![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "stream:conf/eurocrypt:"
more than 1000 matches, exporting first 1000 hits only!
@inproceedings{DBLP:conf/eurocrypt/AbrahamAPP24, author = {Ittai Abraham and Gilad Asharov and Shravani Patil and Arpita Patra}, editor = {Marc Joye and Gregor Leander}, title = {Perfect Asynchronous {MPC} with Linear Communication Overhead}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {280--309}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_10}, doi = {10.1007/978-3-031-58740-5\_10}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbrahamAPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbramDIN24, author = {Damiano Abram and Jack Doerner and Yuval Ishai and Varun Narayanan}, editor = {Marc Joye and Gregor Leander}, title = {Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {122--154}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_5}, doi = {10.1007/978-3-031-58740-5\_5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbramDIN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbramRS24, author = {Damiano Abram and Lawrence Roy and Peter Scholl}, editor = {Marc Joye and Gregor Leander}, title = {Succinct Homomorphic Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {301--330}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_11}, doi = {10.1007/978-3-031-58751-1\_11}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbramRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AhmadianKMMN24, author = {Zahra Ahmadian and Akram Khalesi and Dounia M'foukh and Hossein Moghimi and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Marc Joye and Gregor Leander}, title = {Improved Differential Meet-in-the-Middle Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {280--309}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_10}, doi = {10.1007/978-3-031-58716-0\_10}, timestamp = {Thu, 09 May 2024 11:05:29 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AhmadianKMMN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlagicBKMS24, author = {Gorjan Alagic and Chen Bai and Jonathan Katz and Christian Majenz and Patrick Struck}, editor = {Marc Joye and Gregor Leander}, title = {Post-quantum Security of Tweakable Even-Mansour, and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {310--338}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_11}, doi = {10.1007/978-3-031-58716-0\_11}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlagicBKMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtDDG24, author = {Martin R. Albrecht and Alex Davidson and Amit Deo and Daniel Gardham}, editor = {Marc Joye and Gregor Leander}, title = {Crypto Dark Matter on the Torus - Oblivious PRFs from Shallow PRFs and {TFHE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {447--476}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_16}, doi = {10.1007/978-3-031-58751-1\_16}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtDDG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtFLN24, author = {Martin R. Albrecht and Giacomo Fenzi and Oleksandra Lapiha and Ngoc Khanh Nguyen}, editor = {Marc Joye and Gregor Leander}, title = {{SLAP:} Succinct Lattice-Based Polynomial Commitments from Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {90--119}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_4}, doi = {10.1007/978-3-031-58754-2\_4}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtFLN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlonOV24, author = {Bar Alon and Eran Omri and Muthuramakrishnan Venkitasubramaniam}, editor = {Marc Joye and Gregor Leander}, title = {Can Alice and Bob Guarantee Output to Carol?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {32--61}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_2}, doi = {10.1007/978-3-031-58740-5\_2}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlonOV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenFM24, author = {Jo{\"{e}}l Alwen and Georg Fuchsbauer and Marta Mularczyk}, editor = {Marc Joye and Gregor Leander}, title = {Updatable Public-Key Encryption, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {346--376}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_13}, doi = {10.1007/978-3-031-58754-2\_13}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthGKL24, author = {Prabhanjan Ananth and Aditya Gulati and Fatih Kaleoglu and Yao{-}Ting Lin}, editor = {Marc Joye and Gregor Leander}, title = {Pseudorandom Isometries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {226--254}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_9}, doi = {10.1007/978-3-031-58737-5\_9}, timestamp = {Thu, 09 May 2024 11:05:30 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthGKL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ArunST24, author = {Arasu Arun and Srinath T. V. Setty and Justin Thaler}, editor = {Marc Joye and Gregor Leander}, title = {Jolt: SNARKs for Virtual Machines via Lookups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {3--33}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_1}, doi = {10.1007/978-3-031-58751-1\_1}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ArunST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AsharovC24, author = {Gilad Asharov and Anirudh Chandramouli}, editor = {Marc Joye and Gregor Leander}, title = {Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical {VSS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {310--339}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_11}, doi = {10.1007/978-3-031-58740-5\_11}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AsharovC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AuerbachGP24, author = {Benedikt Auerbach and Christoph U. G{\"{u}}nther and Krzysztof Pietrzak}, editor = {Marc Joye and Gregor Leander}, title = {Trapdoor Memory-Hard Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {315--344}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_11}, doi = {10.1007/978-3-031-58734-4\_11}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AuerbachGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaarsenP24, author = {Aron van Baarsen and Sihang Pu}, editor = {Marc Joye and Gregor Leander}, title = {Fuzzy Private Set Intersection with Large Hyperballs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {340--369}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_12}, doi = {10.1007/978-3-031-58740-5\_12}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaarsenP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BachoLTWZ24, author = {Renas Bacho and Julian Loss and Stefano Tessaro and Benedikt Wagner and Chenzhi Zhu}, editor = {Marc Joye and Gregor Leander}, title = {Twinkle: Threshold Signatures from {DDH} with Full Adaptive Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {429--459}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_15}, doi = {10.1007/978-3-031-58716-0\_15}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BachoLTWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaeCKS24, author = {Youngjin Bae and Jung Hee Cheon and Jaehyung Kim and Damien Stehl{\'{e}}}, editor = {Marc Joye and Gregor Leander}, title = {Bootstrapping Bits with {CKKS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {94--123}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_4}, doi = {10.1007/978-3-031-58723-8\_4}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaeCKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallSS24, author = {Marshall Ball and Ronen Shaltiel and Jad Silbak}, editor = {Marc Joye and Gregor Leander}, title = {Non-malleable Codes with Optimal Rate for Poly-Size Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {33--54}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_2}, doi = {10.1007/978-3-031-58737-5\_2}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BanfiGHMR24, author = {Fabio Banfi and Konstantin Gegier and Martin Hirt and Ueli Maurer and Guilherme Rito}, editor = {Marc Joye and Gregor Leander}, title = {Anamorphic Encryption, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {3--32}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_1}, doi = {10.1007/978-3-031-58723-8\_1}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BanfiGHMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartusekGKMRR24, author = {James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta and Justin Raizes and Bhaskar Roberts}, editor = {Marc Joye and Gregor Leander}, title = {Software with Certified Deletion}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {85--111}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_4}, doi = {10.1007/978-3-031-58737-5\_4}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartusekGKMRR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BenDavid24, author = {Shany Ben{-}David}, editor = {Marc Joye and Gregor Leander}, title = {Probabilistically Checkable Arguments for All {NP}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {345--374}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_12}, doi = {10.1007/978-3-031-58734-4\_12}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BenDavid24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BenhamoudaHKMR24, author = {Fabrice Benhamouda and Shai Halevi and Hugo Krawczyk and Yiping Ma and Tal Rabin}, editor = {Marc Joye and Gregor Leander}, title = {{SPRINT:} High-Throughput Robust Distributed Schnorr Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {62--91}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_3}, doi = {10.1007/978-3-031-58740-5\_3}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BenhamoudaHKMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bergamaschi24, author = {Thiago Bergamaschi}, editor = {Marc Joye and Gregor Leander}, title = {Pauli Manipulation Detection Codes and Applications to Quantum Communication over Adversarial Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {404--433}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_14}, doi = {10.1007/978-3-031-58734-4\_14}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bergamaschi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BouraDDBN24, author = {Christina Boura and Nicolas David and Patrick Derbez and Rachelle Heim Boissier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Marc Joye and Gregor Leander}, title = {A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {217--248}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_8}, doi = {10.1007/978-3-031-58716-0\_8}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BouraDDBN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrancoDS24, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan}, editor = {Marc Joye and Gregor Leander}, title = {Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {271--300}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_10}, doi = {10.1007/978-3-031-58751-1\_10}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrancoDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrianDF24, author = {Gianluca Brian and Stefan Dziembowski and Sebastian Faust}, editor = {Marc Joye and Gregor Leander}, title = {From Random Probing to Noisy Leakages Without Field-Size Dependence}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {345--374}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_13}, doi = {10.1007/978-3-031-58737-5\_13}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrianDF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BriaudBPS24, author = {Pierre Briaud and Maxime Bros and Ray A. Perlner and Daniel Smith{-}Tone}, editor = {Marc Joye and Gregor Leander}, title = {Practical Attack on All Parameters of the {DME} Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {3--29}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_1}, doi = {10.1007/978-3-031-58754-2\_1}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BriaudBPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrodskyCJP24, author = {Maya Farber Brodsky and Arka Rai Choudhuri and Abhishek Jain and Omer Paneth}, editor = {Marc Joye and Gregor Leander}, title = {Monotone-Policy Aggregate Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {168--195}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_7}, doi = {10.1007/978-3-031-58737-5\_7}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrodskyCJP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BuiCMPR24, author = {Dung Bui and Geoffroy Couteau and Pierre Meyer and Alain Passel{\`{e}}gue and Mahshid Riahinia}, editor = {Marc Joye and Gregor Leander}, title = {Fast Public-Key Silent {OT} and More from Constrained Naor-Reingold}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {88--118}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_4}, doi = {10.1007/978-3-031-58751-1\_4}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BuiCMPR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanalesMartinezCHRSS24, author = {Isaac A. Canales{-}Mart{\'{\i}}nez and Jorge Ch{\'{a}}vez{-}Saab