author = {Vipul Goyal and Antigoni Polychroniadou and Yifan Song}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Sharing Transformation and Dishonest Majority {MPC} with Packed Secret Sharing}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {3--32}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_1}, doi = {10.1007/978-3-031-15985-5\_1}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalV22, author = {Rishab Goyal and Vinod Vaikuntanathan}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Locally Verifiable Signature and Key Aggregation}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {761--791}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_26}, doi = {10.1007/978-3-031-15979-4\_26}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gunsing22, author = {Aldo Gunsing}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Block-Cipher-Based Tree Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {205--233}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_8}, doi = {10.1007/978-3-031-15985-5\_8}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Gunsing22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaitnerNY22, author = {Iftach Haitner and Daniel Nukrai and Eylon Yogev}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Lower Bound on SNARGs in the Random Oracle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {97--127}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_4}, doi = {10.1007/978-3-031-15982-4\_4}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/HaitnerNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirokaMNY22, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Certified Everlasting Zero-Knowledge Proof for {QMA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {239--268}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_9}, doi = {10.1007/978-3-031-15802-5\_9}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirokaMNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoffmannHKKP22, author = {Charlotte Hoffmann and Pavel Hub{\'{a}}cek and Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Practical Statistically-Sound Proofs of Exponentiation in Any Group}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {370--399}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_13}, doi = {10.1007/978-3-031-15979-4\_13}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/HoffmannHKKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HolmgrenLTW22, author = {Justin Holmgren and Minghao Liu and LaKyah Tyner and Daniel Wichs}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Nearly Optimal Property Preserving Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {473--502}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_16}, doi = {10.1007/978-3-031-15982-4\_16}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HolmgrenLTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HolmgrenR22, author = {Justin Holmgren and Ron D. Rothblum}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Faster Sounder Succinct Arguments and sfIOPs}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {474--503}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_17}, doi = {10.1007/978-3-031-15802-5\_17}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HolmgrenR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HulsingMS22, author = {Andreas H{\"{u}}lsing and Matthias Meijers and Pierre{-}Yves Strub}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {622--653}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_22}, doi = {10.1007/978-3-031-15802-5\_22}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/HulsingMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKLS22, author = {Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Beyond the Csisz{\'{a}}r-Korner Bound: Best-Possible Wiretap Coding via Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {573--602}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_20}, doi = {10.1007/978-3-031-15979-4\_20}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimLP22, author = {Allen Kim and Xiao Liang and Omkant Pandey}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {A New Approach to Efficient Non-Malleable Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {389--418}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_14}, doi = {10.1007/978-3-031-15985-5\_14}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KimLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kiyoshima22, author = {Susumu Kiyoshima}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {444--473}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_16}, doi = {10.1007/978-3-031-15802-5\_16}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kiyoshima22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KomargodskiMSW22, author = {Ilan Komargodski and Shin'ichiro Matsuo and Elaine Shi and Ke Wu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {log \({}^{\mbox{*}}\)-Round Game-Theoretically-Fair Leader Election}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {409--438}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_14}, doi = {10.1007/978-3-031-15982-4\_14}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KomargodskiMSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KothapalliST22, author = {Abhiram Kothapalli and Srinath T. V. Setty and Ioanna Tzialla}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Nova: Recursive Zero-Knowledge Arguments from Folding Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {359--388}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_13}, doi = {10.1007/978-3-031-15985-5\_13}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KothapalliST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LefevreM22, author = {Charlotte Lefevre and Bart Mennink}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Tight Preimage Resistance of the Sponge Construction}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {185--204}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_7}, doi = {10.1007/978-3-031-15985-5\_7}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LefevreM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiMSS22, author = {Baiyu Li and Daniele Micciancio and Mark Schultz and Jessica Sorrell}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Securing Approximate Homomorphic Encryption Using Differential Privacy}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {560--589}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_20}, doi = {10.1007/978-3-031-15802-5\_20}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LiMSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinL22, author = {Huijia Lin and Tianren Liu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Two-Round {MPC} Without Round Collapsing Revisited - Towards Efficient Malicious Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {353--382}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_13}, doi = {10.1007/978-3-031-15802-5\_13}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuT22, author = {Zeyu Liu and Eran Tromer}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Oblivious Message Retrieval}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {753--783}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_26}, doi = {10.1007/978-3-031-15802-5\_26}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LyubashevskyNP22, author = {Vadim Lyubashevsky and Ngoc Khanh Nguyen and Maxime Plan{\c{c}}on}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {71--101}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_3}, doi = {10.1007/978-3-031-15979-4\_3}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LyubashevskyNP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MattNT22, author = {Christian Matt and Jesper Buus Nielsen and S{\o}ren Eller Thomsen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {400--430}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_14}, doi = {10.1007/978-3-031-15979-4\_14}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MattNT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MinaudR22, author = {Brice Minaud and Michael Reichle}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Dynamic Local Searchable Symmetric Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {91--120}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_4}, doi = {10.1007/978-3-031-15985-5\_4}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MinaudR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MorimaeY22, author = {Tomoyuki Morimae and Takashi Yamakawa}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Quantum Commitments and Signatures Without One-Way Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {269--295}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_10}, doi = {10.1007/978-3-031-15802-5\_10}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MorimaeY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaitoSS22, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Secret Can Be Public: Low-Memory {AEAD} Mode for High-Order Masking}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {315--345}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_11}, doi = {10.1007/978-3-031-15982-4\_11}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/NaitoSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NassarR22, author = {Shafik Nassar and Ron D. Rothblum}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Succinct Interactive Oracle Proofs: Applications and Limitations}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {504--532}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_18}, doi = {10.1007/978-3-031-15802-5\_18}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/NassarR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NguyenGSY22, author = {Khoa Nguyen and Fuchun Guo and Willy Susilo and Guomin Yang}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Multimodal Private Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {792--822}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_27}, doi = {10.1007/978-3-031-15979-4\_27}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/NguyenGSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NguyenS22, author = {Ngoc Khanh Nguyen and Gregor Seiler}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Practical Sublinear Proofs for {R1CS} from Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {133--162}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_5}, doi = {10.1007/978-3-031-15979-4\_5}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NguyenS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NielsenRO22, author = {Jesper Buus Nielsen and Jo{\~{a}}o Ribeiro and Maciej Obremski}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {127--147}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_5}, doi = {10.1007/978-3-031-15802-5\_5}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/NielsenRO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NiuSLL22, author = {Zhongfeng Niu and Siwei Sun and Yunwen Liu and Chao Li}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Rotational Differential-Linear Distinguishers of {ARX} Ciphers with Arbitrary Output Linear Masks}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {3--32}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_1}, doi = {10.1007/978-3-031-15802-5\_1}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NiuSLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PinoK22, author = {Rafa{\"{e}}l del Pino and Shuichi Katsumata}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {306--336}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_11}, doi = {10.1007/978-3-031-15979-4\_11}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PinoK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RachuriS22, author = {Rahul Rachuri and Peter Scholl}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Le Mans: Dynamic and Fluid {MPC} for Dishonest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {719--749}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_25}, doi = {10.1007/978-3-031-15802-5\_25}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/RachuriS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RaneaVP22, author = {Adri{\'{a}}n Ranea and Joachim Vandersmissen and Bart Preneel}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Implicit White-Box Implementations: White-Boxing {ARX} Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {33--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_2}, doi = {10.1007/978-3-031-15802-5\_2}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/RaneaVP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RothblumV22, author = {Ron D. Rothblum and Prashant Nalini Vasudevan}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Collision-Resistance from Multi-Collision-Resistance}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {503--529}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_17}, doi = {10.1007/978-3-031-15982-4\_17}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/RothblumV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Roy22, author = {Lawrence Roy}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {SoftSpokenOT: Quieter {OT} Extension from Small-Field Silent {VOLE} in the Minicrypt Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {657--687}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_23}, doi = {10.1007/978-3-031-15802-5\_23}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Roy22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantosCS22, author = {Maria Corte{-}Real Santos and Craig Costello and Jia Shi}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Accelerating the Delfs-Galbraith Algorithm with Fast Subfield Root Detection}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {285--314}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_10}, doi = {10.1007/978-3-031-15982-4\_10}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/SantosCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SchrottenloherS22, author = {Andr{\'{e}} Schrottenloher and Marc Stevens}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Simplified {MITM} Modeling for Permutations: New (Quantum) Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {717--747}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_24}, doi = {10.1007/978-3-031-15982-4\_24}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/SchrottenloherS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Shmueli22, author = {Omri Shmueli}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Semi-quantum Tokenized Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {296--319}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_11}, doi = {10.1007/978-3-031-15802-5\_11}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Shmueli22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Tsabary22, author = {Rotem Tsabary}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Candidate Witness Encryption from Lattice Techniques}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {535--559}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_19}, doi = {10.1007/978-3-031-15802-5\_19}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Tsabary22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TsimosLP22, author = {Georgios Tsimos and Julian Loss and Charalampos Papamanthou}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Gossiping for Communication-Efficient Broadcast}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {439--469}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_15}, doi = {10.1007/978-3-031-15982-4\_15}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/TsimosLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WatersW22, author = {Brent Waters and David J. Wu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {433--463}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_15}, doi = {10.1007/978-3-031-15979-4\_15}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WatersW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/XieZS22, author = {Tiancheng Xie and Yupeng Zhang and Dawn Song}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Orion: Zero Knowledge Proof with Linear Prover Time}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {299--328}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_11}, doi = {10.1007/978-3-031-15985-5\_11}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/XieZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YangYAS22, author = {Rupeng Yang and Zuoxia Yu and Man Ho Au and Willy Susilo}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Public-Key Watermarking Schemes for Pseudorandom Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {637--667}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_22}, doi = {10.1007/978-3-031-15979-4\_22}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/YangYAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry22, author = {Mark Zhandry}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Augmented Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {35--65}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_2}, doi = {10.1007/978-3-031-15982-4\_2}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry22a, author = {Mark Zhandry}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {To Label, or Not To Label (in Generic Groups)}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {66--96}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_3}, doi = {10.1007/978-3-031-15982-4\_3}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry22b, author = {Mark Zhandry}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {New Constructions of Collapsing Hashes}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {596--624}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_20}, doi = {10.1007/978-3-031-15982-4\_20}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2022-1, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5}, doi = {10.1007/978-3-031-15802-5}, isbn = {978-3-031-15801-8}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2022-2, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4}, doi = {10.1007/978-3-031-15979-4}, isbn = {978-3-031-15978-7}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2022-3, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4}, doi = {10.1007/978-3-031-15982-4}, isbn = {978-3-031-15981-7}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2022-4, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5}, doi = {10.1007/978-3-031-15985-5}, isbn = {978-3-031-15984-8}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2022-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AaronsonLLZZ21, author = {Scott Aaronson and Jiahui Liu and Qipeng Liu and Mark Zhandry and Ruizhe Zhang}, editor = {Tal Malkin and Chris Peikert}, title = {New Approaches for Quantum Copy-Protection}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {526--555}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_19}, doi = {10.1007/978-3-030-84242-0\_19}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AaronsonLLZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGM21, author = {Shweta Agrawal and Shafi Goldwasser and Saleet Mossel}, editor = {Tal Malkin and Chris Peikert}, title = {Deniable Fully Homomorphic Encryption from Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {641--670}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_22}, doi = {10.1007/978-3-030-84245-1\_22}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGT21, author = {Shweta Agrawal and Rishab Goyal and Junichi Tomida}, editor = {Tal Malkin and Chris Peikert}, title = {Multi-input Quadratic Functional Encryption from Pairings}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {208--238}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_8}, doi = {10.1007/978-3-030-84259-8\_8}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalIKNPPR21, author = {Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran and Alon Rosen}, editor = {Tal Malkin and Chris Peikert}, title = {Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {124--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_5}, doi = {10.1007/978-3-030-84245-1\_5}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalIKNPPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalMVY21, author = {Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada}, editor = {Tal Malkin and Chris Peikert}, title = {Functional Encryption for Turing Machines with Dynamic Bounded Collusion from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {239--269}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_9}, doi = {10.1007/978-3-030-84259-8\_9}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalMVY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlagicBDS21, author = {Gorjan Alagic and Zvika Brakerski and Yfke Dulek and Christian Schaffner}, editor = {Tal Malkin and Chris Peikert}, title = {Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {497--525}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_18}, doi = {10.1007/978-3-030-84242-0\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlagicBDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlbrechtBLR21, author = {Martin R. Albrecht and Shi Bai and Jianwei Li and Joe Rowell}, editor = {Tal Malkin and Chris Peikert}, title = {Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {732--759}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_25}, doi = {10.1007/978-3-030-84245-1\_25}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlbrechtBLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlbrechtL21, author = {Martin R. Albrecht and Russell W. F. Lai}, editor = {Tal Malkin and Chris Peikert}, title = {Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {519--548}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_18}, doi = {10.1007/978-3-030-84245-1\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlbrechtL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlonCCHLS21, author = {Bar Alon and Hao Chung and Kai{-}Min Chung and Mi{-}Ying Huang and Yi Lee and Yu{-}Ching Shen}, editor = {Tal Malkin and Chris Peikert}, title = {Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {436--466}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_16}, doi = {10.1007/978-3-030-84242-0\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AlonCCHLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlperB21, author = {Handan Kilin{\c{c}} Alper and Jeffrey Burdges}, editor = {Tal Malkin and Chris Peikert}, title = {Two-Round Trip Schnorr Multi-signatures via Delinearized Witnesses}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {157--188}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_7}, doi = {10.1007/978-3-030-84242-0\_7}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlperB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthCP21, author = {Prabhanjan Ananth and Kai{-}Min Chung and Rolando L. La Placa}, editor = {Tal Malkin and Chris Peikert}, title = {On the Concurrent Composition of Quantum Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {346--374}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_13}, doi = {10.1007/978-3-030-84242-0\_13}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumN21, author = {Benny Applebaum and Oded Nir}, editor = {Tal Malkin and Chris Peikert}, title = {Upslices, Downslices, and Secret-Sharing with Complexity of 1.5\({}^{\mbox{n}}\)}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {627--655}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_21}, doi = {10.1007/978-3-030-84252-9\_21}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AsharovKLS21, author = {Gilad Asharov and Ilan Komargodski and Wei{-}Kai Lin and Elaine Shi}, editor = {Tal Malkin and Chris Peikert}, title = {Oblivious {RAM} with Worst-Case Logarithmic Overhead}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {610--640}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_21}, doi = {10.1007/978-3-030-84259-8\_21}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AsharovKLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AttemaCF21, author = {Thomas Attema and Ronald Cramer and Serge Fehr}, editor = {Tal Malkin and Chris Peikert}, title = {Compressing Proofs of k-Out-Of-n Partial Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {65--91}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_3}, doi = {10.1007/978-3-030-84259-8\_3}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AttemaCF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AttemaCK21, author = {Thomas Attema and Ronald Cramer and Lisa Kohl}, editor = {Tal Malkin and Chris Peikert}, title = {A Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocol Theory for Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {549--579}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_19}, doi = {10.1007/978-3-030-84245-1\_19}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AttemaCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BadertscherLZ21, author = {Christian Badertscher and Yun Lu and Vassilis Zikas}, editor = {Tal Malkin and Chris Peikert}, title = {A Rational Protocol Treatment of 51{\%} Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {3--32}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_1}, doi = {10.1007/978-3-030-84252-9\_1}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BadertscherLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarbosaBCW21, author = {Manuel Barbosa and Alexandra Boldyreva and Shan Chen and Bogdan Warinschi}, editor = {Tal Malkin and Chris Peikert}, title = {Provable Security Analysis of {FIDO2}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {125--156}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_5}, doi = {10.1007/978-3-030-84252-9\_5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BarbosaBCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekCKM21, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, editor = {Tal Malkin and Chris Peikert}, title = {On the Round Complexity of Secure Quantum Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {406--435}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_15}, doi = {10.1007/978-3-030-84242-0\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BartusekCKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekCKM21a, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, editor = {Tal Malkin and Chris Peikert}, title = {One-Way Functions Imply Secure Computation in a Quantum World}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {467--496}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_17}, doi = {10.1007/978-3-030-84242-0\_17}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BartusekCKM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaumMRS21, author = {Carsten Baum and Alex J. Malozemoff and Marc B. Rosen and Peter Scholl}, editor = {Tal Malkin and Chris Peikert}, title = {Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {92--122}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_4}, doi = {10.1007/978-3-030-84259-8\_4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaumMRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelOP21, author = {Amos Beimel and Hussien Othman and Naty Peter}, editor = {Tal Malkin and Chris Peikert}, title = {Quadratic Secret Sharing and Conditional Disclosure of Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {748--778}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_25}, doi = {10.1007/978-3-030-84252-9\_25}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeimelOP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Beyne21, author = {Tim Beyne}, editor = {Tal Malkin and Chris Peikert}, title = {Linear Cryptanalysis of {FF3-1} and {FEA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {41--69}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_3}, doi = {10.1007/978-3-030-84242-0\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Beyne21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlockHRRS21, author = {Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni}, editor = {Tal Malkin and Chris Peikert}, title = {Time- and Space-Efficient Arguments from Groups of Unknown Order}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {123--152}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_5}, doi = {10.1007/978-3-030-84259-8\_5}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BlockHRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehDFG21, author = {Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon}, editor = {Tal Malkin and Chris Peikert}, title = {Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {649--680}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_23}, doi = {10.1007/978-3-030-84242-0\_23}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehDFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BootleCS21, author = {Jonathan Bootle and Alessandro Chiesa and Katerina Sotiraki}, editor = {Tal Malkin and Chris Peikert}, title = {Sumcheck Arguments and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {742--773}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_26}, doi = {10.1007/978-3-030-84242-0\_26}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BootleCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BordesDKA21, author = {Nicolas Bordes and Joan Daemen and Dani{\"{e}}l Kuijsters and Gilles Van Assche}, editor = {Tal Malkin and Chris Peikert}, title = {Thinking Outside the Superbox}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {337--367}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_12}, doi = {10.1007/978-3-030-84252-9\_12}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BordesDKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BossuatBFMR21, author = {Ang{\`{e}}le Bossuat and Raphael Bost and Pierre{-}Alain Fouque and Brice Minaud and Michael Reichle}, editor = {Tal Malkin and Chris Peikert}, title = {{SSE} and {SSD:} Page-Efficient Searchable Symmetric Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {157--184}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_6}, doi = {10.1007/978-3-030-84252-9\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BossuatBFMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCGIKS21, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, editor = {Tal Malkin and Chris Peikert}, title = {Low-Complexity Weak Pseudorandom Functions in {\textdollar}{\textbackslash}mathtt \{AC\}0[{\textbackslash}mathtt \{MOD\}2]{\textdollar}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {487--516}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_17}, doi = {10.1007/978-3-030-84259-8\_17}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCGIKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleGIN21, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, editor = {Tal Malkin and Chris Peikert}, title = {Sublinear GMW-Style Compiler for {MPC} with Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {457--485}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_16}, doi = {10.1007/978-3-030-84245-1\_16}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleGIN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BunzCLMS21, author = {Benedikt B{\"{u}}nz and Alessandro Chiesa and William Lin and Pratyush Mishra and Nicholas Spooner}, editor = {Tal Malkin and Chris Peikert}, title = {Proof-Carrying Data Without Succinct Arguments}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {681--710}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_24}, doi = {10.1007/978-3-030-84242-0\_24}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BunzCLMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CassiersFOS21, author = {Ga{\"{e}}tan Cassiers and Sebastian Faust and Maximilian Orlt and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tal Malkin and Chris Peikert}, title = {Towards Tight Random Probing Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {185--214}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_7}, doi = {10.1007/978-3-030-84252-9\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CassiersFOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChandranKOS21, author = {Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, editor = {Tal Malkin and Chris Peikert}, title = {Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {595--624}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_20}, doi = {10.1007/978-3-030-84252-9\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChandranKOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChatterjeeGHKLM21, author = {Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian}, editor = {Tal Malkin and Chris Peikert}, title = {Compact Ring Signatures from Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {282--312}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_11}, doi = {10.1007/978-3-030-84242-0\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChatterjeeGHKLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenLMQ21, author = {Yilei Chen and Alex Lombardi and Fermi Ma and Willy Quach}, editor = {Tal Malkin and Chris Peikert}, title = {Does Fiat-Shamir Require a Cryptographic Hash Function?}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {334--363}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_12}, doi = {10.1007/978-3-030-84259-8\_12}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenLMQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CheonKL21, author = {Jung Hee Cheon and Dongwoo Kim and Keewoo Lee}, editor = {Tal Malkin and Chris Peikert}, title = {MHz2k: {MPC} from {HE} over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2k\}{\textdollar} with New Packing, Simpler Reshare, and Better {ZKP}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {426--456}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_15}, doi = {10.1007/978-3-030-84245-1\_15}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CheonKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChiaCY21, author = {Nai{-}Hui Chia and Kai{-}Min Chung and Takashi Yamakawa}, editor = {Tal Malkin and Chris Peikert}, title = {A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {315--345}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_12}, doi = {10.1007/978-3-030-84242-0\_12}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChiaCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChiesaY21, author = {Alessandro Chiesa and Eylon Yogev}, editor = {Tal Malkin and Chris Peikert}, title = {Subquadratic SNARGs in the Random Oracle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {711--741}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_25}, doi = {10.1007/978-3-030-84242-0\_25}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChiesaY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoudhuriGGJK21, author = {Arka Rai Choudhuri and Aarushi Goel and Matthew Green and Abhishek Jain and Gabriel Kaptchuk}, editor = {Tal Malkin and Chris Peikert}, title = {Fluid {MPC:} Secure Multiparty Computation with Dynamic Participants}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {94--123}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_4}, doi = {10.1007/978-3-030-84245-1\_4}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoudhuriGGJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoudhuriJJ21, author = {Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin}, editor = {Tal Malkin and Chris Peikert}, title = {Non-interactive Batch Arguments for {NP} from Standard Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {394--423}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_14}, doi = {10.1007/978-3-030-84259-8\_14}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoudhuriJJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChungCWS21, author = {Kai{-}Min Chung and T.{-}H. Hubert Chan and Ting Wen and Elaine Shi}, editor = {Tal Malkin and Chris Peikert}, title = {Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {3--32}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_1}, doi = {10.1007/978-3-030-84245-1\_1}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChungCWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ColadangeloLLZ21, author = {Andrea Coladangelo and Jiahui Liu and Qipeng Liu and Mark Zhandry}, editor = {Tal Malkin and Chris Peikert}, title = {Hidden Cosets and Applications to Unclonable Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {556--584}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_20}, doi = {10.1007/978-3-030-84242-0\_20}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ColadangeloLLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronS21, author = {Jean{-}S{\'{e}}bastien Coron and Lorenzo Spignoli}, editor = {Tal Malkin and Chris Peikert}, title = {Secure Wire Shuffling in the Probing Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {215--244}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_8}, doi = {10.1007/978-3-030-84252-9\_8}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CouteauRR21, author = {Geoffroy Couteau and Peter Rindal and Srinivasan Raghuraman}, editor = {Tal Malkin and Chris Peikert}, title = {Silver: Silent {VOLE} and Oblivious Transfer from Hardness of Decoding Structured {LDPC} Codes}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {502--534}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_17}, doi = {10.1007/978-3-030-84252-9\_17}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CouteauRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerRX21, author = {Ronald Cramer and Matthieu Rambaud and Chaoping Xing}, editor = {Tal Malkin and Chris Peikert}, title = {Asymptotically-Good Arithmetic Secret Sharing over {\textdollar}{\textbackslash}mathbb \{Z\}/p\{{\textbackslash}ell \}{\textbackslash}mathbb \{Z\}{\textdollar} with Strong Multiplication and Its Applications to Efficient {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {656--686}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_22}, doi = {10.1007/978-3-030-84252-9\_22}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerRX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledKP21, author = {Dana Dachman{-}Soled and Ilan Komargodski and Rafael Pass}, editor = {Tal Malkin and Chris Peikert}, title = {Non-malleable Codes for Bounded Parallel-Time Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {535--565}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_18}, doi = {10.1007/978-3-030-84252-9\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardMRSY21, author = {Ivan Damg{\aa}rd and Bernardo Magri and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov}, editor = {Tal Malkin and Chris Peikert}, title = {Broadcast-Optimal Two Round {MPC} with an Honest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {155--184}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_6}, doi = {10.1007/978-3-030-84245-1\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardMRSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurGHIKSZ21, author = {Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha}, editor = {Tal Malkin and Chris Peikert}, title = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {517--547}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_18}, doi = {10.1007/978-3-030-84259-8\_18}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurGHIKSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisGSX21, author = {Yevgeniy Dodis and Siyao Guo and Noah Stephens{-}Davidowitz and Zhiye Xie}, editor = {Tal Malkin and Chris Peikert}, title = {No Time to Hash: On Super-Efficient Entropy Accumulation}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {548--576}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_19}, doi = {10.1007/978-3-030-84259-8\_19}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisGSX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DongHSLWH21, author = {Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu}, editor = {Tal Malkin and Chris Peikert}, title = {Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {278--308}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_10}, doi = {10.1007/978-3-030-84252-9\_10}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DongHSLWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EriguchiOYN21, author = {Reo Eriguchi and Kazuma Ohara and Shota Yamada and Koji Nuida}, editor = {Tal Malkin and Chris Peikert}, title = {Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {305--334}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_11}, doi = {10.1007/978-3-030-84245-1\_11}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EriguchiOYN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EscuderoS21, author = {Daniel Escudero and Eduardo Soria{-}Vazquez}, editor = {Tal Malkin and Chris Peikert}, title = {Efficient Information-Theoretic Multi-party Computation over Non-commutative Rings}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {335--364}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_12}, doi = {10.1007/978-3-030-84245-1\_12}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EscuderoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FengT21, author = {Hanwen Feng and Qiang Tang}, editor = {Tal Malkin and Chris Peikert}, title = {Witness Authenticating NIZKs and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {3--33}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_1}, doi = {10.1007/978-3-030-84259-8\_1}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FengT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarillotKMN21, author = {Fran{\c{c}}ois Garillot and Yashvanth Kondi and Payman Mohassel and Valeria Nikolaenko}, editor = {Tal Malkin and Chris Peikert}, title = {Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {127--156}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_6}, doi = {10.1007/978-3-030-84242-0\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GarillotKMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarimellaPRTY21, author = {Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Tal Malkin and Chris Peikert}, title = {Oblivious Key-Value Stores and Amplification for Private Set Intersection}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {395--425}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_14}, doi = {10.1007/978-3-030-84245-1\_14}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarimellaPRTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryHKMNRY21, author = {Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov}, editor = {Tal Malkin and Chris Peikert}, title = {{YOSO:} You Only Speak Once - Secure {MPC} with Stateless Ephemeral Roles}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {64--93}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_3}, doi = {10.1007/978-3-030-84245-1\_3}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryHKMNRY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GhoshalT21, author = {Ashrujit Ghoshal and Stefano Tessaro}, editor = {Tal Malkin and Chris Peikert}, title = {Tight State-Restoration Soundness in the Algebraic Group Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {64--93}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_3}, doi = {10.1007/978-3-030-84252-9\_3}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GhoshalT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalLOPS21, author = {Vipul Goyal and Hanjun Li and Rafail Ostrovsky and Antigoni Polychroniadou and Yifan Song}, editor = {Tal Malkin and Chris Peikert}, title = {{ATLAS:} Efficient and Scalable {MPC} in the Honest Majority Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {244--274}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_9}, doi = {10.1007/978-3-030-84245-1\_9}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalLOPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalPS21, author = {Vipul Goyal and Antigoni Polychroniadou and Yifan Song}, editor = {Tal Malkin and Chris Peikert}, title = {Unconditional Communication-Efficient {MPC} via Hall's Marriage Theorem}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {275--304}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_10}, doi = {10.1007/978-3-030-84245-1\_10}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalSS21, author = {Vipul Goyal and Yifan Song and Akshayaram Srinivasan}, editor = {Tal Malkin and Chris Peikert}, title = {Traceable Secret Sharing and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {718--747}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_24}, doi = {10.1007/978-3-030-84252-9\_24}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuJK21, author = {Yanqi Gu and Stanislaw Jarecki and Hugo Krawczyk}, editor = {Tal Malkin and Chris Peikert}, title = {{KHAPE:} Asymmetric {PAKE} from Key-Hiding Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {701--730}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_24}, doi = {10.1007/978-3-030-84259-8\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HanJKLPRS21, author = {Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Sch{\"{a}}ge}, editor = {Tal Malkin and Chris Peikert}, title = {Authenticated Key Exchange and Signatures with Tight Security in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {670--700}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_23}, doi = {10.1007/978-3-030-84259-8\_23}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HanJKLPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HerzbergLSW21, author = {Amir Herzberg and Hemi Leibowitz and Ewa Syta and Sara Wr{\'{o}}tniak}, editor = {Tal Malkin and Chris Peikert}, title = {MoSS: Modular Security Specifications Framework}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {33--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_2}, doi = {10.1007/978-3-030-84252-9\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HerzbergLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HopkinsJL21, author = {Samuel B. Hopkins and Aayush Jain and Huijia Lin}, editor = {Tal Malkin and Chris Peikert}, title = {Counterexamples to New Circular Security Assumptions Underlying iO}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {673--700}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_23}, doi = {10.1007/978-3-030-84245-1\_23}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HopkinsJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HosoyamadaI21, author = {Akinori Hosoyamada and Tetsu Iwata}, editor = {Tal Malkin and Chris Peikert}, title = {On Tight Quantum Security of {HMAC} and {NMAC} in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {585--615}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_21}, doi = {10.1007/978-3-030-84242-0\_21}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HosoyamadaI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HosoyamadaS21, author = {Akinori Hosoyamada and Yu Sasaki}, editor = {Tal Malkin and Chris Peikert}, title = {Quantum Collision Attacks on Reduced {SHA-256} and {SHA-512}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {616--646}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_22}, doi = {10.1007/978-3-030-84242-0\_22}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HosoyamadaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKSS21, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Tal Malkin and Chris Peikert}, title = {On the Round Complexity of Black-Box Secure {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {214--243}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_8}, doi = {10.1007/978-3-030-84245-1\_8}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KamathKPW21, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Daniel Wichs}, editor = {Tal Malkin and Chris Peikert}, title = {Limits on the Adaptive Security of Yao's Garbling}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {486--515}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_17}, doi = {10.1007/978-3-030-84245-1\_17}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KamathKPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KaplanMNS21, author = {Haim Kaplan and Yishay Mansour and Kobbi Nissim and Uri Stemmer}, editor = {Tal Malkin and Chris Peikert}, title = {Separating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {94--121}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_4}, doi = {10.1007/978-3-030-84252-9\_4}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KaplanMNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Katsumata21, author = {Shuichi Katsumata}, editor = {Tal Malkin and Chris Peikert}, title = {A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to {QROM} Secure NIZKs}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {580--610}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_20}, doi = {10.1007/978-3-030-84245-1\_20}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Katsumata21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KerberKK21, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, editor = {Tal Malkin and Chris Peikert}, title = {Composition with Knowledge Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {364--393}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_13}, doi = {10.1007/978-3-030-84259-8\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KerberKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KhuranaS21, author = {Dakshita Khurana and Akshayaram Srinivasan}, editor = {Tal Malkin and Chris Peikert}, title = {Improved Computational Extractors and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {566--594}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_19}, doi = {10.1007/978-3-030-84252-9\_19}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KhuranaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KirchnerEF21, author = {Paul Kirchner and Thomas Espitau and Pierre{-}Alain Fouque}, editor = {Tal Malkin and Chris Peikert}, title = {Towards Faster Polynomial-Time Lattice Reduction}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {760--790}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_26}, doi = {10.1007/978-3-030-84245-1\_26}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KirchnerEF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KirshanovaL21, author = {Elena Kirshanova and Thijs Laarhoven}, editor = {Tal Malkin and Chris Peikert}, title = {Lower Bounds on Lattice Sieving and Information Set Decoding}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {791--820}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_27}, doi = {10.1007/978-3-030-84245-1\_27}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KirshanovaL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KomargodskiL21, author = {Ilan Komargodski and Wei{-}Kai Lin}, editor = {Tal Malkin and Chris Peikert}, title = {A Logarithmic Lower Bound for Oblivious {RAM} (for All Parameters)}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {579--609}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_20}, doi = {10.1007/978-3-030-84259-8\_20}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KomargodskiL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiangP21, author = {Xiao Liang and Omkant Pandey}, editor = {Tal Malkin and Chris Peikert}, title = {Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {34--64}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_2}, doi = {10.1007/978-3-030-84259-8\_2}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LiangP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuIM21, author = {Fukang Liu and Takanori Isobe and Willi Meier}, editor = {Tal Malkin and Chris Peikert}, title = {Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {368--401}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_13}, doi = {10.1007/978-3-030-84252-9\_13}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuIM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuLL21, author = {Meicheng Liu and Xiaojuan Lu and Dongdai Lin}, editor = {Tal Malkin and Chris Peikert}, title = {Differential-Linear Cryptanalysis from an Algebraic Perspective}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {247--277}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_9}, doi = {10.1007/978-3-030-84252-9\_9}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuP21, author = {Yanyi Liu and Rafael Pass}, editor = {Tal Malkin and Chris Peikert}, title = {On the Possibility of Basing Cryptography on EXP{\(\not =\)} {BPP}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {11--40}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_2}, doi = {10.1007/978-3-030-84242-0\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuTV21, author = {Tianren Liu and Stefano Tessaro and Vinod Vaikuntanathan}, editor = {Tal Malkin and Chris Peikert}, title = {The t-wise Independence of Substitution-Permutation Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {454--483}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_16}, doi = {10.1007/978-3-030-84259-8\_16}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuTV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuYZZLH21, author = {Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu and Zhenkai Hu}, editor = {Tal Malkin and Chris Peikert}, title = {Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {365--394}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_13}, doi = {10.1007/978-3-030-84245-1\_13}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuYZZLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LongaWS21, author = {Patrick Longa and Wen Wang and Jakub Szefer}, editor = {Tal Malkin and Chris Peikert}, title = {The Cost to Break {SIKE:} {A} Comparative Hardware-Based Analysis with {AES} and {SHA-3}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {402--431}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_14}, doi = {10.1007/978-3-030-84252-9\_14}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LongaWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LyubashevskyNS21, author = {Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler}, editor = {Tal Malkin and Chris Peikert}, title = {{SMILE:} Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {611--640}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_21}, doi = {10.1007/978-3-030-84245-1\_21}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LyubashevskyNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MajiPSW21, author = {Hemanta K. Maji and Anat Paskin{-}Cherniavsky and Tom Suad and Mingyuan Wang}, editor = {Tal Malkin and Chris Peikert}, title = {Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {779--808}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_26}, doi = {10.1007/978-3-030-84252-9\_26}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MajiPSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MajiW21, author = {Hemanta K. Maji and Mingyuan Wang}, editor = {Tal Malkin and Chris Peikert}, title = {Computational Hardness of Optimal Fair Computation: Beyond Minicrypt}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {33--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_2}, doi = {10.1007/978-3-030-84245-1\_2}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MajiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/May21, author = {Alexander May}, editor = {Tal Malkin and Chris Peikert}, title = {How to Meet Ternary {LWE} Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {701--731}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_24}, doi = {10.1007/978-3-030-84245-1\_24}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/May21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NickRS21, author = {Jonas Nick and Tim Ruffing and Yannick Seurin}, editor = {Tal Malkin and Chris Peikert}, title = {MuSig2: Simple Two-Round Schnorr Multi-signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {189--221}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_8}, doi = {10.1007/978-3-030-84242-0\_8}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NickRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PatraS21, author = {Arpita Patra and Akshayaram Srinivasan}, editor = {Tal Malkin and Chris Peikert}, title = {Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {185--213}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_7}, doi = {10.1007/978-3-030-84245-1\_7}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PatraS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuachWW21, author = {Willy Quach and Brent Waters and Daniel Wichs}, editor = {Tal Malkin and Chris Peikert}, title = {Targeted Lossy Functions and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {424--453}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_15}, doi = {10.1007/978-3-030-84259-8\_15}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuachWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuehenKLMPPS21, author = {Victoria de Quehen and P{\'{e}}ter Kutas and Chris Leonardi and Chloe Martindale and Lorenz Panny and Christophe Petit and Katherine E. Stange}, editor = {Tal Malkin and Chris Peikert}, title = {Improved Torsion-Point Attacks on {SIDH} Variants}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {432--470}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_15}, doi = {10.1007/978-3-030-84252-9\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuehenKLMPPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RafolsZ21, author = {Carla R{\`{a}}fols and Arantxa Zapico}, editor = {Tal Malkin and Chris Peikert}, title = {An Algebraic Framework for Universal and Updatable SNARKs}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {774--804}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_27}, doi = {10.1007/978-3-030-84242-0\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RafolsZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RosulekR21, author = {Mike Rosulek and Lawrence Roy}, editor = {Tal Malkin and Chris Peikert}, title = {Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {94--124}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_5}, doi = {10.1007/978-3-030-84242-0\_5}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RosulekR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RotemS21, author = {Lior Rotem and Gil Segev}, editor = {Tal Malkin and Chris Peikert}, title = {Tighter Security for Schnorr Identification and Signatures: {A} High-Moment Forking Lemma for {\textdollar}\{{\textbackslash}varSigma \}{\textdollar}-Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {222--250}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_9}, doi = {10.1007/978-3-030-84242-0\_9}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RotemS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RoyS21, author = {Lawrence Roy and Jaspal Singh}, editor = {Tal Malkin and Chris Peikert}, title = {Large Message Homomorphic Secret Sharing from {DCR} and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {687--717}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_23}, doi = {10.1007/978-3-030-84252-9\_23}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RoyS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShenWGW21, author = {Yaobin Shen and Lei Wang and Dawu Gu and Jian Weng}, editor = {Tal Malkin and Chris Peikert}, title = {Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {309--336}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_11}, doi = {10.1007/978-3-030-84252-9\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ShenWGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShiACM21, author = {Elaine Shi and Waqar Aqeel and Balakrishnan Chandrasekaran and Bruce M. Maggs}, editor = {Tal Malkin and Chris Peikert}, title = {Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {641--669}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_22}, doi = {10.1007/978-3-030-84259-8\_22}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ShiACM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Shmueli21, author = {Omri Shmueli}, editor = {Tal Malkin and Chris Peikert}, title = {Multi-theorem Designated-Verifier {NIZK} for {QMA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {375--405}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_14}, doi = {10.1007/978-3-030-84242-0\_14}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Shmueli21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TaoPD21, author = {Chengdong Tao and Albrecht Petzoldt and Jintai Ding}, editor = {Tal Malkin and Chris Peikert}, title = {Efficient Key Recovery for All {HFE} Signature Variants}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {70--93}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_4}, doi = {10.1007/978-3-030-84242-0\_4}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/TaoPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Teague21, author = {Vanessa Teague}, editor = {Tal Malkin and Chris Peikert}, title = {Which E-Voting Problems Do We Need to Solve?}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {3--7}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_1}, doi = {10.1007/978-3-030-84242-0\_1}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Teague21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangCYHWY21, author = {Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung}, editor = {Tal Malkin and Chris Peikert}, title = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {270--300}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_10}, doi = {10.1007/978-3-030-84259-8\_10}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WangCYHWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangPC21, author = {Yuyu Wang and Jiaxin Pan and Yu Chen}, editor = {Tal Malkin and Chris Peikert}, title = {Fine-Grained Secure Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {179--207}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_7}, doi = {10.1007/978-3-030-84259-8\_7}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WangPC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Wee21, author = {Hoeteck Wee}, editor = {Tal Malkin and Chris Peikert}, title = {Broadcast Encryption with Size N\({}^{\mbox{1/3}}\) and More from k-Lin}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {155--178}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_6}, doi = {10.1007/978-3-030-84259-8\_6}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Wee21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YuZ21, author = {Yu Yu and Jiang Zhang}, editor = {Tal Malkin and Chris Peikert}, title = {Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for {LPN}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {473--501}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_16}, doi = {10.1007/978-3-030-84252-9\_16}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YuZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YuenELAD21, author = {Tsz Hon Yuen and Muhammed F. Esgin and Joseph K. Liu and Man Ho Au and Zhimin Ding}, editor = {Tal Malkin and Chris Peikert}, title = {DualRing: Generic Construction of Ring Signatures with Efficient Instantiations}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {251--281}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_10}, doi = {10.1007/978-3-030-84242-0\_10}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YuenELAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry21, author = {Mark Zhandry}, editor = {Tal Malkin and Chris Peikert}, title = {White Box Traitor Tracing}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {303--333}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_11}, doi = {10.1007/978-3-030-84259-8\_11}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2021-1, editor = {Tal Malkin and Chris Peikert}, title = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0}, doi = {10.1007/978-3-030-84242-0}, isbn = {978-3-030-84241-3}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2021-2, editor = {Tal Malkin and Chris Peikert}, title = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1}, doi = {10.1007/978-3-030-84245-1}, isbn = {978-3-030-84244-4}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2021-3, editor = {Tal Malkin and Chris Peikert}, title = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9}, doi = {10.1007/978-3-030-84252-9}, isbn = {978-3-030-84251-2}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2021-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2021-4, editor = {Tal Malkin and Chris Peikert}, title = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8}, doi = {10.1007/978-3-030-84259-8}, isbn = {978-3-030-84258-1}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2021-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/00010N20, author = {Qian Guo and Thomas Johansson and Alexander Nilsson}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {A Key-Recovery Timing Attack on Post-quantum Primitives Using the Fujisaki-Okamoto Transformation and Its Application on FrodoKEM}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {359--386}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_13}, doi = {10.1007/978-3-030-56880-1\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/00010N20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001GKRS20, author = {Daniel Escudero and Satrajit Ghosh and Marcel Keller and Rahul Rachuri and Peter Scholl}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Improved Primitives for {MPC} over Mixed Arithmetic-Binary Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {823--852}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_29}, doi = {10.1007/978-3-030-56880-1\_29}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001GKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001M20, author = {Daniel Jost and Ueli Maurer}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {33--62}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_2}, doi = {10.1007/978-3-030-56784-2\_2}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001SY20, author = {Liran Katzir and Clara Shikhelman and Eylon Yogev}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Interactive Proofs for Social Graphs}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {574--601}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_20}, doi = {10.1007/978-3-030-56877-1\_20}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001SY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBBJKX20, author = {Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Universally Composable Relaxed Password Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {278--307}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_10}, doi = {10.1007/978-3-030-56784-2\_10}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBBJKX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaGW20, author = {Michel Abdalla and Junqing Gong and Hoeteck Wee}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Functional Encryption for Attribute-Weighted Sums from k-Lin}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {685--716}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_23}, doi = {10.1007/978-3-030-56784-2\_23}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalLNS20, author = {Divesh Aggarwal and Jianwei Li and Phong Q. Nguyen and Noah Stephens{-}Davidowitz}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Slide Reduction, Revisited - Filling the Gaps in {SVP} Approximation}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {274--295}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_10}, doi = {10.1007/978-3-030-56880-1\_10}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalLNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AkshimaCDW20, author = {Akshima and David Cash and Andrew Drucker and Hoeteck Wee}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Time-Space Tradeoffs and Short Collisions in Merkle-Damg{\aa}rd Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {157--186}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_6}, doi = {10.1007/978-3-030-56784-2\_6}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AkshimaCDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlbrechtBFKSW20, author = {Martin R. Albrecht and Shi Bai and Pierre{-}Alain Fouque and Paul Kirchner and Damien Stehl{\'{e}} and Weiqiang Wen}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Faster Enumeration-Based Lattice Reduction: Root Hermite Factor k\({}^{\mbox{1/(2k)}}\) Time k\({}^{\mbox{k/8+o(k)}}\)}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {186--212}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_7}, doi = {10.1007/978-3-030-56880-1\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlbrechtBFKSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlonOP20, author = {Bar Alon and Eran Omri and Anat Paskin{-}Cherniavsky}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {{MPC} with Friends and Foes}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {677--706}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_24}, doi = {10.1007/978-3-030-56880-1\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AlonOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenCDT20, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Security Analysis and Improvements for the {IETF} {MLS} Standard for Group Messaging}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {248--277}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_9}, doi = {10.1007/978-3-030-56784-2\_9}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenCDT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AponPRS20, author = {Daniel Apon and Ray A. Perlner and Angela Robinson and Paolo Santini}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Cryptanalysis of LEDAcrypt}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {389--418}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_14}, doi = {10.1007/978-3-030-56877-1\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AponPRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AttemaC20, author = {Thomas Attema and Ronald Cramer}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocol Theory and Practical Application to Plug {\&} Play Secure Algorithmics}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {513--543}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_18}, doi = {10.1007/978-3-030-56877-1\_18}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AttemaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AttemaLS20, author = {Thomas Attema and Vadim Lyubashevsky and Gregor Seiler}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Practical Product Proofs for Lattice Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {470--499}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_17}, doi = {10.1007/978-3-030-56880-1\_17}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AttemaLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BallCLMT20, author = {Marshall Ball and Eshan Chattopadhyay and Jyun{-}Jie Liao and Tal Malkin and Li{-}Yang Tan}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Non-malleability Against Polynomial Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {97--126}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_4}, doi = {10.1007/978-3-030-56877-1\_4}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BallCLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BallDK20, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {674--703}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_24}, doi = {10.1007/978-3-030-56877-1\_24}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BallDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartaIOW20, author = {Ohad Barta and Yuval Ishai and Rafail Ostrovsky and David J. Wu}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {On Succinct Arguments and Witness Encryption from Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {776--806}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_26}, doi = {10.1007/978-3-030-56784-2\_26}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartaIOW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BauerFL20, author = {Balthazar Bauer and Georg Fuchsbauer and Julian Loss}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {A Classification of Computational Assumptions in the Algebraic Group Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {121--151}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_5}, doi = {10.1007/978-3-030-56880-1\_5}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BauerFL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaumOSS20, author = {Carsten Baum and Emmanuela Orsini and Peter Scholl and Eduardo Soria{-}Vazquez}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Efficient Constant-Round {MPC} with Identifiable Abort and Public Verifiability}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {562--592}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_20}, doi = {10.1007/978-3-030-56880-1\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaumOSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleBSGPUV020, author = {Christof Beierle and Alex Biryukov and Luan Cardoso dos Santos and Johann Gro{\ss}sch{\"{a}}dl and L{\'{e}}o Perrin and Aleksei Udovenko and Vesselin Velichkov and Qingju Wang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Alzette: {A} 64-Bit ARX-box - (Feat. {CRAX} and {TRAX)}}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {419--448}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_15}, doi = {10.1007/978-3-030-56877-1\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BeierleBSGPUV020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleLT20, author = {Christof Beierle and Gregor Leander and Yosuke Todo}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Improved Differential-Linear Attacks with Applications to {ARX} Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {329--358}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_12}, doi = {10.1007/978-3-030-56877-1\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeierleLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BelaidCPRT20, author = {Sonia Bela{\"{\i}}d and Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Random Probing Security: Verification, Composition, Expansion and New Constructions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {339--368}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_12}, doi = {10.1007/978-3-030-56784-2\_12}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BelaidCPRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BelliziaBCGGMPP20, author = {Davide Bellizia and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - {A} Practical Guide Through the Leakage-Resistance Jungle}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {369--400}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_13}, doi = {10.1007/978-3-030-56784-2\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BelliziaBCGGMPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BermanHT20, author = {Itay Berman and Iftach Haitner and Eliad Tsfadia}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {544--573}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_19}, doi = {10.1007/978-3-030-56877-1\_19}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BermanHT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeyneCDELLNPSTW20, author = {Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {299--328}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_11}, doi = {10.1007/978-3-030-56877-1\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeyneCDELLNPSTW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlumZL20, author = {Erica Blum and Chen{-}Da Liu Zhang and Julian Loss}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Always Have a Backup Plan: Fully Secure Synchronous {MPC} with Asynchronous Fallback}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {707--731}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_25}, doi = {10.1007/978-3-030-56880-1\_25}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BlumZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoerDPW20, author = {Koen de Boer and L{\'{e}}o Ducas and Alice Pellet{-}Mary and Benjamin Wesolowski}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Random Self-reducibility of Ideal-SVP via Arakelov Random Walks}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {243--273}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_9}, doi = {10.1007/978-3-030-56880-1\_9}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoerDPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BootleL0S20, author = {Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {A Non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {441--469}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_16}, doi = {10.1007/978-3-030-56880-1\_16}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BootleL0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoudotGGHTZ20, author = {Fabrice Boudot and Pierrick Gaudry and Aurore Guillevic and Nadia Heninger and Emmanuel Thom{\'{e}} and Paul Zimmermann}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Comparing the Difficulty of Factorization and Discrete Logarithm: {A} 240-Digit Experiment}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {62--91}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_3}, doi = {10.1007/978-3-030-56880-1\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoudotGGHTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoydDGJ20, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Yao Jiang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Fast and Secure Updatable Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {464--493}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_16}, doi = {10.1007/978-3-030-56784-2\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoydDGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCGIKS20, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Efficient Pseudorandom Correlation Generators from Ring-LPN}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {387--416}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_14}, doi = {10.1007/978-3-030-56880-1\_14}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCGIKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiKM20, author = {Zvika Brakerski and Venkata Koppula and Tamer Mour}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {{NIZK} from {LPN} and Trapdoor Hash via Correlation Intractability for Approximable Relations}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {738--767}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_26}, doi = {10.1007/978-3-030-56877-1\_26}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiS20, author = {Zvika Brakerski and Omri Shmueli}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Scalable Pseudorandom Quantum States}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {417--440}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_15}, doi = {10.1007/978-3-030-56880-1\_15}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrianFO0020, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and Mark Simkin and Daniele Venturi}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {127--155}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_5}, doi = {10.1007/978-3-030-56877-1\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BrianFO0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiPP20, author = {Ran Canetti and Sunoo Park and Oxana Poburinnaya}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Fully Deniable Interactive Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {807--835}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_27}, doi = {10.1007/978-3-030-56784-2\_27}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CarliniJM20, author = {Nicholas Carlini and Matthew Jagielski and Ilya Mironov}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Cryptanalytic Extraction of Neural Network Models}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {189--218}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_7}, doi = {10.1007/978-3-030-56877-1\_7}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CarliniJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CastryckSV20, author = {Wouter Castryck and Jana Sot{\'{a}}kov{\'{a}} and Frederik Vercauteren}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Breaking the Decisional Diffie-Hellman Problem for Class Group Actions Using Genus Theory}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {92--120}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_4}, doi = {10.1007/978-3-030-56880-1\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CastryckSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChakrabortyDN20, author = {Suvradip Chakraborty and Stefan Dziembowski and Jesper Buus Nielsen}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Reverse Firewalls for Actively Secure MPCs}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {732--762}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_26}, doi = {10.1007/978-3-030-56880-1\_26}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChakrabortyDN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaseM20, author = {Melissa Chase and Peihan Miao}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Private Set Intersection in the Internet Setting from Lightweight Oblivious {PRF}}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {34--63}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_2}, doi = {10.1007/978-3-030-56877-1\_2}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaseM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenCDKLRS20, author = {Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and Abhi Shelat}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Multiparty Generation of an {RSA} Modulus}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {64--93}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_3}, doi = {10.1007/978-3-030-56877-1\_3}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenCDKLRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChotardDGPP20, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour{-}Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Dynamic Decentralized Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {747--775}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_25}, doi = {10.1007/978-3-030-56784-2\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChotardDGPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ColadangeloVZ20, author = {Andrea Coladangelo and Thomas Vidick and Tina Zhang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Non-interactive Zero-Knowledge Arguments for QMA, with Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {799--828}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_28}, doi = {10.1007/978-3-030-56877-1\_28}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ColadangeloVZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronG20, author = {Jean{-}S{\'{e}}bastien Coron and Agnese Gini}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {3--31}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_1}, doi = {10.1007/978-3-030-56880-1\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CouteauH20, author = {Geoffroy Couteau and Dominik Hartmann}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Shorter Non-interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {768--798}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_27}, doi = {10.1007/978-3-030-56877-1\_27}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CouteauH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledDG20, author = {Dana Dachman{-}Soled and L{\'{e}}o Ducas and Huijing Gong and M{\'{e}}lissa Rossi}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {{LWE} with Side Information: Attacks and Concrete Security Estimation}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {329--358}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_12}, doi = {10.1007/978-3-030-56880-1\_12}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardO020, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Mark Simkin}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Black-Box Transformations from Passive to Covert Security with Public Verifiability}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {647--676}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_23}, doi = {10.1007/978-3-030-56880-1\_23}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardO020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DavidsonKN0Y20, author = {Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Adaptively Secure Constrained Pseudorandom Functions in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {559--589}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_19}, doi = {10.1007/978-3-030-56784-2\_19}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DavidsonKN0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DerbezHLNPS20, author = {Patrick Derbez and Paul Huynh and Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia and L{\'{e}}o Perrin and Andr{\'{e}} Schrottenloher}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {359--388}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_13}, doi = {10.1007/978-3-030-56877-1\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DerbezHLNPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DingDSVZ20, author = {Jintai Ding and Joshua Deaton and Kurt Schmidt and Vishakha and Zheng Zhang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {279--298}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_10}, doi = {10.1007/978-3-030-56877-1\_10}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DingDSVZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DonFM20, author = {Jelle Don and Serge Fehr and Christian Majenz}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {The Measure-and-Reprogram Technique 2.0: Multi-round Fiat-Shamir and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {602--631}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_21}, doi = {10.1007/978-3-030-56877-1\_21}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DonFM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GhoshalJT20, author = {Ashrujit Ghoshal and Joseph Jaeger and Stefano Tessaro}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {The Memory-Tightness of Authenticated Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {127--156}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_5}, doi = {10.1007/978-3-030-56784-2\_5}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GhoshalJT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalSZ20, author = {Vipul Goyal and Yifan Song and Chenzhi Zhu}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Guaranteed Output Delivery Comes Free in Honest Majority {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {618--646}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_22}, doi = {10.1007/978-3-030-56880-1\_22}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalV20, author = {Rishab Goyal and Satyanarayana Vusirikala}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Verifiable Registration-Based Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {621--651}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_21}, doi = {10.1007/978-3-030-56784-2\_21}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalVW20, author = {Rishab Goyal and Satyanarayana Vusirikala and Brent Waters}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {New Constructions of Hinting PRGs, OWFs with Encryption, and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {527--558}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_18}, doi = {10.1007/978-3-030-56784-2\_18}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GunsingM20, author = {Aldo Gunsing and Bart Mennink}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {The Summation-Truncation Hybrid: Reusing Discarded Bits for Free}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {187--217}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_7}, doi = {10.1007/978-3-030-56784-2\_7}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GunsingM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuoKWW020, author = {Chun Guo and Jonathan Katz and Xiao Wang and Chenkai Weng and Yu Yu}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting)}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {793--822}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_28}, doi = {10.1007/978-3-030-56880-1\_28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuoKWW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HauckKL020, author = {Eduard Hauck and Eike Kiltz and Julian Loss and Ngoc Khanh Nguyen}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Lattice-Based Blind Signatures, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {500--529}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_18}, doi = {10.1007/978-3-030-56880-1\_18}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HauckKL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HeathK20, author = {David Heath and Vladimir Kolesnikov}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Stacked Garbling - Garbled Circuit Proportional to Longest Execution Path}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {763--792}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_27}, doi = {10.1007/978-3-030-56880-1\_27}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HeathK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangS20, author = {Viet Tung Hoang and Yaobin Shen}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Security Analysis of {NIST} {CTR-DRBG}}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {218--247}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_8}, doi = {10.1007/978-3-030-56784-2\_8}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HohenbergerKW20, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Chosen Ciphertext Security from Injective Trapdoor Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {836--866}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_28}, doi = {10.1007/978-3-030-56784-2\_28}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HohenbergerKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JaegerT20, author = {Joseph Jaeger and Nirvan Tyagi}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Handling Adaptive Compromise for Practical Encryption Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {3--32}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_1}, doi = {10.1007/978-3-030-56784-2\_1}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JaegerT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JainKMS20, author = {Aayush Jain and Alexis Korb and Nathan Manohar and Amit Sahai}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Amplifying the Security of Functional Encryption, Unconditionally}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {717--746}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_24}, doi = {10.1007/978-3-030-56784-2\_24}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JainKMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiP020, author = {Yael Tauman Kalai and Omer Paneth and Lisa Yang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Delegation with Updatable Unambiguous Proofs and PPAD-Hardness}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {652--673}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_23}, doi = {10.1007/978-3-030-56877-1\_23}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiP020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kelkar0GJ20, author = {Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Order-Fairness for Byzantine Consensus}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {451--480}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_16}, doi = {10.1007/978-3-030-56877-1\_16}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kelkar0GJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KirchnerEF20, author = {Paul Kirchner and Thomas Espitau and Pierre{-}Alain Fouque}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Fast Reduction of Algebraic Lattices over Cyclotomic Fields}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {155--185}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_6}, doi = {10.1007/978-3-030-56880-1\_6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KirchnerEF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kiyoshima20, author = {Susumu Kiyoshima}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Round-Optimal Black-Box Commit-and-Prove with Succinct Communication}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {533--561}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_19}, doi = {10.1007/978-3-030-56880-1\_19}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kiyoshima20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KreuterLO020, author = {Ben Kreuter and Tancr{\`{e}}de Lepoint and Michele Orr{\`{u}} and Mariana Raykova}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Anonymous Tokens with Private Metadata Bit}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {308--336}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_11}, doi = {10.1007/978-3-030-56784-2\_11}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KreuterLO020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiMQW20, author = {Xin Li and Fermi Ma and Willy Quach and Daniel Wichs}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Leakage-Resilient Key Exchange and Two-Seed Extractors}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {401--429}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_14}, doi = {10.1007/978-3-030-56784-2\_14}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiMQW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Liu0M20, author = {Fukang Liu and Takanori Isobe and Willi Meier}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Automatic Verification of Differential Characteristics: Application to Reduced Gimli}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {219--248}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_8}, doi = {10.1007/978-3-030-56877-1\_8}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Liu0M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuW20, author = {Feng{-}Hao Liu and Zhedong Wang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Rounding in the Rings}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {296--326}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_11}, doi = {10.1007/978-3-030-56880-1\_11}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LombardiV20, author = {Alex Lombardi and Vinod Vaikuntanathan}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {632--651}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_22}, doi = {10.1007/978-3-030-56877-1\_22}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LombardiV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MajiW20, author = {Hemanta K. Maji and Mingyuan Wang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Black-Box Use of One-Way Functions is Useless for Optimal Fair Coin-Tossing}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {593--617}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_21}, doi = {10.1007/978-3-030-56880-1\_21}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MajiW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ManurangsiSV20, author = {Pasin Manurangsi and Akshayaram Srinivasan and Prashant Nalini Vasudevan}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Nearly Optimal Robust Secret Sharing Against Rushing Adversaries}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {156--185}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_6}, doi = {10.1007/978-3-030-56877-1\_6}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ManurangsiSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MiaoP0SY20, author = {Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Two-Sided Malicious Security for Private Intersection-Sum with Cardinality}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {3--33}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_1}, doi = {10.1007/978-3-030-56877-1\_1}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MiaoP0SY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicheliGP20, author = {Gabrielle De Micheli and Pierrick Gaudry and C{\'{e}}cile Pierrot}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Asymptotic Complexities of Discrete Logarithm Algorithms in Pairing-Relevant Finite Fields}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {32--61}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_2}, doi = {10.1007/978-3-030-56880-1\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MicheliGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MoranW20, author = {Tal Moran and Daniel Wichs}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Incompressible Encodings}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {494--523}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_17}, doi = {10.1007/978-3-030-56784-2\_17}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MoranW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MukherjeeS20, author = {Tamalika Mukherjee and Noah Stephens{-}Davidowitz}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {213--242}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_8}, doi = {10.1007/978-3-030-56880-1\_8}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MukherjeeS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PatelPY20, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {433--463}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_15}, doi = {10.1007/978-3-030-56784-2\_15}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PatelPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PattonS20, author = {Christopher Patton and Thomas Shrimpton}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Quantifying the Security Cost of Migrating Protocols to Practice}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {94--124}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_4}, doi = {10.1007/978-3-030-56784-2\_4}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PattonS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Peyrin020, author = {Thomas Peyrin and Haoyang Wang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {The {MALICIOUS} Framework: Embedding Backdoors into Tweakable Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {249--278}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_9}, doi = {10.1007/978-3-030-56877-1\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Peyrin020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rotem020, author = {Lior Rotem and Gil Segev}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Generically Speeding-Up Repeated Squaring Is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {481--509}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_17}, doi = {10.1007/978-3-030-56877-1\_17}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rotem020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Setty20, author = {Srinath T. V. Setty}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Spartan: Efficient and General-Purpose zkSNARKs Without Trusted Setup}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {704--737}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_25}, doi = {10.1007/978-3-030-56877-1\_25}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Setty20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YangAYX20, author = {Rupeng Yang and Man Ho Au and Zuoxia Yu and Qiuliang Xu}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Collusion Resistant Watermarkable PRFs from Standard Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {590--620}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_20}, doi = {10.1007/978-3-030-56784-2\_20}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YangAYX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry020, author = {Mark Zhandry and Cong Zhang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Indifferentiability for Public Key Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {63--93}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_3}, doi = {10.1007/978-3-030-56784-2\_3}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry20, author = {Mark Zhandry}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {New Techniques for Traitor Tracing: Size N\({}^{\mbox{1/3}}\) and More from Pairings}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {652--682}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_22}, doi = {10.1007/978-3-030-56784-2\_22}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2020-1, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2}, doi = {10.1007/978-3-030-56784-2}, isbn = {978-3-030-56783-5}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2020-2, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1}, doi = {10.1007/978-3-030-56880-1}, isbn = {978-3-030-56879-5}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2020-3, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1}, doi = {10.1007/978-3-030-56877-1}, isbn = {978-3-030-56876-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2020-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001MW19, author = {Divya Gupta and Hemanta K. Maji and Mingyuan Wang}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Explicit Rate-1 Non-malleable Codes for Local Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {435--466}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_16}, doi = {10.1007/978-3-030-26948-7\_16}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/0001MW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0002CHV19, author = {Rohit Agrawal and Yi{-}Hsiu Chen and Thibaut Horel and Salil P. Vadhan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Unifying Computational Entropies via Kullback-Leibler Divergence}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {831--858}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_28}, doi = {10.1007/978-3-030-26951-7\_28}, timestamp = {Fri, 09 Aug 2019 14:22:41 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0002CHV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalDNOPRS19, author = {Divesh Aggarwal and Ivan Damg{\aa}rd and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto and Jo{\~{a}}o Ribeiro and Mark Simkin}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {510--539}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_18}, doi = {10.1007/978-3-030-26951-7\_18}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalDNOPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalM019, author = {Shweta Agrawal and Monosij Maitra and Shota Yamada}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Attribute Based Encryption (and more) for Nondeterministic Finite Automata from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {765--797}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_26}, doi = {10.1007/978-3-030-26951-7\_26}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlamatiMP19, author = {Navid Alamati and Hart Montgomery and Sikhar Patranabis}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Symmetric Primitives with Structured Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {650--679}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_23}, doi = {10.1007/978-3-030-26948-7\_23}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlamatiMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AmbainisHU19, author = {Andris Ambainis and Mike Hamburg and Dominique Unruh}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Quantum Security Proofs Using Semi-classical Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {269--295}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_10}, doi = {10.1007/978-3-030-26951-7\_10}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AmbainisHU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthJL0S19, author = {Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {284--332}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_10}, doi = {10.1007/978-3-030-26954-8\_10}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AnanthJL0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AtenieseFN019, author = {Giuseppe Ateniese and Danilo Francati and David Nu{\~{n}}ez and Daniele Venturi}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Match Me if You Can: Matchmaking Encryption and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {701--731}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_24}, doi = {10.1007/978-3-030-26951-7\_24}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AtenieseFN019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BallGW19, author = {Marshall Ball and Siyao Guo and Daniel Wichs}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Non-malleable Codes for Decision Trees}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {413--434}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_15}, doi = {10.1007/978-3-030-26948-7\_15}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BallGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BalleBGN19, author = {Borja Balle and James Bell and Adri{\`{a}} Gasc{\'{o}}n and Kobbi Nissim}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {The Privacy Blanket of the Shuffle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {638--667}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_22}, doi = {10.1007/978-3-030-26951-7\_22}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BalleBGN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekMZ19, author = {James Bartusek and Fermi Ma and Mark Zhandry}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {The Distinction Between Fixed and Random Generators in Group-Based Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {801--830}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_27}, doi = {10.1007/978-3-030-26951-7\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartusekMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareNT19, author = {Mihir Bellare and Ruth Ng and Bj{\"{o}}rn Tackmann}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Nonces Are Noticed: {AEAD} Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {235--265}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_9}, doi = {10.1007/978-3-030-26948-7\_9}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareNT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-SassonBHR19, author = {Eli Ben{-}Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Scalable Zero Knowledge with No Trusted Setup}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {701--732}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_23}, doi = {10.1007/978-3-030-26954-8\_23}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-SassonBHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyP19, author = {Nir Bitansky and Omer Paneth}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {On Round Optimal Statistical Zero Knowledge Arguments}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {128--156}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_5}, doi = {10.1007/978-3-030-26954-8\_5}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlockiHKLXZ19, author = {Jeremiah Blocki and Benjamin Harsha and Siteng Kang and Seunghoon Lee and Lu Xing and Samson Zhou}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {573--607}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_20}, doi = {10.1007/978-3-030-26951-7\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BlockiHKLXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BogdanovIS19, author = {Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Unconditionally Secure Computation Against Low-Complexity Leakage}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {387--416}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_14}, doi = {10.1007/978-3-030-26951-7\_14}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BogdanovIS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehBCGI19, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {67--97}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_3}, doi = {10.1007/978-3-030-26954-8\_3}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehBCGI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehBF19, author = {Dan Boneh and Benedikt B{\"{u}}nz and Ben Fisch}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {561--586}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_20}, doi = {10.1007/978-3-030-26948-7\_20}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BootleLS19, author = {Jonathan Bootle and Vadim Lyubashevsky and Gregor Seiler}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {176--202}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_7}, doi = {10.1007/978-3-030-26948-7\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BootleLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCGIKS19, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Efficient Pseudorandom Correlation Generators: Silent {OT} Extension and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {489--518}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_16}, doi = {10.1007/978-3-030-26954-8\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCGIKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BradleyJX19, author = {Tatiana Bradley and Stanislaw Jarecki and Jiayu Xu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Strong Asymmetric {PAKE} Based on Trapdoor {CKEM}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {798--825}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_26}, doi = {10.1007/978-3-030-26954-8\_26}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BradleyJX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BronchainHMOS19, author = {Olivier Bronchain and Julien M. Hendrickx and Cl{\'{e}}ment Massart and Alex Olshevsky and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {713--737}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_25}, doi = {10.1007/978-3-030-26948-7\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BronchainHMOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CastagnosCLST19, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Two-Party {ECDSA} from Hash Proof Systems and Efficient Instantiations}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {191--221}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_7}, doi = {10.1007/978-3-030-26954-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CastagnosCLST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChandranCOV19, author = {Nishanth Chandran and Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Universally Composable Secure Computation with Corrupted Tokens}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {432--461}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_14}, doi = {10.1007/978-3-030-26954-8\_14}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChandranCOV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaseDIKLOV19, author = {Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Reusable Non-Interactive Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {462--488}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_15}, doi = {10.1007/978-3-030-26954-8\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChaseDIKLOV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenCHM19, author = {Binyi Chen and Yilei Chen and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {467--495}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_17}, doi = {10.1007/978-3-030-26948-7\_17}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenCHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenLM19, author = {Yu Long Chen and Eran Lambooij and Bart Mennink}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {How to Build Pseudorandom Functions from Public Random Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {266--293}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_10}, doi = {10.1007/978-3-030-26948-7\_10}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenT19, author = {Binyi Chen and Stefano Tessaro}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Memory-Hard Functions from Cryptographic Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {543--572}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_19}, doi = {10.1007/978-3-030-26951-7\_19}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CheonCH0L19, author = {Jung Hee Cheon and Wonhee Cho and Minki Hhan and Jiseung Kim and Changmin Lee}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Statistical Zeroizing Attack: Cryptanalysis of Candidates of {BP} Obfuscation over {GGH15} Multilinear Map}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {253--283}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_9}, doi = {10.1007/978-3-030-26954-8\_9}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CheonCH0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenSW19, author = {Ran Cohen and Abhi Shelat and Daniel Wichs}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Adaptively Secure {MPC} with Sublinear Communication Complexity}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {30--60}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_2}, doi = {10.1007/978-3-030-26951-7\_2}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Cohn-GordonCGJJ19, author = {Katriel Cohn{-}Gordon and Cas Cremers and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Highly Efficient Key Exchange Protocols with Optimal Tightness}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {767--797}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_25}, doi = {10.1007/978-3-030-26954-8\_25}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Cohn-GordonCGJJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CorettiDKT19, author = {Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Seedless Fruit Is the Sweetest: Random Number Generation, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {205--234}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_8}, doi = {10.1007/978-3-030-26948-7\_8}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CorettiDKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CzajkowskiHS19, author = {Jan Czajkowski and Andreas H{\"{u}}lsing and Christian Schaffner}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Quantum Indistinguishability of Random Sponges}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {296--325}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_11}, doi = {10.1007/978-3-030-26951-7\_11}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CzajkowskiHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardGO19, author = {Ivan Damg{\aa}rd and Chaya Ganesh and Claudio Orlandi}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Proofs of Replicated Storage Without Timing Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {355--380}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_13}, doi = {10.1007/978-3-030-26948-7\_13}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardGO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardLN19, author = {Ivan Damg{\aa}rd and Kasper Green Larsen and Jesper Buus Nielsen}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {61--84}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_3}, doi = {10.1007/978-3-030-26951-7\_3}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DonFMS19, author = {Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {356--383}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_13}, doi = {10.1007/978-3-030-26951-7\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DonFMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingGIMMO19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Trapdoor Hash Functions and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {3--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_1}, doi = {10.1007/978-3-030-26954-8\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DottlingGIMMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DucasPW19, author = {L{\'{e}}o Ducas and Maxime Plan{\c{c}}on and Benjamin Wesolowski}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {322--351}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_12}, doi = {10.1007/978-3-030-26948-7\_12}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DucasPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EsginSLL19, author = {Muhammed F. Esgin and Ron Steinfeld and Joseph K. Liu and Dongxi Liu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {115--146}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_5}, doi = {10.1007/978-3-030-26948-7\_5}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EsginSLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Faonio019, author = {Antonio Faonio and Daniele Venturi}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {448--479}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_16}, doi = {10.1007/978-3-030-26951-7\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Faonio019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FreitagKP19, author = {Cody Freitag and Ilan Komargodski and Rafael Pass}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {98--127}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_4}, doi = {10.1007/978-3-030-26954-8\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FreitagKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GhoshS19, author = {Satrajit Ghosh and Mark Simkin}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {The Communication Complexity of Threshold Private Set Intersection}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {3--29}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_1}, doi = {10.1007/978-3-030-26951-7\_1}, timestamp = {Mon, 26 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GhoshS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gohr19, author = {Aron Gohr}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {150--179}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_6}, doi = {10.1007/978-3-030-26951-7\_6}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Gohr19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GongWW19, author = {Junqing Gong and Brent Waters and Hoeteck Wee}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {{ABE} for {DFA} from k-Lin}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {732--764}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_25}, doi = {10.1007/978-3-030-26951-7\_25}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GongWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalJS19, author = {Vipul Goyal and Aayush Jain and Amit Sahai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {608--637}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_21}, doi = {10.1007/978-3-030-26951-7\_21}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalKMWW19, author = {Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Watermarking Public-Key Cryptographic Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {367--398}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_12}, doi = {10.1007/978-3-030-26954-8\_12}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalKMWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalLS19, author = {Vipul Goyal and Yanyi Liu and Yifan Song}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Communication-Efficient Unconditional {MPC} with Guaranteed Output Delivery}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {85--114}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_4}, doi = {10.1007/978-3-030-26951-7\_4}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalQWW19, author = {Rishab Goyal and Willy Quach and Brent Waters and Daniel Wichs}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Broadcast and Trace with N{\(\epsilon\)} Ciphertext Size from Standard Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {826--855}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_27}, doi = {10.1007/978-3-030-26954-8\_27}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalQWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuoPS19, author = {Yue Guo and Rafael Pass and Elaine Shi}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Synchronous, with a Chance of Partition Tolerance}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {499--529}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_18}, doi = {10.1007/978-3-030-26948-7\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuoPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HamlinHWW19, author = {Ariel Hamlin and Justin Holmgren and Mor Weiss and Daniel Wichs}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {On the Plausibility of Fully Homomorphic Encryption for RAMs}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {589--619}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_21}, doi = {10.1007/978-3-030-26948-7\_21}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HamlinHWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HanLLG19, author = {Shuai Han and Shengli Liu and Lin Lyu and Dawu Gu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {417--447}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_15}, doi = {10.1007/978-3-030-26951-7\_15}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HanLLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/InoueIMP19, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {3--31}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_1}, doi = {10.1007/978-3-030-26948-7\_1}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/InoueIMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKOS19, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Cryptographic Sensing}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {583--604}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_19}, doi = {10.1007/978-3-030-26954-8\_19}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JaquesS19, author = {Samuel Jaques and John M. Schanck}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Quantum Cryptanalysis in the {RAM} Model: Claw-Finding Attacks on {SIKE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {32--61}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_2}, doi = {10.1007/978-3-030-26948-7\_2}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JaquesS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiK19, author = {Yael Tauman Kalai and Dakshita Khurana}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Non-interactive Non-malleability from Quantum Supremacy}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {552--582}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_18}, doi = {10.1007/978-3-030-26954-8\_18}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KatsumataN0Y19, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Exploring Constructions of Compact NIZKs from Various Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {639--669}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_21}, doi = {10.1007/978-3-030-26954-8\_21}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KatsumataN0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimW19, author = {Sam Kim and David J. Wu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {335--366}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_11}, doi = {10.1007/978-3-030-26954-8\_11}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kitagawa0T19, author = {Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {{CCA} Security and Trapdoor Functions via Key-Dependent-Message Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {33--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_2}, doi = {10.1007/978-3-030-26954-8\_2}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kitagawa0T19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KitagawaNTY19, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {521--551}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_17}, doi = {10.1007/978-3-030-26954-8\_17}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KitagawaNTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KoppulaW19, author = {Venkata Koppula and Brent Waters}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {671--700}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_23}, doi = {10.1007/978-3-030-26951-7\_23}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KoppulaW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LaVigneLW19, author = {Rio LaVigne and Andrea Lincoln and Virginia Vassilevska Williams}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Public-Key Cryptography in the Fine-Grained Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {605--635}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_20}, doi = {10.1007/978-3-030-26954-8\_20}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LaVigneLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LaiM19, author = {Russell W. F. Lai and Giulio Malavolta}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Subvector Commitments with Application to Succinct Arguments}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {530--560}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_19}, doi = {10.1007/978-3-030-26948-7\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LaiM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LeurentS19, author = {Ga{\"{e}}tan Leurent and Ferdinand Sibleyras}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {210--235}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_8}, doi = {10.1007/978-3-030-26951-7\_8}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LeurentS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuDMIWC19, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Efficient Collision Attack Frameworks for {RIPEMD-160}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {117--149}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_5}, doi = {10.1007/978-3-030-26951-7\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LiuDMIWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuZ19, author = {Qipeng Liu and Mark Zhandry}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Revisiting Post-quantum Fiat-Shamir}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {326--355}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_12}, doi = {10.1007/978-3-030-26951-7\_12}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LombardiQRWW19, author = {Alex Lombardi and Willy Quach and Ron D. Rothblum and Daniel Wichs and David J. Wu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {New Constructions of Reusable Designated-Verifier NIZKs}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {670--700}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_22}, doi = {10.1007/978-3-030-26954-8\_22}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LombardiQRWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MalavoltaT19, author = {Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Homomorphic Time-Lock Puzzles and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {620--649}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_22}, doi = {10.1007/978-3-030-26948-7\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MalavoltaT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MoranO19, author = {Tal Moran and Ilan Orlov}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Simple Proofs of Space-Time and Rational Proofs of Storage}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {381--409}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_14}, doi = {10.1007/978-3-030-26948-7\_14}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MoranO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ParkS19, author = {Sunoo Park and Adam Sealfon}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {It Wasn't Me! - Repudiability and Claimability of Ring Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {159--190}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_6}, doi = {10.1007/978-3-030-26954-8\_6}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ParkS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PattonS19, author = {Christopher Patton and Thomas Shrimpton}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Security in the Presence of Key Reuse: Context-Separable Interfaces and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {738--768}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_26}, doi = {10.1007/978-3-030-26948-7\_26}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PattonS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PeikertS19, author = {Chris Peikert and Sina Shiehian}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Noninteractive Zero Knowledge for {NP} from (Plain) Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {89--114}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_4}, doi = {10.1007/978-3-030-26948-7\_4}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PeikertS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PinkasRTY19, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT} Extension}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {401--431}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_13}, doi = {10.1007/978-3-030-26954-8\_13}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PinkasRTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PrestGMP19, author = {Thomas Prest and Dahmun Goudarzi and Ange Martinelli and Alain Passel{\`{e}}gue}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Unifying Leakage Models on a R{\'{e}}nyi Day}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {683--712}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_24}, doi = {10.1007/978-3-030-26948-7\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PrestGMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShiSSLH19, author = {Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full {\textbackslash}mathsf {MORUS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {180--209}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_7}, doi = {10.1007/978-3-030-26951-7\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ShiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SrinivasanV19, author = {Akshayaram Srinivasan and Prashant Nalini Vasudevan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Leakage Resilient Secret Sharing and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {480--509}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_17}, doi = {10.1007/978-3-030-26951-7\_17}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SrinivasanV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Tsabary19, author = {Rotem Tsabary}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Fully Secure Attribute-Based Encryption for t-CNF from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {62--85}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_3}, doi = {10.1007/978-3-030-26948-7\_3}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Tsabary19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TyagiGLMR19, author = {Nirvan Tyagi and Paul Grubbs and Julia Len and Ian Miers and Thomas Ristenpart}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {222--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_8}, doi = {10.1007/978-3-030-26954-8\_8}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/TyagiGLMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/XieZZPS19, author = {Tiancheng Xie and Jiaheng Zhang and Yupeng Zhang and Charalampos Papamanthou and Dawn Song}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {733--764}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_24}, doi = {10.1007/978-3-030-26954-8\_24}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/XieZZPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Xu0HWP19, author = {Jun Xu and Santanu Sarkar and Lei Hu and Huaxiong Wang and Yanbin Pan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {297--321}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_11}, doi = {10.1007/978-3-030-26948-7\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Xu0HWP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YangAZXYW19, author = {Rupeng Yang and Man Ho Au and Zhenfei Zhang and Qiuliang Xu and Zuoxia Yu and William Whyte}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {147--175}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_6}, doi = {10.1007/978-3-030-26948-7\_6}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YangAZXYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry19, author = {Mark Zhandry}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {How to Record Quantum Queries, and Applications to Quantum Indifferentiability}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {239--268}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_9}, doi = {10.1007/978-3-030-26951-7\_9}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2019-1, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7}, doi = {10.1007/978-3-030-26948-7}, isbn = {978-3-030-26947-0}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2019-2, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7}, doi = {10.1007/978-3-030-26951-7}, isbn = {978-3-030-26950-0}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2019-3, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8}, doi = {10.1007/978-3-030-26954-8}, isbn = {978-3-030-26953-1}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2019-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaCFGU18, author = {Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {597--627}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_20}, doi = {10.1007/978-3-319-96884-1\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaCFGU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalJPS18, author = {Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {A New Public-Key Cryptosystem via Mersenne Numbers}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {459--482}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_16}, doi = {10.1007/978-3-319-96878-0\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalJPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGM18, author = {Shashank Agrawal and Chaya Ganesh and Payman Mohassel}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Non-Interactive Zero-Knowledge Proofs for Composite Statements}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {643--673}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_22}, doi = {10.1007/978-3-319-96878-0\_22}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthCG018, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Round-Optimal Secure Multiparty Computation with Honest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {395--424}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_14}, doi = {10.1007/978-3-319-96881-0\_14}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthCG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthIS18, author = {Prabhanjan Ananth and Yuval Ishai and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Private Circuits: {A} Modular Approach}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {427--455}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_15}, doi = {10.1007/978-3-319-96878-0\_15}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AonoNSS18, author = {Yoshinori Aono and Phong Q. Nguyen and Takenobu Seito and Junji Shikata}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Lower Bounds on Lattice Enumeration with Extreme Pruning}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {608--637}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_21}, doi = {10.1007/978-3-319-96881-0\_21}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AonoNSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AsharovEKP18, author = {Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On the Complexity of Compressing Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {753--783}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_26}, doi = {10.1007/978-3-319-96878-0\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AsharovEKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AsharovSS18, author = {Gilad Asharov and Gil Segev and Ido Shahaf}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Tight Tradeoffs in Searchable Symmetric Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {407--436}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_14}, doi = {10.1007/978-3-319-96884-1\_14}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AsharovSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Attrapadung0N0Y18, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Constrained PRFs for {\textbackslash}mathrmNC1 in Traditional Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {543--574}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_19}, doi = {10.1007/978-3-319-96881-0\_19}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Attrapadung0N0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BadrinarayananG18, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Promise Zero Knowledge and Its Applications to Round Optimal {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {459--487}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_16}, doi = {10.1007/978-3-319-96881-0\_16}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BadrinarayananG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BallRSV18, author = {Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Proofs of Work From Worst-Case Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {789--819}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_26}, doi = {10.1007/978-3-319-96884-1\_26}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BallRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical Data and Memory Complexities}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {185--212}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_7}, doi = {10.1007/978-3-319-96881-0\_7}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Bar-OnDKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarbosaF18, author = {Manuel Barbosa and Pooya Farshim}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Indifferentiable Authenticated Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {187--220}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_7}, doi = {10.1007/978-3-319-96884-1\_7}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarbosaF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BauerFM18, author = {Balthazar Bauer and Pooya Farshim and Sogol Mazaheri}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Combiners for Backdoored Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {272--302}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_10}, doi = {10.1007/978-3-319-96881-0\_10}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BauerFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaumBCPGL18, author = {Carsten Baum and Jonathan Bootle and Andrea Cerulli and Rafa{\"{e}}l del Pino and Jens Groth and Vadim Lyubashevsky}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Sub-linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {669--699}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_23}, doi = {10.1007/978-3-319-96881-0\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaumBCPGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-ZviKT18, author = {Adi Ben{-}Zvi and Arkadius G. Kalka and Boaz Tsaban}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Cryptanalysis via Algebraic Spans}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {255--274}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_9}, doi = {10.1007/978-3-319-96884-1\_9}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-ZviKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaDIR18, author = {Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On the Local Leakage Resilience of Linear Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {531--561}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_18}, doi = {10.1007/978-3-319-96884-1\_18}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaDIR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BermanDRV18, author = {Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {From Laconic Zero-Knowledge to Public-Key Cryptography - Extended Abstract}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {674--697}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_23}, doi = {10.1007/978-3-319-96878-0\_23}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BermanDRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BishopKMP0S18, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {731--752}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_25}, doi = {10.1007/978-3-319-96878-0\_25}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BishopKMP0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehBBF18, author = {Dan Boneh and Joseph Bonneau and Benedikt B{\"{u}}nz and Ben Fisch}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Verifiable Delay Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {757--788}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_25}, doi = {10.1007/978-3-319-96884-1\_25}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehBBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {565--596}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_19}, doi = {10.1007/978-3-319-96884-1\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehGGJKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BourseMMP18, author = {Florian Bourse and Michele Minelli and Matthias Minihold and Pascal Paillier}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {483--512}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_17}, doi = {10.1007/978-3-319-96878-0\_17}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BourseMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCDH18, author = {Elette Boyle and Ran Cohen and Deepesh Data and Pavel Hub{\'{a}}cek}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Must the Communication Graph of {MPC} Protocols be an Expander?}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {243--272}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_9}, doi = {10.1007/978-3-319-96878-0\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleIP18, author = {Elette Boyle and Yuval Ishai and Antigoni Polychroniadou}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Limits of Practical Sublinear Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {302--332}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_11}, doi = {10.1007/978-3-319-96878-0\_11}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleIP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Brakerski18, author = {Zvika Brakerski}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Quantum {FHE} (Almost) As Secure As Classical}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {67--95}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_3}, doi = {10.1007/978-3-319-96878-0\_3}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Brakerski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CascudoCXY18, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing and Chen Yuan}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Amortized Complexity of Information-Theoretically Secure {MPC} Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {395--426}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_14}, doi = {10.1007/978-3-319-96878-0\_14}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CascudoCXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenVW18, author = {Yilei Chen and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {{GGH15} Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {577--607}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_20}, doi = {10.1007/978-3-319-96881-0\_20}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CheonHKL18, author = {Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Cryptanalyses of Branching Program Obfuscations over {GGH13} Multilinear Map from the {NTRU} Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {184--210}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_7}, doi = {10.1007/978-3-319-96878-0\_7}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CheonHKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChidaGHIKLN18, author = {Koji Chida and Daniel Genkin and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Yehuda Lindell and Ariel Nof}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {34--64}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_2}, doi = {10.1007/978-3-319-96878-0\_2}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChidaGHIKLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CogliatiDKLSTZ18, author = {Beno{\^{\i}}t Cogliati and Yevgeniy Dodis and Jonathan Katz and Jooyoung Lee and John P. Steinberger and Aishwarya Thiruvengadam and Zhe Zhang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {722--753}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_24}, doi = {10.1007/978-3-319-96884-1\_24}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CogliatiDKLSTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CorettiDG18, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {693--721}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_23}, doi = {10.1007/978-3-319-96884-1\_23}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CorettiDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDESX18, author = {Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Peter Scholl and Chaoping Xing}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC} mod 2\({}^{\mbox{k}}\) for Dishonest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {769--798}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_26}, doi = {10.1007/978-3-319-96881-0\_26}, timestamp = {Mon, 12 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CramerDESX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardOS18, author = {Ivan Damg{\aa}rd and Claudio Orlandi and Mark Simkin}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Yet Another Compiler for Active Security or: Efficient {MPC} Over Arbitrary Rings}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {799--829}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_27}, doi = {10.1007/978-3-319-96881-0\_27}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DattaDNY18, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based {MAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {631--661}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_21}, doi = {10.1007/978-3-319-96884-1\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DattaDNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DemertzisPP18, author = {Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {371--406}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_13}, doi = {10.1007/978-3-319-96884-1\_13}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DemertzisPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurKK18, author = {Itai Dinur and Nathan Keller and Ohad Klein}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {213--242}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_8}, doi = {10.1007/978-3-319-96878-0\_8}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DobraunigE0LLLM18, author = {Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Rasta: {A} Cipher with Low ANDdepth and Few ANDs per Bit}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {662--692}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_22}, doi = {10.1007/978-3-319-96884-1\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DobraunigE0LLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisGRW18, author = {Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Message Franking: From Invisible Salamanders to Encryptment}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {155--186}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_6}, doi = {10.1007/978-3-319-96884-1\_6}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisGRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EsserHK0S18, author = {Andre Esser and Felix Heuer and Robert K{\"{u}}bler and Alexander May and Christian Sohler}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Dissection-BKW}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {638--666}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_22}, doi = {10.1007/978-3-319-96881-0\_22}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EsserHK0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FrederiksenLOP18, author = {Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Distributed {RSA} Key Generation for Semi-honest and Malicious Adversaries}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {331--361}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_12}, doi = {10.1007/978-3-319-96881-0\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FrederiksenLOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FuWDM18, author = {Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {A Key-Recovery Attack on 855-round Trivium}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {160--184}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_6}, doi = {10.1007/978-3-319-96881-0\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FuWDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FuchsbauerKL18, author = {Georg Fuchsbauer and Eike Kiltz and Julian Loss}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {The Algebraic Group Model and its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {33--62}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_2}, doi = {10.1007/978-3-319-96881-0\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FuchsbauerKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargH18, author = {Sanjam Garg and Mohammad Hajiabadi}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Trapdoor Functions from the Computational Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {362--391}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_13}, doi = {10.1007/978-3-319-96881-0\_13}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargHMM18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Limits on the Power of Garbling Techniques for Public-Key Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {335--364}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_12}, doi = {10.1007/978-3-319-96878-0\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargHMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargMMM18, author = {Sanjam Garg and Mohammad Mahmoody and Daniel Masny and Izaak Meckler}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On the Round Complexity of {OT} Extension}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {545--574}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_19}, doi = {10.1007/978-3-319-96878-0\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargMS18, author = {Sanjam Garg and Peihan Miao and Akshayaram Srinivasan}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Two-Round Multiparty Secure Computation Minimizing Public Key Operations}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {273--301}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_10}, doi = {10.1007/978-3-319-96878-0\_10}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargOS18, author = {Sanjam Garg and Rafail Ostrovsky and Akshayaram Srinivasan}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Adaptive Garbled {RAM} from Laconic Oblivious Transfer}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {515--544}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_18}, doi = {10.1007/978-3-319-96878-0\_18}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GjosteenJ18, author = {Kristian Gj{\o}steen and Tibor Jager}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {95--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_4}, doi = {10.1007/978-3-319-96881-0\_4}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GjosteenJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Goyal018, author = {Vipul Goyal and Ashutosh Kumar}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Non-malleable Secret Sharing for General Access Structures}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {501--530}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_17}, doi = {10.1007/978-3-319-96884-1\_17}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Goyal018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalKRW18, author = {Rishab Goyal and Venkata Koppula and Andrew Russell and Brent Waters}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Risky Traitor Tracing and New Differential Privacy Negative Results}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {467--497}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_16}, doi = {10.1007/978-3-319-96884-1\_16}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalKRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GrothKMMM18, author = {Jens Groth and Markulf Kohlweiss and Mary Maller and Sarah Meiklejohn and Ian Miers}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Updatable and Universal Common Reference Strings with Applications to zk-SNARKs}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {698--728}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_24}, doi = {10.1007/978-3-319-96878-0\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GrothKMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviHPV18, author = {Shai Halevi and Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Round-Optimal Secure Multi-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {488--520}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_17}, doi = {10.1007/978-3-319-96881-0\_17}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviHPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviS18, author = {Shai Halevi and Victor Shoup}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Faster Homomorphic Linear Transformations in HElib}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {93--120}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_4}, doi = {10.1007/978-3-319-96884-1\_4}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HazayOSS18, author = {Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria{-}Vazquez}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {TinyKeys: {A} New Approach to Efficient Multi-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {3--33}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_1}, doi = {10.1007/978-3-319-96878-0\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HazayOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HesseHK18, author = {Julia Hesse and Dennis Hofheinz and Lisa Kohl}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On Tightly Secure Non-Interactive Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {65--94}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_3}, doi = {10.1007/978-3-319-96881-0\_3}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HesseHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangTT18, author = {Viet Tung Hoang and Stefano Tessaro and Ni Trieu}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {The Curse of Small Domains: New Attacks on Format-Preserving Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {221--251}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_8}, doi = {10.1007/978-3-319-96884-1\_8}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JaegerS18, author = {Joseph Jaeger and Igors Stepanovs}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {33--62}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_2}, doi = {10.1007/978-3-319-96884-1\_2}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JaegerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JiL018, author = {Zhengfeng Ji and Yi{-}Kai Liu and Fang Song}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Pseudorandom Quantum States}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {126--152}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_5}, doi = {10.1007/978-3-319-96878-0\_5}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JiL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JiangZCWM18, author = {Haodong Jiang and Zhenfeng Zhang and Long Chen and Hong Wang and Zhi Ma}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {96--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_4}, doi = {10.1007/978-3-319-96878-0\_4}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JiangZCWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KamaraMO18, author = {Seny Kamara and Tarik Moataz and Olga Ohrimenko}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Structured Encryption and Leakage Suppression}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {339--370}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_12}, doi = {10.1007/978-3-319-96884-1\_12}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KamaraMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KatzRR018, author = {Jonathan Katz and Samuel Ranellucci and Mike Rosulek and Xiao Wang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {365--391}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_13}, doi = {10.1007/978-3-319-96878-0\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KatzRR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiayiasLT18, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Non-Malleable Codes for Partial Functions with Manipulation Detection}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {577--607}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_20}, doi = {10.1007/978-3-319-96878-0\_20}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiayiasLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimW18, author = {Sam Kim and David J. Wu}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Multi-Theorem Preprocessing NIZKs from Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {733--765}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_25}, doi = {10.1007/978-3-319-96881-0\_25}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KomargodskiY18, author = {Ilan Komargodski and Eylon Yogev}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On Distributional Collision Resistant Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {303--327}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_11}, doi = {10.1007/978-3-319-96881-0\_11}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KomargodskiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KowalczykMUW18, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Daniel Wichs}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Hardness of Non-interactive Differential Privacy from One-Way Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {437--466}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_15}, doi = {10.1007/978-3-319-96884-1\_15}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KowalczykMUW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LarsenN18, author = {Kasper Green Larsen and Jesper Buus Nielsen}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Yes, There is an Oblivious {RAM} Lower Bound!}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {523--542}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_18}, doi = {10.1007/978-3-319-96881-0\_18}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LarsenN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LeurentNS18, author = {Ga{\"{e}}tan Leurent and Mridul Nandi and Ferdinand Sibleyras}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Generic Attacks Against Beyond-Birthday-Bound MACs}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {306--336}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_11}, doi = {10.1007/978-3-319-96884-1\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LeurentNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertLNW18, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Lattice-Based Zero-Knowledge Arguments for Integer Relations}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {700--732}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_24}, doi = {10.1007/978-3-319-96881-0\_24}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LibertLNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Nandi18, author = {Mridul Nandi}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Bernstein Bound on {WCS} is Tight - Repairing Luykx-Preneel Optimal Forgeries}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {213--238}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_8}, doi = {10.1007/978-3-319-96881-0\_8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Nandi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OstrovskyP0V18, author = {Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {608--639}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_21}, doi = {10.1007/978-3-319-96878-0\_21}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OstrovskyP0V18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PatraR18, author = {Arpita Patra and Divya Ravi}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {On the Exact Round Complexity of Secure Three-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {425--458}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_15}, doi = {10.1007/978-3-319-96881-0\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/PatraR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Pellet-Mary18, author = {Alice Pellet{-}Mary}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Quantum Attacks Against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {153--183}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_6}, doi = {10.1007/978-3-319-96878-0\_6}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Pellet-Mary18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PoetteringR18, author = {Bertram Poettering and Paul R{\"{o}}sler}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Towards Bidirectional Ratcheted Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {3--32}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_1}, doi = {10.1007/978-3-319-96884-1\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PoetteringR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ReparazMBANNS18, author = {Oscar Reparaz and Lauren De Meyer and Beg{\"{u}}l Bilgin and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Nigel P. Smart}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {{CAPA:} The Spirit of Beaver Against Physical Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {121--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_5}, doi = {10.1007/978-3-319-96884-1\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ReparazMBANNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RogawayZ18, author = {Phillip Rogaway and Yusi Zhang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Simplifying Game-Based Definitions - Indistinguishability up to Correctness and Its Application to Stateful {AE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {3--32}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_1}, doi = {10.1007/978-3-319-96881-0\_1}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RogawayZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RotemS18, author = {Lior Rotem and Gil Segev}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {63--89}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_3}, doi = {10.1007/978-3-319-96884-1\_3}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RotemS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Russell0YZ18, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Correcting Subverted Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {241--271}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_9}, doi = {10.1007/978-3-319-96881-0\_9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Russell0YZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TodoIMAZ18, author = {Yosuke Todo and Takanori Isobe and Willi Meier and Kazumaro Aoki and Bin Zhang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {129--159}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_5}, doi = {10.1007/978-3-319-96881-0\_5}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/TodoIMAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangHTLIM18, author = {Qingju Wang and Yonglin Hao and Yosuke Todo and Chaoyun Li and Takanori Isobe and Willi Meier}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {275--305}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_10}, doi = {10.1007/978-3-319-96884-1\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WangHTLIM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2018-1, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1}, doi = {10.1007/978-3-319-96884-1}, isbn = {978-3-319-96883-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2018-2, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0}, doi = {10.1007/978-3-319-96881-0}, isbn = {978-3-319-96880-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2018-3, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0}, doi = {10.1007/978-3-319-96878-0}, isbn = {978-3-319-96877-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2018-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001M17, author = {Felix G{\"{u}}nther and Sogol Mazaheri}, editor = {Jonathan Katz and Hovav Shacham}, title = {A Formal Treatment of Multi-key Channels}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {587--618}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_20}, doi = {10.1007/978-3-319-63697-9\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001M17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001Y17, author = {Fang Song and Aaram Yun}, editor = {Jonathan Katz and Hovav Shacham}, title = {Quantum Security of {NMAC} and Related Constructions - {PRF} Domain Extension Against Quantum attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {283--309}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_10}, doi = {10.1007/978-3-319-63715-0\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0002KKR17, author = {Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum}, editor = {Jonathan Katz and Hovav Shacham}, title = {Distinguisher-Dependent Simulation in Two Rounds and its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {158--189}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_6}, doi = {10.1007/978-3-319-63715-0\_6}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0002KKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeHNOP17, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, editor = {Jonathan Katz and Hovav Shacham}, title = {Compact Structure-Preserving Signatures with Almost Tight Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {548--580}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_19}, doi = {10.1007/978-3-319-63715-0\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbeHNOP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Agrawal17, author = {Shweta Agrawal}, editor = {Jonathan Katz and Hovav Shacham}, title = {Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {3--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_1}, doi = {10.1007/978-3-319-63688-7\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Agrawal17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AkaviaLM17, author = {Adi Akavia and Rio LaVigne and Tal Moran}, editor = {Jonathan Katz and Hovav Shacham}, title = {Topology-Hiding Computation on All Graphs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {447--467}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_15}, doi = {10.1007/978-3-319-63688-7\_15}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AkaviaLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlagicM17, author = {Gorjan Alagic and Christian Majenz}, editor = {Jonathan Katz and Hovav Shacham}, title = {Quantum Non-malleability and Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {310--341}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_11}, doi = {10.1007/978-3-319-63715-0\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlagicM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AmbronaBS17, author = {Miguel Ambrona and Gilles Barthe and Benedikt Schmidt}, editor = {Jonathan Katz and Hovav Shacham}, title = {Generic Transformations of Predicate Encodings: Constructions and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {36--66}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_2}, doi = {10.1007/978-3-319-63688-7\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AmbronaBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ananth0S17, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, editor = {Jonathan Katz and Hovav Shacham}, title = {Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {252--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_9}, doi = {10.1007/978-3-319-63715-0\_9}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ananth0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthC017, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Abhishek Jain}, editor = {Jonathan Katz and Hovav Shacham}, title = {A New Approach to Round-Optimal Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {468--499}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_16}, doi = {10.1007/978-3-319-63688-7\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AnanthC017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumARV17, author = {Benny Applebaum and Barak Arkis and Pavel Raykov and Prashant Nalini Vasudevan}, editor = {Jonathan Katz and Hovav Shacham}, title = {Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {727--757}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_24}, doi = {10.1007/978-3-319-63688-7\_24}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumARV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumDI0Z17, author = {Benny Applebaum and Ivan Damg{\aa}rd and Yuval Ishai and Michael Nielsen and Lior Zichron}, editor = {Jonathan Katz and Hovav Shacham}, title = {Secure Arithmetic Computation with Constant Computational Overhead}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {223--254}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_8}, doi = {10.1007/978-3-319-63688-7\_8}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumDI0Z17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AshurDL17, author = {Tomer Ashur and Orr Dunkelman and Atul Luykx}, editor = {Jonathan Katz and Hovav Shacham}, title = {Boosting Authenticated Encryption Robustness with Minimal Modifications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {3--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_1}, doi = {10.1007/978-3-319-63697-9\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AshurDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AuerbachCFK17, author = {Benedikt Auerbach and David Cash and Manuel Fersch and Eike Kiltz}, editor = {Jonathan Katz and Hovav Shacham}, title = {Memory-Tight Reductions}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {101--132}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_4}, doi = {10.1007/978-3-319-63688-7\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AuerbachCFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BadertscherMTZ17, author = {Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, editor = {Jonathan Katz and Hovav Shacham}, title = {Bitcoin as a Transaction Ledger: {A} Composable Treatment}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {324--356}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_11}, doi = {10.1007/978-3-319-63688-7\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BadertscherMTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BalticoCFG17, author = {Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay}, editor = {Jonathan Katz and Hovav Shacham}, title = {Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {67--98}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_3}, doi = {10.1007/978-3-319-63688-7\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BalticoCFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bao00G17, author = {Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu}, editor = {Jonathan Katz and Hovav Shacham}, title = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {404--427}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_14}, doi = {10.1007/978-3-319-63715-0\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Bao00G17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleCLR17, author = {Christof Beierle and Anne Canteaut and Gregor Leander and Yann Rotella}, editor = {Jonathan Katz and Hovav Shacham}, title = {Proving Resistance Against Invariant Attacks: How to Choose the Round Constants}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {647--678}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_22}, doi = {10.1007/978-3-319-63715-0\_22}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeierleCLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BelaidBPPTV17, author = {Sonia Bela{\"{\i}}d and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud}, editor = {Jonathan Katz and Hovav Shacham}, title = {Private Multiplication over Finite Fields}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {397--426}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_14}, doi = {10.1007/978-3-319-63697-9\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BelaidBPPTV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareSJNS17, author = {Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs}, editor = {Jonathan Katz and Hovav Shacham}, title = {Ratcheted Encryption and Key Exchange: The Security of Messaging}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {619--650}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_21}, doi = {10.1007/978-3-319-63697-9\_21}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareSJNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaKR17, author = {Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin}, editor = {Jonathan Katz and Hovav Shacham}, title = {Robust Non-interactive Multiparty Computation Against Constant-Size Collusion}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {391--419}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_13}, doi = {10.1007/978-3-319-63688-7\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyDV17, author = {Nir Bitansky and Akshay Degwekar and Vinod Vaikuntanathan}, editor = {Jonathan Katz and Hovav Shacham}, title = {Structure vs. Hardness Through the Obfuscation Lens}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {696--723}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_23}, doi = {10.1007/978-3-319-63688-7\_23}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyDV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlockMN17, author = {Alexander R. Block and Hemanta K. Maji and Hai H. Nguyen}, editor = {Jonathan Katz and Hovav Shacham}, title = {Secure Computation Based on Leaky Correlations: High Resilience Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {3--32}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_1}, doi = {10.1007/978-3-319-63715-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlockMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoldyrevaPS17, author = {Alexandra Boldyreva and Christopher Patton and Thomas Shrimpton}, editor = {Jonathan Katz and Hovav Shacham}, title = {Hedging Public-Key Encryption in the Real World}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {462--494}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_16}, doi = {10.1007/978-3-319-63697-9\_16}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoldyrevaPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyenL17, author = {Xavier Boyen and Qinyi Li}, editor = {Jonathan Katz and Hovav Shacham}, title = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {298--331}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_11}, doi = {10.1007/978-3-319-63697-9\_11}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrendelF0J17, author = {Jacqueline Brendel and Marc Fischlin and Felix G{\"{u}}nther and Christian Janson}, editor = {Jonathan Katz and Hovav Shacham}, title = {{PRF-ODH:} Relations, Instantiations, and Impossibility Results}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {651--681}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_22}, doi = {10.1007/978-3-319-63697-9\_22}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrendelF0J17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CamenischDL17, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, editor = {Jonathan Katz and Hovav Shacham}, title = {Anonymous Attestation with Subverted TPMs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {427--461}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_15}, doi = {10.1007/978-3-319-63697-9\_15}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CamenischDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CastagnosIL17, author = {Guilhem Castagnos and Laurent Imbert and Fabien Laguillaumie}, editor = {Jonathan Katz and Hovav Shacham}, title = {Encryption Switching Protocols Revisited: Switching Modulo p}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {255--287}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_9}, doi = {10.1007/978-3-319-63688-7\_9}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CastagnosIL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoDG0MP17, author = {Chongwon Cho and Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou}, editor = {Jonathan Katz and Hovav Shacham}, title = {Laconic Oblivious Transfer and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {33--65}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_2}, doi = {10.1007/978-3-319-63715-0\_2}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoDG0MP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CiampiOSV17, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, editor = {Jonathan Katz and Hovav Shacham}, title = {Four-Round Concurrent Non-Malleable Commitments from One-Way Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {127--157}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_5}, doi = {10.1007/978-3-319-63715-0\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CiampiOSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaiHT17, author = {Wei Dai and Viet Tung Hoang and Stefano Tessaro}, editor = {Jonathan Katz and Hovav Shacham}, title = {Information-Theoretic Indistinguishability via the Chi-Squared Method}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {497--523}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_17}, doi = {10.1007/978-3-319-63697-9\_17}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaiHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaiSST17, author = {Yuanxi Dai and Yannick Seurin and John P. Steinberger and Aishwarya Thiruvengadam}, editor = {Jonathan Katz and Hovav Shacham}, title = {Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {524--555}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_18}, doi = {10.1007/978-3-319-63697-9\_18}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaiSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardN0R17, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Michael Nielsen and Samuel Ranellucci}, editor = {Jonathan Katz and Hovav Shacham}, title = {The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {167--187}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_6}, doi = {10.1007/978-3-319-63688-7\_6}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardN0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurN17, author = {Itai Dinur and Niv Nadler}, editor = {Jonathan Katz and Hovav Shacham}, title = {Time-Memory Tradeoff Attacks on the {MTP} Proof-of-Work Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {375--403}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_13}, doi = {10.1007/978-3-319-63715-0\_13}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingG17, author = {Nico D{\"{o}}ttling and Sanjam Garg}, editor = {Jonathan Katz and Hovav Shacham}, title = {Identity-Based Encryption from the Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {537--569}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_18}, doi = {10.1007/978-3-319-63688-7\_18}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DottlingG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DurakV17, author = {F. Bet{\"{u}}l Durak and Serge Vaudenay}, editor = {Jonathan Katz and Hovav Shacham}, title = {Breaking the {FF3} Format-Preserving Encryption Standard over Small Domains}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {679--707}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_23}, doi = {10.1007/978-3-319-63715-0\_23}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DurakV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EsserKM17, author = {Andre Esser and Robert K{\"{u}}bler and Alexander May}, editor = {Jonathan Katz and Hovav Shacham}, title = {{LPN} Decoded}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {486--514}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_17}, doi = {10.1007/978-3-319-63715-0\_17}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EsserKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EverspaughPRS17, author = {Adam Everspaugh and Kenneth G. Paterson and Thomas Ristenpart and Samuel Scott}, editor = {Jonathan Katz and Hovav Shacham}, title = {Key Rotation for Authenticated Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {98--129}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_4}, doi = {10.1007/978-3-319-63697-9\_4}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EverspaughPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FaustHM017, author = {Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee and Daniele Venturi}, editor = {Jonathan Katz and Hovav Shacham}, title = {Non-Malleable Codes for Space-Bounded Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {95--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_4}, doi = {10.1007/978-3-319-63715-0\_4}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FaustHM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaboritHPT17, author = {Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean{-}Pierre Tillich}, editor = {Jonathan Katz and Hovav Shacham}, title = {Identity-Based Encryption from Codes with Rank Metric}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {194--224}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_7}, doi = {10.1007/978-3-319-63697-9\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaboritHPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarayIOZ17, author = {Juan A. Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, editor = {Jonathan Katz and Hovav Shacham}, title = {The Price of Low Communication in Secure Multi-party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {420--446}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_14}, doi = {10.1007/978-3-319-63688-7\_14}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarayIOZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarayKL17, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, editor = {Jonathan Katz and Hovav Shacham}, title = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {291--323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_10}, doi = {10.1007/978-3-319-63688-7\_10}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarayKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargMM17, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, editor = {Jonathan Katz and Hovav Shacham}, title = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {661--695}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_22}, doi = {10.1007/978-3-319-63688-7\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargP17, author = {Sanjam Garg and Omkant Pandey}, editor = {Jonathan Katz and Hovav Shacham}, title = {Incremental Program Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {193--223}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_7}, doi = {10.1007/978-3-319-63715-0\_7}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargYZ17, author = {Sumegha Garg and Henry Yuen and Mark Zhandry}, editor = {Jonathan Katz and Hovav Shacham}, title = {New Security Notions and Feasibility Results for Authentication of Quantum Data}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {342--371}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_12}, doi = {10.1007/978-3-319-63715-0\_12}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GayHK17, author = {Romain Gay and Dennis Hofheinz and Lisa Kohl}, editor = {Jonathan Katz and Hovav Shacham}, title = {Kurosawa-Desmedt Meets Tight Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {133--160}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_5}, doi = {10.1007/978-3-319-63697-9\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GayHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GrothM17, author = {Jens Groth and Mary Maller}, editor = {Jonathan Katz and Hovav Shacham}, title = {Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {581--612}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_20}, doi = {10.1007/978-3-319-63715-0\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GrothM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GrubbsLR17, author = {Paul Grubbs and Jiahui Lu and Thomas Ristenpart}, editor = {Jonathan Katz and Hovav Shacham}, title = {Message Franking via Committing Authenticated Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {66--97}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_3}, doi = {10.1007/978-3-319-63697-9\_3}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GrubbsLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuoCSLYM17, author = {Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu}, editor = {Jonathan Katz and Hovav Shacham}, title = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {517--547}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_18}, doi = {10.1007/978-3-319-63715-0\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuoCSLYM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IwataMPS17, author = {Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin}, editor = {Jonathan Katz and Hovav Shacham}, title = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {34--65}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_2}, doi = {10.1007/978-3-319-63697-9\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/IwataMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JafargholiKKKPW17, author = {Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs}, editor = {Jonathan Katz and Hovav Shacham}, title = {Be Adaptive, Avoid Overcommitting}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {133--163}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_5}, doi = {10.1007/978-3-319-63688-7\_5}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JafargholiKKKPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiRR17, author = {Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum}, editor = {Jonathan Katz and Hovav Shacham}, title = {From Obfuscation to the Security of Fiat-Shamir for Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {224--251}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_8}, doi = {10.1007/978-3-319-63715-0\_8}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiayiasRDO17, author = {Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov}, editor = {Jonathan Katz and Hovav Shacham}, title = {Ouroboros: {A} Provably Secure Proof-of-Stake Blockchain Protocol}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {357--388}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_12}, doi = {10.1007/978-3-319-63688-7\_12}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiayiasRDO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KimW17, author = {Sam Kim and David J. Wu}, editor = {Jonathan Katz and Hovav Shacham}, title = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {503--536}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_17}, doi = {10.1007/978-3-319-63688-7\_17}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KimW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KondiP17, author = {Yashvanth Kondi and Arpita Patra}, editor = {Jonathan Katz and Hovav Shacham}, title = {Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {188--222}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_7}, doi = {10.1007/978-3-319-63688-7\_7}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KondiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertSSS17, author = {Beno{\^{\i}}t Libert and Amin Sakzad and Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Jonathan Katz and Hovav Shacham}, title = {All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {332--364}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_12}, doi = {10.1007/978-3-319-63697-9\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Lin17, author = {Huijia Lin}, editor = {Jonathan Katz and Hovav Shacham}, title = {Indistinguishability Obfuscation from {SXDH} on 5-Linear Maps and Locality-5 PRGs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {599--629}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_20}, doi = {10.1007/978-3-319-63688-7\_20}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Lin17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinT17, author = {Huijia Lin and Stefano Tessaro}, editor = {Jonathan Katz and Hovav Shacham}, title = {Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {630--660}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_21}, doi = {10.1007/978-3-319-63688-7\_21}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Lindell17, author = {Yehuda Lindell}, editor = {Jonathan Katz and Hovav Shacham}, title = {Fast Secure Two-Party {ECDSA} Signing}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {613--644}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_21}, doi = {10.1007/978-3-319-63715-0\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Lindell17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Liu17, author = {Meicheng Liu}, editor = {Jonathan Katz and Hovav Shacham}, title = {Degree Evaluation of NFSR-Based Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {227--249}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_8}, doi = {10.1007/978-3-319-63697-9\_8}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Liu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuVW17, author = {Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Jonathan Katz and Hovav Shacham}, title = {Conditional Disclosure of Secrets via Non-linear Reconstruction}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {758--790}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_25}, doi = {10.1007/978-3-319-63688-7\_25}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LuO17, author = {Steve Lu and Rafail Ostrovsky}, editor = {Jonathan Katz and Hovav Shacham}, title = {Black-Box Parallel Garbled {RAM}}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {66--92}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_3}, doi = {10.1007/978-3-319-63715-0\_3}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LuO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Mennink17, author = {Bart Mennink}, editor = {Jonathan Katz and Hovav Shacham}, title = {Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {708--732}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_24}, doi = {10.1007/978-3-319-63715-0\_24}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Mennink17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MenninkN17, author = {Bart Mennink and Samuel Neves}, editor = {Jonathan Katz and Hovav Shacham}, title = {Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {556--583}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_19}, doi = {10.1007/978-3-319-63697-9\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MenninkN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Micciancio017, author = {Daniele Micciancio and Michael Walter}, editor = {Jonathan Katz and Hovav Shacham}, title = {Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {455--485}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_16}, doi = {10.1007/978-3-319-63715-0\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Micciancio017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PinoL17, author = {Rafa{\"{e}}l del Pino and Vadim Lyubashevsky}, editor = {Jonathan Katz and Hovav Shacham}, title = {Amortization with Fewer Equations for Proving Knowledge of Small Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {365--394}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_13}, doi = {10.1007/978-3-319-63697-9\_13}, timestamp = {Tue, 15 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PinoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RoscaSSS17, author = {Miruna Rosca and Amin Sakzad and Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Jonathan Katz and Hovav Shacham}, title = {Middle-Product Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {283--297}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_10}, doi = {10.1007/978-3-319-63697-9\_10}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RoscaSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SongLG17, author = {Ling Song and Guohong Liao and Jian Guo}, editor = {Jonathan Katz and Hovav Shacham}, title = {Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {428--451}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_15}, doi = {10.1007/978-3-319-63715-0\_15}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/SongLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/StevensBKAM17, author = {Marc Stevens and Elie Bursztein and Pierre Karpman and Ange Albertini and Yarik Markov}, editor = {Jonathan Katz and Hovav Shacham}, title = {The First Collision for Full {SHA-1}}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {570--596}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_19}, doi = {10.1007/978-3-319-63688-7\_19}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/StevensBKAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TodoIHM17, author = {Yosuke Todo and Takanori Isobe and Yonglin Hao and Willi Meier}, editor = {Jonathan Katz and Hovav Shacham}, title = {Cube Attacks on Non-Blackbox Polynomials Based on Division Property}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {250--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_9}, doi = {10.1007/978-3-319-63697-9\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/TodoIHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WoodageCDJR17, author = {Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart}, editor = {Jonathan Katz and Hovav Shacham}, title = {A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {682--710}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_23}, doi = {10.1007/978-3-319-63697-9\_23}, timestamp = {Thu, 13 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/WoodageCDJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yamada17, author = {Shota Yamada}, editor = {Jonathan Katz and Hovav Shacham}, title = {Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {161--193}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_6}, doi = {10.1007/978-3-319-63697-9\_6}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yamada17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2017-1, editor = {Jonathan Katz and Hovav Shacham}, title = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7}, doi = {10.1007/978-3-319-63688-7}, isbn = {978-3-319-63687-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2017-2, editor = {Jonathan Katz and Hovav Shacham}, title = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0}, doi = {10.1007/978-3-319-63715-0}, isbn = {978-3-319-63714-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2017-3, editor = {Jonathan Katz and Hovav Shacham}, title = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9}, doi = {10.1007/978-3-319-63697-9}, isbn = {978-3-319-63696-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2017-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001B16, author = {Taechan Kim and Razvan Barbulescu}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Extended Tower Number Field Sieve: {A} New Complexity for the Medium Prime Case}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {543--571}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_20}, doi = {10.1007/978-3-662-53018-4\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001B16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeHO16, author = {Masayuki Abe and Fumitaka Hoshino and Miyako Ohkubo}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {387--415}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_14}, doi = {10.1007/978-3-662-53015-3\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbeHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalLS16, author = {Shweta Agrawal and Beno{\^{\i}}t Libert and Damien Stehl{\'{e}}}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Fully Secure Functional Encryption for Inner Products, from Standard Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {333--362}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_12}, doi = {10.1007/978-3-662-53015-3\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlamatiP16, author = {Navid Alamati and Chris Peikert}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {659--680}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_23}, doi = {10.1007/978-3-662-53008-5\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlamatiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlbrechtBD16, author = {Martin R. Albrecht and Shi Bai and L{\'{e}}o Ducas}, editor = {Matthew Robshaw and Jonathan Katz}, title = {A Subfield Lattice Attack on Overstretched {NTRU} Assumptions - Cryptanalysis of Some {FHE} and Graded Encoding Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {153--178}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_6}, doi = {10.1007/978-3-662-53018-4\_6}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlbrechtBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenB16, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Efficiently Computing Data-Independent Memory-Hard Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {241--271}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_9}, doi = {10.1007/978-3-662-53008-5\_9}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthJNSY16, author = {Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {491--520}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_17}, doi = {10.1007/978-3-662-53008-5\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthJNSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumR16, author = {Benny Applebaum and Pavel Raykov}, editor = {Matthew Robshaw and Jonathan Katz}, title = {On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {449--477}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_16}, doi = {10.1007/978-3-662-53015-3\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bar-OnK16, author = {Achiya Bar{-}On and Nathan Keller}, editor = {Matthew Robshaw and Jonathan Katz}, title = {A 270 Attack on the Full {MISTY1}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {435--456}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_16}, doi = {10.1007/978-3-662-53018-4\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Bar-OnK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaumDLN16, author = {Carsten Baum and Ivan Damg{\aa}rd and Kasper Green Larsen and Michael Nielsen}, editor = {Matthew Robshaw and Jonathan Katz}, title = {How to Prove Knowledge of Small Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {478--498}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_17}, doi = {10.1007/978-3-662-53015-3\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaumDLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleJKL0PSSS16, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, editor = {Matthew Robshaw and Jonathan Katz}, title = {The {SKINNY} Family of Block Ciphers and Its Low-Latency Variant {MANTIS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {123--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_5}, doi = {10.1007/978-3-662-53008-5\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeierleJKL0PSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleKL16, author = {Christof Beierle and Thorsten Kranz and Gregor Leander}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Lightweight Multiplication in GF(2n) with Applications to {MDS} Matrices}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {625--653}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_23}, doi = {10.1007/978-3-662-53018-4\_23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeierleKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareKR16, author = {Mihir Bellare and Daniel Kane and Phillip Rogaway}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Big-Key Symmetric Encryption: Resisting Key Exfiltration}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {373--402}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_14}, doi = {10.1007/978-3-662-53018-4\_14}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareT16, author = {Mihir Bellare and Bj{\"{o}}rn Tackmann}, editor = {Matthew Robshaw and Jonathan Katz}, title = {The Multi-user Security of Authenticated Encryption: {AES-GCM} in {TLS} 1.3}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {247--276}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_10}, doi = {10.1007/978-3-662-53018-4\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-ZviBT16, author = {Adi Ben{-}Zvi and Simon R. Blackburn and Boaz Tsaban}, editor = {Matthew Robshaw and Jonathan Katz}, title = {A Practical Cryptanalysis of the Algebraic Eraser}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {179--189}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_7}, doi = {10.1007/978-3-662-53018-4\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-ZviBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BogdanovIVW16, author = {Andrej Bogdanov and Yuval Ishai and Emanuele Viola and Christopher Williamson}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Bounded Indistinguishability and the Complexity of Recovering Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {593--618}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_21}, doi = {10.1007/978-3-662-53015-3\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BogdanovIVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BouraC16, author = {Christina Boura and Anne Canteaut}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Another View of the Division Property}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {654--682}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_24}, doi = {10.1007/978-3-662-53018-4\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BouraC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoursePMW16, author = {Florian Bourse and Rafa{\"{e}}l Del Pino and Michele Minelli and Hoeteck Wee}, editor = {Matthew Robshaw and Jonathan Katz}, title = {{FHE} Circuit Privacy Almost for Free}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {62--89}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_3}, doi = {10.1007/978-3-662-53008-5\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoursePMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleGI16, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Breaking the Circuit Size Barrier for Secure Computation Under {DDH}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {509--539}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_19}, doi = {10.1007/978-3-662-53018-4\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiBF16, author = {Zvika Brakerski and Christina Brzuska and Nils Fleischhacker}, editor = {Matthew Robshaw and Jonathan Katz}, title = {On Statistically Secure Obfuscation with Approximate Correctness}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {551--578}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_19}, doi = {10.1007/978-3-662-53008-5\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiP16, author = {Zvika Brakerski and Renen Perlman}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Lattice-Based Fully Dynamic Multi-key {FHE} with Short Ciphertexts}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {190--213}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_8}, doi = {10.1007/978-3-662-53018-4\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiV16, author = {Zvika Brakerski and Vinod Vaikuntanathan}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Circuit-ABE from {LWE:} Unbounded Attributes and Semi-adaptive Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {363--384}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_13}, doi = {10.1007/978-3-662-53015-3\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CamenischDR16, author = {Jan Camenisch and Maria Dubovitskaya and Alfredo Rial}, editor = {Matthew Robshaw and Jonathan Katz}, title = {{UC} Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {208--239}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_8}, doi = {10.1007/978-3-662-53015-3\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CamenischDR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CarmerR16, author = {Brent Carmer and Mike Rosulek}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Linicrypt: {A} Model for Practical Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {416--445}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_15}, doi = {10.1007/978-3-662-53015-3\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CarmerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CascudoDDDN16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Jesper Buus Nielsen}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {179--207}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_7}, doi = {10.1007/978-3-662-53015-3\_7}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CascudoDDDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaseGM16, author = {Melissa Chase and Chaya Ganesh and Payman Mohassel}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {499--530}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_18}, doi = {10.1007/978-3-662-53015-3\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaseGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CiampiOSV16, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Concurrent Non-Malleable Commitments (and More) in 3 Rounds}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {270--299}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_10}, doi = {10.1007/978-3-662-53015-3\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CiampiOSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CogliatiS16, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, editor = {Matthew Robshaw and Jonathan Katz}, title = {{EWCDM:} An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant {MAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {121--149}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_5}, doi = {10.1007/978-3-662-53018-4\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CogliatiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenCGZ16, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Probabilistic Termination and Composability of Cryptographic Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {240--269}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_9}, doi = {10.1007/978-3-662-53015-3\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenCGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronLLT16, author = {Jean{-}S{\'{e}}bastien Coron and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Cryptanalysis of {GGH15} Multilinear Maps}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {607--628}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_21}, doi = {10.1007/978-3-662-53008-5\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CoronLLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CostelloLN16, author = {Craig Costello and Patrick Longa and Michael Naehrig}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Efficient Algorithms for Supersingular Isogeny Diffie-Hellman}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {572--601}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_21}, doi = {10.1007/978-3-662-53018-4\_21}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CostelloLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CouteauPP16, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Encryption Switching Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {308--338}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_12}, doi = {10.1007/978-3-662-53018-4\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CouteauPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaiS16, author = {Yuanxi Dai and John P. Steinberger}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Indifferentiability of 8-Round Feistel Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {95--120}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_4}, doi = {10.1007/978-3-662-53018-4\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardNPR16, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Antigoni Polychroniadou and Michael A. Raskin}, editor = {Matthew Robshaw and Jonathan Katz}, title = {On the Communication Required for Unconditionally Secure Multiplication}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {459--488}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_16}, doi = {10.1007/978-3-662-53008-5\_16}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DamgardNPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DegabrielePSW16, author = {Jean Paul Degabriele and Kenneth G. Paterson and Jacob C. N. Schuldt and Joanne Woodage}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {403--432}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_15}, doi = {10.1007/978-3-662-53018-4\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DegabrielePSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DegwekarVV16, author = {Akshay Degwekar and Vinod Vaikuntanathan and Prashant Nalini Vasudevan}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Fine-Grained Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {533--562}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_19}, doi = {10.1007/978-3-662-53015-3\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DegwekarVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DerbezF16, author = {Patrick Derbez and Pierre{-}Alain Fouque}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {157--184}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_6}, doi = {10.1007/978-3-662-53008-5\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DerbezF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurDKS16, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Memory-Efficient Algorithms for Finding Needles in Haystacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {185--206}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_7}, doi = {10.1007/978-3-662-53008-5\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurDKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisHRW16, author = {Yevgeniy Dodis and Shai Halevi and Ron D. Rothblum and Daniel Wichs}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Spooky Encryption and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {93--122}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_4}, doi = {10.1007/978-3-662-53015-3\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisHRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisMS16, author = {Yevgeniy Dodis and Ilya Mironov and Noah Stephens{-}Davidowitz}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {341--372}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_13}, doi = {10.1007/978-3-662-53018-4\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DodisMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingFKS16, author = {Nico D{\"{o}}ttling and Nils Fleischhacker and Johannes Krupp and Dominique Schr{\"{o}}der}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {619--648}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_22}, doi = {10.1007/978-3-662-53015-3\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DottlingFKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DulekSS16, author = {Yfke Dulek and Christian Schaffner and Florian Speelman}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Quantum Homomorphic Encryption for Polynomial-Sized Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {3--32}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_1}, doi = {10.1007/978-3-662-53015-3\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DulekSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DupuisFLS16, author = {Fr{\'{e}}d{\'{e}}ric Dupuis and Serge Fehr and Philippe Lamontagne and Louis Salvail}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {33--59}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_2}, doi = {10.1007/978-3-662-53015-3\_2}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DupuisFLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DuvalLR16, author = {S{\'{e}}bastien Duval and Virginie Lallemand and Yann Rotella}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Cryptanalysis of the {FLIP} Family of Stream Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {457--475}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_17}, doi = {10.1007/978-3-662-53018-4\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DuvalLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkNR16, author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {123--145}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_5}, doi = {10.1007/978-3-662-53015-3\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiFHJM16, author = {Stefan Dziembowski and Sebastian Faust and Gottfried Herold and Anthony Journault and Daniel Masny and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {272--301}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_10}, doi = {10.1007/978-3-662-53008-5\_10}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiFHJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischlinHNS16, author = {Marc Fischlin and Amir Herzberg and Hod Bin Noon and Haya Schulmann}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Obfuscation Combiners}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {521--550}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_18}, doi = {10.1007/978-3-662-53008-5\_18}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischlinHNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GagliardoniHS16, author = {Tommaso Gagliardoni and Andreas H{\"{u}}lsing and Christian Schaffner}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Semantic Security and Indistinguishability in the Quantum World}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {60--89}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_3}, doi = {10.1007/978-3-662-53015-3\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GagliardoniHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargMP16, author = {Sanjam Garg and Payman Mohassel and Charalampos Papamanthou}, editor = {Matthew Robshaw and Jonathan Katz}, title = {{TWORAM:} Efficient Oblivious {RAM} in Two Rounds with Applications to Searchable Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {563--592}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_20}, doi = {10.1007/978-3-662-53015-3\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargPS16, author = {Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {579--604}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_20}, doi = {10.1007/978-3-662-53008-5\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HazayV16, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Matthew Robshaw and Jonathan Katz}, title = {On the Power of Secure Two-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {397--429}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_14}, doi = {10.1007/978-3-662-53008-5\_14}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HazayV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HemenwayJOSW16, author = {Brett Hemenway and Zahra Jafargholi and Rafail Ostrovsky and Alessandra Scafuro and Daniel Wichs}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Adaptively Secure Garbled Circuits from One-Way Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {149--178}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_6}, doi = {10.1007/978-3-662-53015-3\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HemenwayJOSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtMTZ16, author = {Martin Hirt and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Network-Hiding Communication and Applications to Multi-party Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {335--365}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_12}, doi = {10.1007/978-3-662-53008-5\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/HirtMTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangT16, author = {Viet Tung Hoang and Stefano Tessaro}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {3--32}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_1}, doi = {10.1007/978-3-662-53018-4\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKPSY16, author = {Yuval Ishai and Eyal Kushilevitz and Manoj Prabhakaran and Amit Sahai and Ching{-}Hua Yu}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Secure Protocol Transformations}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {430--458}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_15}, doi = {10.1007/978-3-662-53008-5\_15}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KaplanLLN16, author = {Marc Kaplan and Ga{\"{e}}tan Leurent and Anthony Leverrier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Breaking Symmetric Cryptosystems Using Quantum Period Finding}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {207--237}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_8}, doi = {10.1007/978-3-662-53008-5\_8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KaplanLLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiltzMP16, author = {Eike Kiltz and Daniel Masny and Jiaxin Pan}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Optimal Security Proofs for Signatures from Identification Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {33--61}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_2}, doi = {10.1007/978-3-662-53008-5\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiltzMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KoppulaW16, author = {Venkata Koppula and Brent Waters}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Circular Security Separations for Arbitrary Length Cycles from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {681--700}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_24}, doi = {10.1007/978-3-662-53008-5\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KoppulaW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KumaresanRS16, author = {Ranjit Kumaresan and Srinivasan Raghuraman and Adam Sealfon}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Network Oblivious Transfer}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {366--396}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_13}, doi = {10.1007/978-3-662-53008-5\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KumaresanRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Mennink16, author = {Bart Mennink}, editor = {Matthew Robshaw and Jonathan Katz}, title = {{XPX:} Generalized Tweakable Even-Mansour with Improved Security Guarantees}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {64--94}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_3}, doi = {10.1007/978-3-662-53018-4\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Mennink16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MilesSZ16, author = {Eric Miles and Amit Sahai and Mark Zhandry}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over {GGH13}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {629--658}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_22}, doi = {10.1007/978-3-662-53008-5\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MilesSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PerrinUB16, author = {L{\'{e}}o Perrin and Aleksei Udovenko and Alex Biryukov}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big {APN} Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {93--122}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_4}, doi = {10.1007/978-3-662-53008-5\_4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PerrinUB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PeyrinS16, author = {Thomas Peyrin and Yannick Seurin}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {33--63}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_2}, doi = {10.1007/978-3-662-53018-4\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/PeyrinS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Schneider0G16, author = {Tobias Schneider and Amir Moradi and Tim G{\"{u}}neysu}, editor = {Matthew Robshaw and Jonathan Katz}, title = {ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {302--332}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_11}, doi = {10.1007/978-3-662-53008-5\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Schneider0G16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShrimptonSW16, author = {Thomas Shrimpton and Martijn Stam and Bogdan Warinschi}, editor = {Matthew Robshaw and Jonathan Katz}, title = {A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {277--307}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_11}, doi = {10.1007/978-3-662-53018-4\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ShrimptonSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SunL0QR16, author = {Bing Sun and Meicheng Liu and Jian Guo and Longjiang Qu and Vincent Rijmen}, editor = {Matthew Robshaw and Jonathan Katz}, title = {New Insights on AES-Like {SPN} Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {605--624}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_22}, doi = {10.1007/978-3-662-53018-4\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SunL0QR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yamakawa0HK16, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth {RSA} Subgroup Moduli}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {3--32}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_1}, doi = {10.1007/978-3-662-53008-5\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yamakawa0HK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YuZ16, author = {Yu Yu and Jiang Zhang}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Cryptography with Auxiliary Input and Trapdoor from Constant-Noise {LPN}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {214--243}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_9}, doi = {10.1007/978-3-662-53018-4\_9}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YuZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry16, author = {Mark Zhandry}, editor = {Matthew Robshaw and Jonathan Katz}, title = {The Magic of ELFs}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {479--508}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_18}, doi = {10.1007/978-3-662-53018-4\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZhangCZ16, author = {Jiang Zhang and Yu Chen and Zhenfeng Zhang}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {303--332}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_11}, doi = {10.1007/978-3-662-53015-3\_11}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ZhangCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2016-1, editor = {Matthew Robshaw and Jonathan Katz}, title = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4}, doi = {10.1007/978-3-662-53018-4}, isbn = {978-3-662-53017-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2016-2, editor = {Matthew Robshaw and Jonathan Katz}, title = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5}, doi = {10.1007/978-3-662-53008-5}, isbn = {978-3-662-53007-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2016-3, editor = {Matthew Robshaw and Jonathan Katz}, title = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3}, doi = {10.1007/978-3-662-53015-3}, isbn = {978-3-662-53014-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2016-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001IMS15, author = {Divya Gupta and Yuval Ishai and Hemanta K. Maji and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Secure Computation from Leaky Correlated Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {701--720}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_34}, doi = {10.1007/978-3-662-48000-7\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001IMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {388--409}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_19}, doi = {10.1007/978-3-662-47989-6\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Agrawal0MPP15, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {538--557}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_26}, doi = {10.1007/978-3-662-47989-6\_26}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Agrawal0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenOZZ15, author = {Jo{\"{e}}l Alwen and Rafail Ostrovsky and Hong{-}Sheng Zhou and Vassilis Zikas}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {763--780}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_37}, doi = {10.1007/978-3-662-48000-7\_37}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenOZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthBSV15, author = {Prabhanjan Ananth and Zvika Brakerski and Gil Segev and Vinod Vaikuntanathan}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {From Selective to Adaptive Security in Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {657--677}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_32}, doi = {10.1007/978-3-662-48000-7\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthBSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthJ15, author = {Prabhanjan Ananth and Abhishek Jain}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Indistinguishability Obfuscation from Compact Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {308--326}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_15}, doi = {10.1007/978-3-662-47989-6\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AndrychowiczD15, author = {Marcin Andrychowicz and Stefan Dziembowski}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {PoW-Based Distributed Cryptography with No Trusted Setup}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {379--399}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_19}, doi = {10.1007/978-3-662-48000-7\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AndrychowiczD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaCPW15, author = {Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {107--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_6}, doi = {10.1007/978-3-662-48000-7\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaCPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BiryukovP15, author = {Alex Biryukov and L{\'{e}}o Perrin}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {116--140}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_6}, doi = {10.1007/978-3-662-47989-6\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BiryukovP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlondeauPW15, author = {C{\'{e}}line Blondeau and Thomas Peyrin and Lei Wang}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Known-Key Distinguisher on Full {PRESENT}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {455--474}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_22}, doi = {10.1007/978-3-662-47989-6\_22}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BlondeauPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleCP15, author = {Elette Boyle and Kai{-}Min Chung and Rafael Pass}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Large-Scale Secure Computation: Multi-party Computation for (Parallel) {RAM} Programs}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {742--762}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_36}, doi = {10.1007/978-3-662-48000-7\_36}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BroadbentJ15, author = {Anne Broadbent and Stacey Jeffery}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {609--629}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_30}, doi = {10.1007/978-3-662-48000-7\_30}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BroadbentJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiCL15, author = {Ran Canetti and Asaf Cohen and Yehuda Lindell}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {A Simpler Variant of Universally Composable Security for Standard Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {3--22}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_1}, doi = {10.1007/978-3-662-48000-7\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiG015, author = {Ran Canetti and Vipul Goyal and Abhishek Jain}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Concurrent Secure Computation with Optimal Query Complexity}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {43--62}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_3}, doi = {10.1007/978-3-662-48000-7\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CarletPRR15, author = {Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Algebraic Decomposition for Probing Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {742--763}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_36}, doi = {10.1007/978-3-662-47989-6\_36}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CarletPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CatalanoFN15, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {254--274}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_13}, doi = {10.1007/978-3-662-48000-7\_13}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CatalanoFN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChitambarFH15, author = {Eric Chitambar and Benjamin Fortescue and Min{-}Hsiu Hsieh}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Distributions Attaining Secret Key at a Rate of the Conditional Mutual Information}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {443--462}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_22}, doi = {10.1007/978-3-662-48000-7\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChitambarFH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChungLP15, author = {Kai{-}Min Chung and Huijia Lin and Rafael Pass}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {287--307}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_14}, doi = {10.1007/978-3-662-47989-6\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChungLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ClearM15, author = {Michael Clear and Ciaran McGoldrick}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Multi-identity and Multi-key Leveled {FHE} from Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {630--656}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_31}, doi = {10.1007/978-3-662-48000-7\_31}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ClearM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CogliatiLS15, author = {Benoit Cogliati and Rodolphe Lampe and Yannick Seurin}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Tweaking Even-Mansour Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {189--208}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_9}, doi = {10.1007/978-3-662-47989-6\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CogliatiLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {247--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_12}, doi = {10.1007/978-3-662-47989-6\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronLT15, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {New Multilinear Maps Over the Integers}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {267--286}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_13}, doi = {10.1007/978-3-662-47989-6\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurDKS15, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {New Attacks on Feistel Structures with Improved Memory Complexities}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {433--454}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_21}, doi = {10.1007/978-3-662-47989-6\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurDKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisY15, author = {Yevgeniy Dodis and Yanqing Yao}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Privacy with Imperfect Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {463--482}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_23}, doi = {10.1007/978-3-662-48000-7\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingS15, author = {Nico D{\"{o}}ttling and Dominique Schr{\"{o}}der}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Pseudorandom Functions via On-the-Fly Adaptation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {329--350}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_16}, doi = {10.1007/978-3-662-47989-6\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DottlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiFKP15, author = {Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Proofs of Space}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {585--605}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_29}, doi = {10.1007/978-3-662-48000-7\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiFKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EliasLOS15, author = {Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Provably Weak Instances of Ring-LWE}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {63--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_4}, doi = {10.1007/978-3-662-47989-6\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EliasLOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EspitauFK15, author = {Thomas Espitau and Pierre{-}Alain Fouque and Pierre Karpman}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Higher-Order Differential Meet-in-the-middle Preimage Attacks on {SHA-1} and {BLAKE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {683--701}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_33}, doi = {10.1007/978-3-662-47989-6\_33}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EspitauFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FehrF15, author = {Serge Fehr and Max Fillinger}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Multi-prover Commitments Against Non-signaling Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {403--421}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_20}, doi = {10.1007/978-3-662-48000-7\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FehrF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischlinGMP15, author = {Marc Fischlin and Felix G{\"{u}}nther and Giorgia Azzurra Marson and Kenneth G. Paterson}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Data Is a Stream: Security of Stream-Based Channels}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {545--564}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_27}, doi = {10.1007/978-3-662-48000-7\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischlinGMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FouqueLLT15, author = {Pierre{-}Alain Fouque and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Cryptanalysis of the Co-ACD Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {561--580}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_27}, doi = {10.1007/978-3-662-47989-6\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FouqueLLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FuchsbauerHS15, author = {Georg Fuchsbauer and Christian Hanser and Daniel Slamanig}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Practical Round-Optimal Blind Signatures in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {233--253}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_12}, doi = {10.1007/978-3-662-48000-7\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FuchsbauerHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FuchsbauerJP15, author = {Georg Fuchsbauer and Zahra Jafargholi and Krzysztof Pietrzak}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {A Quasipolynomial Reduction for Generalized Selective Decryption on Trees}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {601--620}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_29}, doi = {10.1007/978-3-662-47989-6\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FuchsbauerJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargIKOS15, author = {Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Cryptography with One-Way Communication}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {191--208}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_10}, doi = {10.1007/978-3-662-48000-7\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargIKOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GayKW15, author = {Romain Gay and Iordanis Kerenidis and Hoeteck Wee}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {485--502}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_24}, doi = {10.1007/978-3-662-48000-7\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GayKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaziPT15, author = {Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {The Exact {PRF} Security of Truncation: Tight Bounds for Keyed Sponges and Truncated {CBC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {368--387}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_18}, doi = {10.1007/978-3-662-47989-6\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaziPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GenkinIP15, author = {Daniel Genkin and Yuval Ishai and Antigoni Polychroniadou}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Multi-party Computation: From Passive to Active Security via Secure {SIMD} Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {721--741}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_35}, doi = {10.1007/978-3-662-48000-7\_35}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GenkinIP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GilbertPT15, author = {Henri Gilbert and J{\'{e}}r{\^{o}}me Pl{\^{u}}t and Joana Treger}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Key-Recovery Attack on the {ASASA} Cryptosystem with Expanding S-Boxes}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {475--490}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_23}, doi = {10.1007/978-3-662-47989-6\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GilbertPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GorbunovVW15, author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Predicate Encryption for Circuits from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {503--523}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_25}, doi = {10.1007/978-3-662-48000-7\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GorbunovVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GordonLS15, author = {S. Dov Gordon and Feng{-}Hao Liu and Elaine Shi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Constant-Round {MPC} with Fairness and Guarantee of Output Delivery}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {63--82}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_4}, doi = {10.1007/978-3-662-48000-7\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GordonLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Goyal0S15, author = {Vipul Goyal and Divya Gupta and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Concurrent Secure Computation via Non-Black Box Simulation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {23--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_2}, doi = {10.1007/978-3-662-48000-7\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Goyal0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuoJS15, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Coded-BKW: Solving {LWE} Using Lattice Codes}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {23--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_2}, doi = {10.1007/978-3-662-47989-6\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GuoJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaitnerIOS15, author = {Iftach Haitner and Yuval Ishai and Eran Omri and Ronen Shaltiel}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Parallel Hashing via List Recoverability}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {173--190}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_9}, doi = {10.1007/978-3-662-48000-7\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaitnerIOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HajiabadiK15, author = {Mohammad Hajiabadi and Bruce M. Kapron}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {224--243}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_11}, doi = {10.1007/978-3-662-47989-6\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HajiabadiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Hamburg15, author = {Mike Hamburg}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Decaf: Eliminating Cofactors Through Point Compression}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {705--723}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_34}, doi = {10.1007/978-3-662-47989-6\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Hamburg15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangRRV15, author = {Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Viz{\'{a}}r}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {493--517}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_24}, doi = {10.1007/978-3-662-47989-6\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangRRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HuMR15, author = {Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized Cost}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {150--169}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_8}, doi = {10.1007/978-3-662-48000-7\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HuMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HuangKY15, author = {Ming{-}Deh A. Huang and Michiel Kosters and Sze Ling Yeo}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Last Fall Degree, HFE, and Weil Descent Attacks on {ECDLP}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {581--600}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_28}, doi = {10.1007/978-3-662-47989-6\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HuangKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HuangVLN15, author = {Jialin Huang and Serge Vaudenay and Xuejia Lai and Kaisa Nyberg}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Capacity and Data Complexity in Multidimensional Linear Attack}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {141--160}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_7}, doi = {10.1007/978-3-662-47989-6\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HuangVLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKKP15, author = {Yuval Ishai and Ranjit Kumaresan and Eyal Kushilevitz and Anat Paskin{-}Cherniavsky}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Secure Computation with Minimal Interaction, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {359--378}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_18}, doi = {10.1007/978-3-662-48000-7\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiR15, author = {Yael Tauman Kalai and Ron D. Rothblum}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Arguments of Proximity - [Extended Abstract]}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {422--442}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_21}, doi = {10.1007/978-3-662-48000-7\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KarpmanPS15, author = {Pierre Karpman and Thomas Peyrin and Marc Stevens}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Practical Free-Start Collision Attacks on 76-step {SHA-1}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {623--642}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_30}, doi = {10.1007/978-3-662-47989-6\_30}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KarpmanPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KellerOS15, author = {Marcel Keller and Emmanuela Orsini and Peter Scholl}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Actively Secure {OT} Extension with Optimal Overhead}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {724--741}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_35}, doi = {10.1007/978-3-662-47989-6\_35}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KellerOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiltzPW15, author = {Eike Kiltz and Jiaxin Pan and Hoeteck Wee}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Structure-Preserving Signatures from Standard Assumptions, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {275--295}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_14}, doi = {10.1007/978-3-662-48000-7\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiltzPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KirchnerF15, author = {Paul Kirchner and Pierre{-}Alain Fouque}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {An Improved {BKW} Algorithm for {LWE} with Applications to Cryptography and Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {43--62}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_3}, doi = {10.1007/978-3-662-47989-6\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KirchnerF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kiyoshima15, author = {Susumu Kiyoshima}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Statistical Concurrent Non-malleable Zero-Knowledge from One-Way Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {85--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_5}, doi = {10.1007/978-3-662-48000-7\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kiyoshima15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KolblLT15, author = {Stefan K{\"{o}}lbl and Gregor Leander and Tyge Tiessen}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Observations on the {SIMON} Block Cipher Family}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {161--185}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_8}, doi = {10.1007/978-3-662-47989-6\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KolblLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KowalczykL15, author = {Lucas Kowalczyk and Allison Bishop Lewko}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Bilinear Entropy Expansion from the Decisional Linear Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {524--541}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_26}, doi = {10.1007/978-3-662-48000-7\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KowalczykL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Laarhoven15, author = {Thijs Laarhoven}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {3--22}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_1}, doi = {10.1007/978-3-662-47989-6\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Laarhoven15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LallemandN15, author = {Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Cryptanalysis of Full Sprout}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {663--682}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_32}, doi = {10.1007/978-3-662-47989-6\_32}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LallemandN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {296--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_15}, doi = {10.1007/978-3-662-48000-7\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LindellPSY15, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Constant Round Multi-party Computation Combining {BMR} and {SPDZ}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {319--338}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_16}, doi = {10.1007/978-3-662-48000-7\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LindellPSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MandalR15, author = {Avradip Mandal and Arnab Roy}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {518--537}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_25}, doi = {10.1007/978-3-662-47989-6\_25}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MandalR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MinaudS15, author = {Brice Minaud and Yannick Seurin}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {The Iterated Random Permutation Problem with Applications to Cascade Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {351--367}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_17}, doi = {10.1007/978-3-662-47989-6\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MinaudS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MouhaL15, author = {Nicky Mouha and Atul Luykx}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Multi-key Security: The Even-Mansour Construction Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {209--223}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_10}, doi = {10.1007/978-3-662-47989-6\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MouhaL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorY15, author = {Moni Naor and Eylon Yogev}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Bloom Filters in Adversarial Environments}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {565--584}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_28}, doi = {10.1007/978-3-662-48000-7\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OstrovskyPV15, author = {Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Impossibility of Black-Box Simulation Against Leakage Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {130--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_7}, doi = {10.1007/978-3-662-48000-7\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OstrovskyPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OstrovskyRS15, author = {Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Round-Optimal Black-Box Two-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {339--358}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_17}, doi = {10.1007/978-3-662-48000-7\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OstrovskyRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ReparazBNGV15, author = {Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Consolidating Masking Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {764--783}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_37}, doi = {10.1007/978-3-662-47989-6\_37}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ReparazBNGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SunLRLCWAL15, author = {Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda AlKhzaimi and Chao Li}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {95--115}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_5}, doi = {10.1007/978-3-662-47989-6\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SunLRLCWAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Todo15, author = {Yosuke Todo}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Integral Cryptanalysis on Full {MISTY1}}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {413--432}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_20}, doi = {10.1007/978-3-662-47989-6\_20}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Todo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Waters15, author = {Brent Waters}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {A Punctured Programming Approach to Adaptively Secure Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {678--697}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_33}, doi = {10.1007/978-3-662-48000-7\_33}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Waters15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YuGLW15, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {209--229}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_11}, doi = {10.1007/978-3-662-48000-7\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/YuGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ZhangXM15, author = {Bin Zhang and Chao Xu and Willi Meier}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of {SNOW} 2.0}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {643--662}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_31}, doi = {10.1007/978-3-662-47989-6\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ZhangXM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2015-1, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6}, doi = {10.1007/978-3-662-47989-6}, isbn = {978-3-662-47988-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2015-2, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7}, doi = {10.1007/978-3-662-48000-7}, isbn = {978-3-662-47999-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001P14, author = {Abhishek Banerjee and Chris Peikert}, editor = {Juan A. Garay and Rosario Gennaro}, title = {New and Improved Key-Homomorphic Pseudorandom Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {353--370}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_20}, doi = {10.1007/978-3-662-44371-2\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001P14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001PSW14, author = {Jian Guo and Thomas Peyrin and Yu Sasaki and Lei Wang}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Updates on Generic Attacks against {HMAC} and {NMAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {131--148}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_8}, doi = {10.1007/978-3-662-44371-2\_8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/0001PSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBPP14, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Kenneth G. Paterson}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {77--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_5}, doi = {10.1007/978-3-662-44371-2\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeGOT14, author = {Masayuki Abe and Jens Groth and Miyako Ohkubo and Takeya Tango}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {241--260}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_14}, doi = {10.1007/978-3-662-44371-2\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbeGOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeGOT14a, author = {Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Structure-Preserving Signatures from Type {II} Pairings}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {390--407}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_22}, doi = {10.1007/978-3-662-44371-2\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbeGOT14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalDJMR14, author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Amplifying Privacy in Privacy Amplification}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {183--198}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_11}, doi = {10.1007/978-3-662-44381-1\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalDJMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlbrechtDKLPY14, author = {Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yal{\c{c}}in}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Block Ciphers - Focus on the Linear Layer (feat. {PRIDE)}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {57--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_4}, doi = {10.1007/978-3-662-44371-2\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlbrechtDKLPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Alperin-SheriffP14, author = {Jacob Alperin{-}Sheriff and Chris Peikert}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Faster Bootstrapping with Polynomial Error}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {297--314}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_17}, doi = {10.1007/978-3-662-44371-2\_17}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Alperin-SheriffP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthGP14, author = {Prabhanjan Ananth and Vipul Goyal and Omkant Pandey}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Interactive Proofs under Continual Memory Leakage}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {164--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_10}, doi = {10.1007/978-3-662-44381-1\_10}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AustrinCMPS14, author = {Per Austrin and Kai{-}Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth}, editor = {Juan A. Garay and Rosario Gennaro}, title = {On the Impossibility of Cryptography with Tamperable Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {462--479}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_26}, doi = {10.1007/978-3-662-44371-2\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AustrinCMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartheFFMSS14, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and John C. Mitchell and Andre Scedrov and Benedikt Schmidt}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Automated Analysis of Cryptographic Assumptions in Generic Group Models}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {95--112}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_6}, doi = {10.1007/978-3-662-44371-2\_6}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartheFFMSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelGIKMP14, author = {Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin{-}Cherniavsky}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Non-Interactive Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {387--404}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_22}, doi = {10.1007/978-3-662-44381-1\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BeimelGIKMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareHK14, author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Cryptography from Compression Functions: The {UCE} Bridge to the {ROM}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {169--187}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_10}, doi = {10.1007/978-3-662-44371-2\_10}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellarePR14, author = {Mihir Bellare and Kenneth G. Paterson and Phillip Rogaway}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Security of Symmetric Encryption against Mass Surveillance}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {1--19}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_1}, doi = {10.1007/978-3-662-44371-2\_1}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellarePR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-SassonCTV14, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Scalable Zero Knowledge via Cycles of Elliptic Curves}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {276--294}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_16}, doi = {10.1007/978-3-662-44381-1\_16}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-SassonCTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BentovK14, author = {Iddo Bentov and Ranjit Kumaresan}, editor = {Juan A. Garay and Rosario Gennaro}, title = {How to Use Bitcoin to Design Fair Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {421--439}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_24}, doi = {10.1007/978-3-662-44381-1\_24}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BentovK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BhargavanFKPSB14, author = {Karthikeyan Bhargavan and C{\'{e}}dric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre{-}Yves Strub and Santiago Zanella B{\'{e}}guelin}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Proving the {TLS} Handshake Secure (As It Is)}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {235--255}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_14}, doi = {10.1007/978-3-662-44381-1\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BhargavanFKPSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyCCGKPR14, author = {Nir Bitansky and Ran Canetti and Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai and Omer Paneth and Alon Rosen}, editor = {Juan A. Garay and Rosario Gennaro}, title = {The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {71--89}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_5}, doi = {10.1007/978-3-662-44381-1\_5}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyCCGKPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyCKP14, author = {Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth}, editor = {Juan A. Garay and Rosario Gennaro}, title = {On Virtual Grey Box Obfuscation for General Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {108--125}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_7}, doi = {10.1007/978-3-662-44381-1\_7}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyCKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyDL14, author = {Nir Bitansky and Dana Dachman{-}Soled and Huijia Lin}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Leakage-Tolerant Computation with Input-Independent Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {146--163}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_9}, doi = {10.1007/978-3-662-44381-1\_9}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlazyKP14, author = {Olivier Blazy and Eike Kiltz and Jiaxin Pan}, editor = {Juan A. Garay and Rosario Gennaro}, title = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {408--425}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_23}, doi = {10.1007/978-3-662-44371-2\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlazyKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehWZ14, author = {Dan Boneh and Brent Waters and Mark Zhandry}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Low Overhead Broadcast Encryption from Multilinear Maps}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {206--223}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_12}, doi = {10.1007/978-3-662-44371-2\_12}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehZ14, author = {Dan Boneh and Mark Zhandry}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {480--499}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_27}, doi = {10.1007/978-3-662-44371-2\_27}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrzuskaFM14, author = {Christina Brzuska and Pooya Farshim and Arno Mittelbach}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {188--205}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_11}, doi = {10.1007/978-3-662-44371-2\_11}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrzuskaFM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CamenischLLN14, author = {Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {256--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_15}, doi = {10.1007/978-3-662-44381-1\_15}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CamenischLLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Canetti0P14, author = {Ran Canetti and Abhishek Jain and Omer Paneth}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {337--350}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_19}, doi = {10.1007/978-3-662-44381-1\_19}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Canetti0P14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CatalanoFW14, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Homomorphic Signatures with Efficient Verification for Polynomial Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {371--389}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_21}, doi = {10.1007/978-3-662-44371-2\_21}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CatalanoFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenLLSS14, author = {Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Minimizing the Two-Round Even-Mansour Cipher}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {39--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_3}, doi = {10.1007/978-3-662-44371-2\_3}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenLLSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoiKMZ14, author = {Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Efficient Three-Party Computation from Cut-and-Choose}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {513--530}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_29}, doi = {10.1007/978-3-662-44381-1\_29}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoiKMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledFKLS14, author = {Dana Dachman{-}Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schr{\"{o}}der}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Feasibility and Infeasibility of Secure Computation with Malicious PUFs}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {405--420}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_23}, doi = {10.1007/978-3-662-44381-1\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledFKLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaiLMS14, author = {Yuanxi Dai and Jooyoung Lee and Bart Mennink and John P. Steinberger}, editor = {Juan A. Garay and Rosario Gennaro}, title = {The Security of Multiple Encryption in the Ideal Cipher Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {20--38}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_2}, doi = {10.1007/978-3-662-44371-2\_2}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaiLMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DataPP14, author = {Deepesh Data and Manoj Prabhakaran and Vinod M. Prabhakaran}, editor = {Juan A. Garay and Rosario Gennaro}, title = {On the Communication Complexity of Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {199--216}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_12}, doi = {10.1007/978-3-662-44381-1\_12}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DataPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurL14, author = {Itai Dinur and Ga{\"{e}}tan Leurent}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Improved Generic Attacks against Hash-Based MACs and {HAIFA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {149--168}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_9}, doi = {10.1007/978-3-662-44371-2\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisSSW14, author = {Yevgeniy Dodis and Adi Shamir and Noah Stephens{-}Davidowitz and Daniel Wichs}, editor = {Juan A. Garay and Rosario Gennaro}, title = {How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {37--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_3}, doi = {10.1007/978-3-662-44381-1\_3}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisSSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DucasM14, author = {L{\'{e}}o Ducas and Daniele Micciancio}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Improved Short Lattice Signatures in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {335--352}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_19}, doi = {10.1007/978-3-662-44371-2\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DucasM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FarrasHKP14, author = {Oriol Farr{\`{a}}s and Torben Brandt Hansen and Tarik Kaced and Carles Padr{\'{o}}}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Optimal Non-perfect Uniform Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {217--234}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_13}, doi = {10.1007/978-3-662-44381-1\_13}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FarrasHKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischFN14, author = {Ben Fisch and Daniel Freund and Moni Naor}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Physical Zero-Knowledge Proofs of Physical Properties}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {313--336}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_18}, doi = {10.1007/978-3-662-44381-1\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischFN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargGHW14, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs}, editor = {Juan A. Garay and Rosario Gennaro}, title = {On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {518--535}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_29}, doi = {10.1007/978-3-662-44371-2\_29}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargGHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaziPR14, author = {Peter Gazi and Krzysztof Pietrzak and Michal Ryb{\'{a}}r}, editor = {Juan A. Garay and Rosario Gennaro}, title = {The Exact PRF-Security of {NMAC} and {HMAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {113--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_7}, doi = {10.1007/978-3-662-44371-2\_7}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaziPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GenkinST14, author = {Daniel Genkin and Adi Shamir and Eran Tromer}, editor = {Juan A. Garay and Rosario Gennaro}, title = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {444--461}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_25}, doi = {10.1007/978-3-662-44371-2\_25}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GenkinST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryLW14, author = {Craig Gentry and Allison B. Lewko and Brent Waters}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Witness Encryption from Instance Independent Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {426--443}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_24}, doi = {10.1007/978-3-662-44371-2\_24}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GrangerKZ14, author = {Robert Granger and Thorsten Kleinjung and Jens Zumbr{\"{a}}gel}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Breaking '128-bit Secure' Supersingular Binary Curves - (Or How to Solve Discrete Logarithms in F\({}_{\mbox{2\({}^{\mbox{4 1223}}\)}}\) and F\({}_{\mbox{2\({}^{\mbox{12 367}}\)}}\))}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {126--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_8}, doi = {10.1007/978-3-662-44381-1\_8}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GrangerKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviS14, author = {Shai Halevi and Victor Shoup}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Algorithms in HElib}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {554--571}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_31}, doi = {10.1007/978-3-662-44371-2\_31}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HeroldHHRR14, author = {Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla R{\`{a}}fols and Andy Rupp}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Polynomial Spaces: {A} New Framework for Composite-to-Prime-Order Transformations}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {261--279}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_15}, doi = {10.1007/978-3-662-44371-2\_15}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HeroldHHRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HuangKKKM14, author = {Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Amortizing Garbled Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {458--475}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_26}, doi = {10.1007/978-3-662-44381-1\_26}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HuangKKKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiOZ14, author = {Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Secure Multi-Party Computation with Identifiable Abort}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {369--386}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_21}, doi = {10.1007/978-3-662-44381-1\_21}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiOZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JutlaR14, author = {Charanjit S. Jutla and Arnab Roy}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Switching Lemma for Bilinear Tests and Constant-Size {NIZK} Proofs for Linear Subspaces}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {295--312}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_17}, doi = {10.1007/978-3-662-44381-1\_17}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JutlaR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kiyoshima14, author = {Susumu Kiyoshima}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Round-Efficient Black-Box Construction of Composable Multi-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {351--368}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_20}, doi = {10.1007/978-3-662-44381-1\_20}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kiyoshima14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KolesnikovMR14, author = {Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek}, editor = {Juan A. Garay and Rosario Gennaro}, title = {FleXOR: Flexible Garbling for {XOR} Gates That Beats Free-XOR}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {440--457}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_25}, doi = {10.1007/978-3-662-44381-1\_25}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KolesnikovMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LarraiaOS14, author = {Enrique Larraia and Emmanuela Orsini and Nigel P. Smart}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Dishonest Majority Multi-Party Computation for Binary Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {495--512}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_28}, doi = {10.1007/978-3-662-44381-1\_28}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LarraiaOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LeeS14, author = {Hyung Tae Lee and Jae Hong Seo}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Security Analysis of Multilinear Maps over the Integers}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {224--240}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_13}, doi = {10.1007/978-3-662-44371-2\_13}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LeeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LenstraS14, author = {Hendrik W. Lenstra Jr. and Alice Silverberg}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Revisiting the Gentry-Szydlo Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {280--296}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_16}, doi = {10.1007/978-3-662-44371-2\_16}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LenstraS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LindellR14, author = {Yehuda Lindell and Ben Riva}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {476--494}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_27}, doi = {10.1007/978-3-662-44381-1\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/LindellR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LingPSS14, author = {San Ling and Duong Hieu Phan and Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Hardness of k-LWE and Applications in Traitor Tracing}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {315--334}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_18}, doi = {10.1007/978-3-662-44371-2\_18}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LingPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Liu14, author = {Yi{-}Kai Liu}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Single-Shot Security for One-Time Memories in the Isolated Qubits Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {19--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_2}, doi = {10.1007/978-3-662-44381-1\_2}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Liu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OstrovskyPP14, author = {Rafail Ostrovsky and Anat Paskin{-}Cherniavsky and Beni Paskin{-}Cherniavsky}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Maliciously Circuit-Private {FHE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {536--553}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_30}, doi = {10.1007/978-3-662-44371-2\_30}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OstrovskyPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PapakonstantinouY14, author = {Periklis A. Papakonstantinou and Guang Yang}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Cryptography with Streaming Algorithms}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {55--70}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_4}, doi = {10.1007/978-3-662-44381-1\_4}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/PapakonstantinouY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PassST14, author = {Rafael Pass and Karn Seth and Sidharth Telang}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {500--517}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_28}, doi = {10.1007/978-3-662-44371-2\_28}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PassST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Unruh14, author = {Dominique Unruh}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Quantum Position Verification in the Random Oracle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_1}, doi = {10.1007/978-3-662-44381-1\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Unruh14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yamakawa0HK14, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {90--107}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_6}, doi = {10.1007/978-3-662-44381-1\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yamakawa0HK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2014-1, editor = {Juan A. Garay and Rosario Gennaro}, title = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2}, doi = {10.1007/978-3-662-44371-2}, isbn = {978-3-662-44370-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2014-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2014-2, editor = {Juan A. Garay and Rosario Gennaro}, title = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1}, doi = {10.1007/978-3-662-44381-1}, isbn = {978-3-662-44380-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2014-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0003XF13, author = {Bin Zhang and Chao Xu and Dengguo Feng}, editor = {Ran Canetti and Juan A. Garay}, title = {Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {165--182}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_10}, doi = {10.1007/978-3-642-40041-4\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0003XF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbadiBMRS13, author = {Mart{\'{\i}}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, editor = {Ran Canetti and Juan A. Garay}, title = {Message-Locked Encryption for Lock-Dependent Messages}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {374--391}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_21}, doi = {10.1007/978-3-642-40041-4\_21}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbadiBMRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGVW13, author = {Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Ran Canetti and Juan A. Garay}, title = {Functional Encryption: New Perspectives and Lower Bounds}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {500--518}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_28}, doi = {10.1007/978-3-642-40084-1\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalP13, author = {Shashank Agrawal and Manoj Prabhakaran}, editor = {Ran Canetti and Juan A. Garay}, title = {On Fair Exchange, Fair Coins and Fair Sampling}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {259--276}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_15}, doi = {10.1007/978-3-642-40041-4\_15}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Alperin-SheriffP13, author = {Jacob Alperin{-}Sheriff and Chris Peikert}, editor = {Ran Canetti and Juan A. Garay}, title = {Practical Bootstrapping in Quasilinear Time}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {1--20}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_1}, doi = {10.1007/978-3-642-40041-4\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Alperin-SheriffP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenKPW13, author = {Jo{\"{e}}l Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs}, editor = {Ran Canetti and Juan A. Garay}, title = {Learning with Rounding, Revisited - New Reduction, Properties and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {57--74}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_4}, doi = {10.1007/978-3-642-40041-4\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenKPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AndreevaBDMS13, author = {Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger}, editor = {Ran Canetti and Juan A. Garay}, title = {On the Indifferentiability of Key-Alternating Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {531--550}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_29}, doi = {10.1007/978-3-642-40041-4\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AndreevaBDMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumIKW13, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {166--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_10}, doi = {10.1007/978-3-642-40084-1\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumIKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareHK13, author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi}, editor = {Ran Canetti and Juan A. Garay}, title = {Instantiating Random Oracles via UCEs}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {398--415}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_23}, doi = {10.1007/978-3-642-40084-1\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-SassonCGTV13, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza}, editor = {Ran Canetti and Juan A. Garay}, title = {SNARKs for {C:} Verifying Program Executions Succinctly and in Zero Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {90--108}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_6}, doi = {10.1007/978-3-642-40084-1\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-SassonCGTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BenhamoudaBCPV13, author = {Fabrice Benhamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, editor = {Ran Canetti and Juan A. Garay}, title = {New Techniques for SPHFs and Efficient One-Round {PAKE} Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {449--475}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_25}, doi = {10.1007/978-3-642-40041-4\_25}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BenhamoudaBCPV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlondeauBL13, author = {C{\'{e}}line Blondeau and Andrey Bogdanov and Gregor Leander}, editor = {Ran Canetti and Juan A. Garay}, title = {Bounds in Shallows and in Miseries}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {204--221}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_12}, doi = {10.1007/978-3-642-40041-4\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlondeauBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BogdanovL13, author = {Andrej Bogdanov and Chin Ho Lee}, editor = {Ran Canetti and Juan A. Garay}, title = {Limits of Provable Security for Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {111--128}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_7}, doi = {10.1007/978-3-642-40041-4\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BogdanovL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehLMR13, author = {Dan Boneh and Kevin Lewi and Hart William Montgomery and Ananth Raghunathan}, editor = {Ran Canetti and Juan A. Garay}, title = {Key Homomorphic PRFs and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {410--428}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_23}, doi = {10.1007/978-3-642-40041-4\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehLMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehRS13, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, editor = {Ran Canetti and Juan A. Garay}, title = {Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {461--478}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_26}, doi = {10.1007/978-3-642-40084-1\_26}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehZ13, author = {Dan Boneh and Mark Zhandry}, editor = {Ran Canetti and Juan A. Garay}, title = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {361--379}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_21}, doi = {10.1007/978-3-642-40084-1\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleG0KS13, author = {Elette Boyle and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Amit Sahai}, editor = {Ran Canetti and Juan A. Garay}, title = {Secure Computation against Adaptive Auxiliary Information}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {316--334}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_18}, doi = {10.1007/978-3-642-40041-4\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleG0KS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiR13, author = {Zvika Brakerski and Guy N. Rothblum}, editor = {Ran Canetti and Juan A. Garay}, title = {Obfuscating Conjunctions}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {416--434}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_24}, doi = {10.1007/978-3-642-40084-1\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BroadbentGS13, author = {Anne Broadbent and Gus Gutoski and Douglas Stebila}, editor = {Ran Canetti and Juan A. Garay}, title = {Quantum One-Time Programs - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {344--360}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_20}, doi = {10.1007/978-3-642-40084-1\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BroadbentGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanteautNV13, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia and Bastien Vayssi{\`{e}}re}, editor = {Ran Canetti and Juan A. Garay}, title = {Sieve-in-the-Middle: Improved {MITM} Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {222--240}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_13}, doi = {10.1007/978-3-642-40041-4\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanteautNV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CaroIJOPP13, author = {Angelo De Caro and Vincenzo Iovino and Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano}, editor = {Ran Canetti and Juan A. Garay}, title = {On the Achievability of Simulation-Based Security for Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {519--535}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_29}, doi = {10.1007/978-3-642-40084-1\_29}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CaroIJOPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CashJJKRS13, author = {David Cash and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, editor = {Ran Canetti and Juan A. Garay}, title = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {353--373}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_20}, doi = {10.1007/978-3-642-40041-4\_20}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CashJJKRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenW13, author = {Jie Chen and Hoeteck Wee}, editor = {Ran Canetti and Juan A. Garay}, title = {Fully, (Almost) Tightly Secure {IBE} and Dual System Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {435--460}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_25}, doi = {10.1007/978-3-642-40084-1\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenDIKMRR13, author = {Gil Cohen and Ivan Bjerre Damg{\aa}rd and Yuval Ishai and Jonas K{\"{o}}lker and Peter Bro Miltersen and Ran Raz and Ron D. Rothblum}, editor = {Ran Canetti and Juan A. Garay}, title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {185--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_11}, doi = {10.1007/978-3-642-40084-1\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CohenDIKMRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronLT13, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, editor = {Ran Canetti and Juan A. Garay}, title = {Practical Multilinear Maps over the Integers}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {476--493}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_26}, doi = {10.1007/978-3-642-40041-4\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CoronLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DucasDLL13, author = {L{\'{e}}o Ducas and Alain Durmus and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky}, editor = {Ran Canetti and Juan A. Garay}, title = {Lattice Signatures and Bimodal Gaussians}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {40--56}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_3}, doi = {10.1007/978-3-642-40041-4\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DucasDLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DupuisFW13, author = {Fr{\'{e}}d{\'{e}}ric Dupuis and Omar Fawzi and Stephanie Wehner}, editor = {Ran Canetti and Juan A. Garay}, title = {Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {326--343}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_19}, doi = {10.1007/978-3-642-40084-1\_19}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DupuisFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DziembowskiKO13, author = {Stefan Dziembowski and Tomasz Kazana and Maciej Obremski}, editor = {Ran Canetti and Juan A. Garay}, title = {Non-malleable Codes from Two-Source Extractors}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {239--257}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_14}, doi = {10.1007/978-3-642-40084-1\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DziembowskiKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/EscalaHKRV13, author = {Alex Escala and Gottfried Herold and Eike Kiltz and Carla R{\`{a}}fols and Jorge L. Villar}, editor = {Ran Canetti and Juan A. Garay}, title = {An Algebraic Framework for Diffie-Hellman Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {129--147}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_8}, doi = {10.1007/978-3-642-40084-1\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/EscalaHKRV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FazioGPS13, author = {Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III}, editor = {Ran Canetti and Juan A. Garay}, title = {Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {148--165}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_9}, doi = {10.1007/978-3-642-40084-1\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FazioGPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FouqueJP13, author = {Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin}, editor = {Ran Canetti and Juan A. Garay}, title = {Structural Evaluation of {AES} and Chosen-Key Distinguisher of 9-Round {AES-128}}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {183--203}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_11}, doi = {10.1007/978-3-642-40041-4\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FouqueJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FranklinGOS13, author = {Matthew K. Franklin and Ran Gelles and Rafail Ostrovsky and Leonard J. Schulman}, editor = {Ran Canetti and Juan A. Garay}, title = {Optimal Coding for Streaming Authentication and Interactive Communication}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {258--276}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_15}, doi = {10.1007/978-3-642-40084-1\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FranklinGOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FreireHPS13, author = {Eduarda S. V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks}, editor = {Ran Canetti and Juan A. Garay}, title = {Programmable Hash Functions in the Multilinear Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {513--530}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_28}, doi = {10.1007/978-3-642-40041-4\_28}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FreireHPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargGHSW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {479--499}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_27}, doi = {10.1007/978-3-642-40084-1\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargGHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Gazi13, author = {Peter Gazi}, editor = {Ran Canetti and Juan A. Garay}, title = {Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {551--570}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_30}, doi = {10.1007/978-3-642-40041-4\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Gazi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentrySW13, author = {Craig Gentry and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {75--92}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_5}, doi = {10.1007/978-3-642-40041-4\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentrySW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserKPVZ13, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, editor = {Ran Canetti and Juan A. Garay}, title = {How to Run Turing Machines on Encrypted Data}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {536--553}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_30}, doi = {10.1007/978-3-642-40084-1\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserKPVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GologluGMZ13, author = {Faruk G{\"{o}}loglu and Robert Granger and Gary McGuire and Jens Zumbr{\"{a}}gel}, editor = {Ran Canetti and Juan A. Garay}, title = {On the Function Field Sieve and the Impact of Higher Splitting Probabilities - Application to Discrete Logarithms in and}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {109--128}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_7}, doi = {10.1007/978-3-642-40084-1\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GologluGMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalG013, author = {Vipul Goyal and Divya Gupta and Abhishek Jain}, editor = {Ran Canetti and Juan A. Garay}, title = {What Information Is Leaked under Concurrent Composition?}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {220--238}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_13}, doi = {10.1007/978-3-642-40084-1\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalG013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalMPS13, author = {Vipul Goyal and Ilya Mironov and Omkant Pandey and Amit Sahai}, editor = {Ran Canetti and Juan A. Garay}, title = {Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {298--315}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_17}, doi = {10.1007/978-3-642-40041-4\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalMPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtML13, author = {Martin Hirt and Christoph Lucas and Ueli Maurer}, editor = {Ran Canetti and Juan A. Garay}, title = {A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {203--219}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_12}, doi = {10.1007/978-3-642-40084-1\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirtML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtML13a, author = {Martin Hirt and Christoph Lucas and Ueli Maurer}, editor = {Ran Canetti and Juan A. Garay}, title = {Erratum: {A} Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_31}, doi = {10.1007/978-3-642-40084-1\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirtML13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HohenbergerSW13, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {494--512}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_27}, doi = {10.1007/978-3-642-40041-4\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HohenbergerSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HuangKE13, author = {Yan Huang and Jonathan Katz and David Evans}, editor = {Ran Canetti and Juan A. Garay}, title = {Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {18--35}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_2}, doi = {10.1007/978-3-642-40084-1\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HuangKE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HubacekNR13, author = {Pavel Hub{\'{a}}cek and Jesper Buus Nielsen and Alon Rosen}, editor = {Ran Canetti and Juan A. Garay}, title = {Limits on the Power of Cryptographic Cheap Talk}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {277--297}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_16}, doi = {10.1007/978-3-642-40041-4\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HubacekNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiltzPS13, author = {Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy}, editor = {Ran Canetti and Juan A. Garay}, title = {Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {571--588}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_31}, doi = {10.1007/978-3-642-40041-4\_31}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiltzPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KolesnikovK13, author = {Vladimir Kolesnikov and Ranjit Kumaresan}, editor = {Ran Canetti and Juan A. Garay}, title = {Improved {OT} Extension for Transferring Short Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {54--70}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_4}, doi = {10.1007/978-3-642-40084-1\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KolesnikovK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KrawczykPW13, author = {Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee}, editor = {Ran Canetti and Juan A. Garay}, title = {On the Security of the {TLS} Protocol: {A} Systematic Analysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {429--448}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_24}, doi = {10.1007/978-3-642-40041-4\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KrawczykPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Leurent13, author = {Ga{\"{e}}tan Leurent}, editor = {Ran Canetti and Juan A. Garay}, title = {Construction of Differential Characteristics in {ARX} Designs Application to Skein}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {241--258}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_14}, doi = {10.1007/978-3-642-40041-4\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Leurent13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPJY13, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Ran Canetti and Juan A. Garay}, title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {289--307}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_17}, doi = {10.1007/978-3-642-40084-1\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPJY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Lindell13, author = {Yehuda Lindell}, editor = {Ran Canetti and Juan A. Garay}, title = {Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {1--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_1}, doi = {10.1007/978-3-642-40084-1\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Lindell13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LyubashevskyM13, author = {Vadim Lyubashevsky and Daniel Masny}, editor = {Ran Canetti and Juan A. Garay}, title = {Man-in-the-Middle Secure Authentication Schemes from {LPN} and Weak PRFs}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {308--325}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_18}, doi = {10.1007/978-3-642-40084-1\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LyubashevskyM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicciancioP13, author = {Daniele Micciancio and Chris Peikert}, editor = {Ran Canetti and Juan A. Garay}, title = {Hardness of {SIS} and {LWE} with Small Parameters}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {21--39}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_2}, doi = {10.1007/978-3-642-40041-4\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/MicciancioP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MohasselR13, author = {Payman Mohassel and Ben Riva}, editor = {Ran Canetti and Juan A. Garay}, title = {Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {36--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_3}, doi = {10.1007/978-3-642-40084-1\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MohasselR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MolleviPY13, author = {Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Carles Padr{\'{o}} and An Yang}, editor = {Ran Canetti and Juan A. Garay}, title = {Secret Sharing, Rank Inequalities and Information Inequalities}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {277--288}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_16}, doi = {10.1007/978-3-642-40084-1\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MolleviPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RistenpartY13, author = {Thomas Ristenpart and Scott Yilek}, editor = {Ran Canetti and Juan A. Garay}, title = {The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against {N} Queries}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {392--409}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_22}, doi = {10.1007/978-3-642-40041-4\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RistenpartY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/StandaertPY13, author = {Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Yu Yu}, editor = {Ran Canetti and Juan A. Garay}, title = {Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {335--352}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_19}, doi = {10.1007/978-3-642-40041-4\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/StandaertPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Stevens13, author = {Marc Stevens}, editor = {Ran Canetti and Juan A. Garay}, title = {Counter-Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {129--146}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_8}, doi = {10.1007/978-3-642-40041-4\_8}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Stevens13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/StrobelDKLOSP13, author = {Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David F. Oswald and Falk Schellenberg and Christof Paar}, editor = {Ran Canetti and Juan A. Garay}, title = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {147--164}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_9}, doi = {10.1007/978-3-642-40041-4\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/StrobelDKLOSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Thaler13, author = {Justin Thaler}, editor = {Ran Canetti and Juan A. Garay}, title = {Time-Optimal Interactive Proofs for Circuit Evaluation}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {71--89}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_5}, doi = {10.1007/978-3-642-40084-1\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Thaler13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Unruh13, author = {Dominique Unruh}, editor = {Ran Canetti and Juan A. Garay}, title = {Everlasting Multi-party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {380--397}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_22}, doi = {10.1007/978-3-642-40084-1\_22}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Unruh13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/VadhanZ13, author = {Salil P. Vadhan and Colin Jia Zheng}, editor = {Ran Canetti and Juan A. Garay}, title = {A Uniform Min-Max Theorem with Applications in Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {93--110}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_6}, doi = {10.1007/978-3-642-40041-4\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/VadhanZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2013-1, editor = {Ran Canetti and Juan A. Garay}, title = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4}, doi = {10.1007/978-3-642-40041-4}, isbn = {978-3-642-40040-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2013-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2013-2, editor = {Ran Canetti and Juan A. Garay}, title = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1}, doi = {10.1007/978-3-642-40084-1}, isbn = {978-3-642-40083-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2013-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdelraheemABL12, author = {Mohamed Ahmed Abdelraheem and Martin {\AA}gren and Peter Beelen and Gregor Leander}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {On the Distribution of Linear Biases: Three Instructive Examples}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {50--67}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_4}, doi = {10.1007/978-3-642-32009-5\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbdelraheemABL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGJPS12, author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {443--460}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_26}, doi = {10.1007/978-3-642-32009-5\_26}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGJPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenKMZ12, author = {Jo{\"{e}}l Alwen and Jonathan Katz and Ueli Maurer and Vassilis Zikas}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Collusion-Preserving Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {124--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_9}, doi = {10.1007/978-3-642-32009-5\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenKMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BardouFKSST12, author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe{-}Kai Tsay}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Efficient Padding Oracle Attacks on Cryptographic Hardware}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {608--625}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_36}, doi = {10.1007/978-3-642-32009-5\_36}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BardouFKSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BayMV12, author = {Asl{\'{\i}} Bay and Atefeh Mashatan and Serge Vaudenay}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Resistance against Iterated Attacks by Decorrelation Revisited,}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {741--757}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_43}, doi = {10.1007/978-3-642-32009-5\_43}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BayMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeimelFM12, author = {Amos Beimel and Oriol Farr{\`{a}}s and Yuval Mintz}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Secret Sharing Schemes for Very Dense Graphs}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {144--161}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_10}, doi = {10.1007/978-3-642-32009-5\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BeimelFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareRT12, author = {Mihir Bellare and Thomas Ristenpart and Stefano Tessaro}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Multi-instance Security and Its Application to Password-Based Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {312--329}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_19}, doi = {10.1007/978-3-642-32009-5\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareTV12, author = {Mihir Bellare and Stefano Tessaro and Alexander Vardy}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Semantic Security for the Wiretap Channel}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {294--311}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_18}, doi = {10.1007/978-3-642-32009-5\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BellareTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-SassonFO12, author = {Eli Ben{-}Sasson and Serge Fehr and Rafail Ostrovsky}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {663--680}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_39}, doi = {10.1007/978-3-642-32009-5\_39}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-SassonFO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BertaFW12, author = {Mario Berta and Omar Fawzi and Stephanie Wehner}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Quantum to Classical Randomness Extractors}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {776--793}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_45}, doi = {10.1007/978-3-642-32009-5\_45}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BertaFW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyC12, author = {Nir Bitansky and Alessandro Chiesa}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {255--272}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_16}, doi = {10.1007/978-3-642-32009-5\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Brakerski12, author = {Zvika Brakerski}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {868--886}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_50}, doi = {10.1007/978-3-642-32009-5\_50}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Brakerski12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Brickell12, author = {Ernie Brickell}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Recent Advances and Existing Research Questions in Platform Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {570}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_33}, doi = {10.1007/978-3-642-32009-5\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Brickell12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaseV12, author = {Melissa Chase and Ivan Visconti}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Secure Database Commitments and Universal Arguments of Quasi Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {236--254}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_15}, doi = {10.1007/978-3-642-32009-5\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaseV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledK12, author = {Dana Dachman{-}Soled and Yael Tauman Kalai}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Securing Circuits against Constant-Rate Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {533--551}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_31}, doi = {10.1007/978-3-642-32009-5\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardPSZ12, author = {Ivan Damg{\aa}rd and Valerio Pastro and Nigel P. Smart and Sarah Zakarias}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Multiparty Computation from Somewhat Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {643--662}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_38}, doi = {10.1007/978-3-642-32009-5\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardPSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurDKS12, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {719--740}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_42}, doi = {10.1007/978-3-642-32009-5\_42}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurDKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisLMV12, author = {Yevgeniy Dodis and Adriana L{\'{o}}pez{-}Alt and Ilya Mironov and Salil P. Vadhan}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Differential Privacy with Imperfect Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {497--516}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_29}, doi = {10.1007/978-3-642-32009-5\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DodisLMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisRST12, author = {Yevgeniy Dodis and Thomas Ristenpart and John P. Steinberger and Stefano Tessaro}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {To Hash or Not to Hash Again? (In)Differentiability Results for {H} 2 and {HMAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {348--366}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_21}, doi = {10.1007/978-3-642-32009-5\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisRST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DucJ12, author = {Alexandre Duc and Dimitar Jetchev}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {832--849}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_48}, doi = {10.1007/978-3-642-32009-5\_48}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DucJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DupuisNS12, author = {Fr{\'{e}}d{\'{e}}ric Dupuis and Jesper Buus Nielsen and Louis Salvail}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Actively Secure Two-Party Evaluation of Any Quantum Operation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {794--811}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_46}, doi = {10.1007/978-3-642-32009-5\_46}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DupuisNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargKOV12, author = {Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Impossibility Results for Static Input Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {424--442}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_25}, doi = {10.1007/978-3-642-32009-5\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargKOV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargS12, author = {Sanjam Garg and Amit Sahai}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Adaptively Secure Multi-Party Computation with Dishonest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {105--123}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_8}, doi = {10.1007/978-3-642-32009-5\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GehrkeHLP12, author = {Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Crowd-Blending Privacy}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {479--496}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_28}, doi = {10.1007/978-3-642-32009-5\_28}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GehrkeHLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Homomorphic Evaluation of the {AES} Circuit}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {850--867}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_49}, doi = {10.1007/978-3-642-32009-5\_49}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GorbunovVW12, author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Functional Encryption with Bounded Collusions via Multi-party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {162--179}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_11}, doi = {10.1007/978-3-642-32009-5\_11}, timestamp = {Mon, 29 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GorbunovVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HanaokaMS12, author = {Goichiro Hanaoka and Takahiro Matsuda and Jacob C. N. Schuldt}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {812--831}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_47}, doi = {10.1007/978-3-642-32009-5\_47}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HanaokaMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangMR12, author = {Viet Tung Hoang and Ben Morris and Phillip Rogaway}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {An Enciphering Scheme Based on a Card Shuffle}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {1--13}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_1}, doi = {10.1007/978-3-642-32009-5\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HofheinzJ12, author = {Dennis Hofheinz and Tibor Jager}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Tightly Secure Signatures and Public-Key Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {590--607}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_35}, doi = {10.1007/978-3-642-32009-5\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HofheinzJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IwataOM12, author = {Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Breaking and Repairing {GCM} Security Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {31--49}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_3}, doi = {10.1007/978-3-642-32009-5\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/IwataOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JagerKSS12, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {On the Security of {TLS-DHE} in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {273--293}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_17}, doi = {10.1007/978-3-642-32009-5\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/JagerKSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KnellwolfK12, author = {Simon Knellwolf and Dmitry Khovratovich}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {New Preimage Attacks against Reduced {SHA-1}}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {367--383}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_22}, doi = {10.1007/978-3-642-32009-5\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KnellwolfK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LandeckerST12, author = {Will Landecker and Thomas Shrimpton and R. Seth Terashima}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Tweakable Blockciphers with Beyond Birthday-Bound Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {14--30}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_2}, doi = {10.1007/978-3-642-32009-5\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LandeckerST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LenstraHABKW12, author = {Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Public Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {626--642}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_37}, doi = {10.1007/978-3-642-32009-5\_37}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LenstraHABKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LewkoW12, author = {Allison B. Lewko and Brent Waters}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {180--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_12}, doi = {10.1007/978-3-642-32009-5\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LewkoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Group Signatures with Almost-for-Free Revocation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {571--589}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_34}, doi = {10.1007/978-3-642-32009-5\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinP12, author = {Huijia Lin and Rafael Pass}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Black-Box Constructions of Composable Protocols without Set-Up}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {461--478}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_27}, doi = {10.1007/978-3-642-32009-5\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LiuL12, author = {Feng{-}Hao Liu and Anna Lysyanskaya}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Tamper and Leakage Resilience in the Split-State Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {517--532}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_30}, doi = {10.1007/978-3-642-32009-5\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LiuL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MahmoodyP12, author = {Mohammad Mahmoody and Rafael Pass}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {701--718}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_41}, doi = {10.1007/978-3-642-32009-5\_41}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MahmoodyP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MenninkP12, author = {Bart Mennink and Bart Preneel}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Hash Functions Based on Three Permutations: {A} Generic Security Analysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {330--347}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_20}, doi = {10.1007/978-3-642-32009-5\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MenninkP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MilesV12, author = {Eric Miles and Emanuele Viola}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {68--85}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_5}, doi = {10.1007/978-3-642-32009-5\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MilesV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NielsenNOB12, author = {Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Sai Sheshank Burra}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {A New Approach to Practical Active-Secure Two-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {681--700}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_40}, doi = {10.1007/978-3-642-32009-5\_40}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/NielsenNOB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rosulek12, author = {Mike Rosulek}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Must You Know the Code of f to Securely Compute f?}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {87--104}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_7}, doi = {10.1007/978-3-642-32009-5\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rosulek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rosulek12a, author = {Mike Rosulek}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Universal Composability from Essentially Any Trusted Setup}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {406--423}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_24}, doi = {10.1007/978-3-642-32009-5\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rosulek12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rothblum12, author = {Guy N. Rothblum}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {How to Compute under {\textdollar}\{{\textbackslash}cal\{AC\}\}\{{\textbackslash}sf0\}{\textdollar} Leakage without Secure Hardware}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {552--569}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_32}, doi = {10.1007/978-3-642-32009-5\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rothblum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SahaiSW12, author = {Amit Sahai and Hakan Seyalioglu and Brent Waters}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {199--217}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_13}, doi = {10.1007/978-3-642-32009-5\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SahaiSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SteinbergerSY12, author = {John P. Steinberger and Xiaoming Sun and Zhe Yang}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Stam's Conjecture and Threshold Phenomena in Collision Resistance}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {384--405}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_23}, doi = {10.1007/978-3-642-32009-5\_23}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SteinbergerSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Waters12, author = {Brent Waters}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Functional Encryption for Regular Languages}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {218--235}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_14}, doi = {10.1007/978-3-642-32009-5\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Waters12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zhandry12, author = {Mark Zhandry}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Secure Identity-Based Encryption in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {758--775}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_44}, doi = {10.1007/978-3-642-32009-5\_44}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zhandry12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Zittrain12, author = {Jonathan Zittrain}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {The End of Crypto}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {86}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_6}, doi = {10.1007/978-3-642-32009-5\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Zittrain12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2012, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5}, doi = {10.1007/978-3-642-32009-5}, isbn = {978-3-642-32008-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeGHO11, author = {Masayuki Abe and Jens Groth and Kristiyan Haralambiev and Miyako Ohkubo}, editor = {Phillip Rogaway}, title = {Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {649--666}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_37}, doi = {10.1007/978-3-642-22792-9\_37}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbeGHO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AsharovLR11, author = {Gilad Asharov and Yehuda Lindell and Tal Rabin}, editor = {Phillip Rogaway}, title = {Perfectly-Secure Multiplication for Any \emph{t {\textless} n}/3}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {240--258}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_14}, doi = {10.1007/978-3-642-22792-9\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AsharovLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BaecherF11, author = {Paul Baecher and Marc Fischlin}, editor = {Phillip Rogaway}, title = {Random Oracle Reducibility}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {21--38}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_2}, doi = {10.1007/978-3-642-22792-9\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BaecherF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, editor = {Phillip Rogaway}, title = {Leftover Hash Lemma, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {1--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_1}, doi = {10.1007/978-3-642-22792-9\_1}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BarakDKPPSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartheGHB11, author = {Gilles Barthe and Benjamin Gr{\'{e}}goire and Sylvain Heraud and Santiago Zanella B{\'{e}}guelin}, editor = {Phillip Rogaway}, title = {Computer-Aided Security Proofs for the Working Cryptographer}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {71--90}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_5}, doi = {10.1007/978-3-642-22792-9\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartheGHB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.