and Anna Hambitzer and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Nitin Satpute and Adi Shamir}, editor = {Marc Joye and Gregor Leander}, title = {Polynomial Time Cryptanalytic Extraction of Neural Network Models}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {3--33}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_1}, doi = {10.1007/978-3-031-58734-4\_1}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanalesMartinezCHRSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CarrierDMT24, author = {K{\'{e}}vin Carrier and Thomas Debris{-}Alazard and Charles Meyer{-}Hilfiger and Jean{-}Pierre Tillich}, editor = {Marc Joye and Gregor Leander}, title = {Reduction from Sparse {LPN} to LPN, Dual Attack 3.0}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {286--315}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_11}, doi = {10.1007/978-3-031-58754-2\_11}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CarrierDMT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CascudoD24, author = {Ignacio Cascudo and Bernardo David}, editor = {Marc Joye and Gregor Leander}, title = {Publicly Verifiable Secret Sharing Over Class Groups and Applications to {DKG} and {YOSO}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {216--248}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_8}, doi = {10.1007/978-3-031-58740-5\_8}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CascudoD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoGM24, author = {Dario Catalano and Emanuele Giunta and Francesco Migliaro}, editor = {Marc Joye and Gregor Leander}, title = {Anamorphic Encryption: New Constructions and Homomorphic Realizations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {33--62}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_2}, doi = {10.1007/978-3-031-58723-8\_2}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoGM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaidosKRZ24, author = {Pyrros Chaidos and Aggelos Kiayias and Leonid Reyzin and Anatoliy Zinovyev}, editor = {Marc Joye and Gregor Leander}, title = {Approximate Lower Bound Arguments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {55--84}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_3}, doi = {10.1007/978-3-031-58737-5\_3}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaidosKRZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenF24, author = {Shan Chen and Marc Fischlin}, editor = {Marc Joye and Gregor Leander}, title = {Integrating Causality in Messaging Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {251--282}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_9}, doi = {10.1007/978-3-031-58734-4\_9}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenGLSZ24, author = {Shiyao Chen and Jian Guo and Eik List and Danping Shi and Tianyu Zhang}, editor = {Marc Joye and Gregor Leander}, title = {Diving Deep into the Preimage Security of AES-Like Hashing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {398--426}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_14}, doi = {10.1007/978-3-031-58716-0\_14}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenGLSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChungHTZ24, author = {Kai{-}Min Chung and Mi{-}Ying (Miryam) Huang and Er{-}Cheng Tang and Jiapeng Zhang}, editor = {Marc Joye and Gregor Leander}, title = {Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {119--148}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_5}, doi = {10.1007/978-3-031-58751-1\_5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChungHTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CremersLW24, author = {Cas Cremers and Julian Loss and Benedikt Wagner}, editor = {Marc Joye and Gregor Leander}, title = {A Holistic Security Analysis of Monero Transactions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {129--159}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_5}, doi = {10.1007/978-3-031-58734-4\_5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CremersLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DartoisLRW24, author = {Pierrick Dartois and Antonin Leroux and Damien Robert and Benjamin Wesolowski}, editor = {Marc Joye and Gregor Leander}, title = {SQIsignHD: New Dimensions in Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {3--32}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_1}, doi = {10.1007/978-3-031-58716-0\_1}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DartoisLRW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DasJ24, author = {Dipayan Das and Antoine Joux}, editor = {Marc Joye and Gregor Leander}, title = {Key Recovery Attack on the Partial Vandermonde Knapsack Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {205--225}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_8}, doi = {10.1007/978-3-031-58754-2\_8}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DasJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DeligiosE24, author = {Giovanni Deligios and Mose Mizrahi Erbes}, editor = {Marc Joye and Gregor Leander}, title = {Closing the Efficiency Gap Between Synchronous and Network-Agnostic Consensus}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {432--461}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_15}, doi = {10.1007/978-3-031-58740-5\_15}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DeligiosE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dinur24, author = {Itai Dinur}, editor = {Marc Joye and Gregor Leander}, title = {Tight Indistinguishability Bounds for the {XOR} of Independent Random Permutations by Fourier Analysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {33--62}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_2}, doi = {10.1007/978-3-031-58716-0\_2}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dinur24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DoHP24, author = {Khue Do and Lucjan Hanzlik and Eugenio Paracucchi}, editor = {Marc Joye and Gregor Leander}, title = {M{\&}M'S: Mix and Match Attacks on Schnorr-Type Blind Signatures with Repetition}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {363--387}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_13}, doi = {10.1007/978-3-031-58751-1\_13}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DoHP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DongHMW24, author = {Fangqi Dong and Zihan Hao and Ethan Mook and Daniel Wichs}, editor = {Marc Joye and Gregor Leander}, title = {Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {190--218}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_7}, doi = {10.1007/978-3-031-58723-8\_7}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DongHMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucasEEK24, author = {L{\'{e}}o Ducas and Andre Esser and Simona Etinski and Elena Kirshanova}, editor = {Marc Joye and Gregor Leander}, title = {Asymptotics and Improvements of Sieving for Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {151--180}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_6}, doi = {10.1007/978-3-031-58754-2\_6}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucasEEK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DujmovicGM24, author = {Jesko Dujmovic and Rachit Garg and Giulio Malavolta}, editor = {Marc Joye and Gregor Leander}, title = {Time-Lock Puzzles with Efficient Batch Solving}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {311--341}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_11}, doi = {10.1007/978-3-031-58723-8\_11}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DujmovicGM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DujmovicH24, author = {Jesko Dujmovic and Mohammad Hajiabadi}, editor = {Marc Joye and Gregor Leander}, title = {Lower-Bounds on Public-Key Operations in {PIR}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {65--87}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_3}, doi = {10.1007/978-3-031-58751-1\_3}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DujmovicH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DunkelmanGKLMM24, author = {Orr Dunkelman and Shibam Ghosh and Nathan Keller and Ga{\"{e}}tan Leurent and Avichai Marmor and Victor Mollimard}, editor = {Marc Joye and Gregor Leander}, title = {Partial Sums Meet {FFT:} Improved Attack on 6-Round {AES}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {128--157}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_5}, doi = {10.1007/978-3-031-58716-0\_5}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DunkelmanGKLMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EagenKRN24, author = {Liam Eagen and Sanket Kanjalkar and Tim Ruffing and Jonas Nick}, editor = {Marc Joye and Gregor Leander}, title = {Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {249--279}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_9}, doi = {10.1007/978-3-031-58740-5\_9}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EagenKRN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EriguchiKN24, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, editor = {Marc Joye and Gregor Leander}, title = {Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {92--121}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_4}, doi = {10.1007/978-3-031-58740-5\_4}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EriguchiKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EsginENPSS24, author = {Muhammed F. Esgin and Thomas Espitau and Guilhem Niot and Thomas Prest and Amin Sakzad and Ron Steinfeld}, editor = {Marc Joye and Gregor Leander}, title = {Plover: Masking-Friendly Hash-and-Sign Lattice Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {316--345}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_12}, doi = {10.1007/978-3-031-58754-2\_12}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EsginENPSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustMMOS24, author = {Sebastian Faust and Lo{\"{\i}}c Masure and Elena Micheli and Maximilian Orlt and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Joye and Gregor Leander}, title = {Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {316--344}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_12}, doi = {10.1007/978-3-031-58737-5\_12}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustMMOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FeoFP24, author = {Luca De Feo and Tako Boris Fouotsa and Lorenz Panny}, editor = {Marc Joye and Gregor Leander}, title = {Isogeny Problems with Level Structure}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {181--204}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_7}, doi = {10.1007/978-3-031-58754-2\_7}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FeoFP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FlorezGutierrezT24, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Yosuke Todo}, editor = {Marc Joye and Gregor Leander}, title = {Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {187--216}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_7}, doi = {10.1007/978-3-031-58716-0\_7}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FlorezGutierrezT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FreitagPP24, author = {Cody Freitag and Omer Paneth and Rafael Pass}, editor = {Marc Joye and Gregor Leander}, title = {Public-Coin, Complexity-Preserving, Succinct Arguments of Knowledge for {NP} from Collision-Resistance}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {112--141}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_5}, doi = {10.1007/978-3-031-58737-5\_5}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FreitagPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FuchsbauerW24, author = {Georg Fuchsbauer and Mathias Wolf}, editor = {Marc Joye and Gregor Leander}, title = {Concurrently Secure Blind Schnorr Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {124--160}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_5}, doi = {10.1007/978-3-031-58723-8\_5}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FuchsbauerW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaoO24, author = {Si Gao and Elisabeth Oswald}, editor = {Marc Joye and Gregor Leander}, title = {A Novel Framework for Explainable Leakage Assessment}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {221--250}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_8}, doi = {10.1007/978-3-031-58734-4\_8}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaoO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayKS24, author = {Juan A. Garay and Aggelos Kiayias and Yu Shen}, editor = {Marc Joye and Gregor Leander}, title = {Proof-of-Work-Based Consensus in Expected-Constant Time}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {96--125}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_4}, doi = {10.1007/978-3-031-58734-4\_4}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GerhartSST24, author = {Paul Gerhart and Dominique Schr{\"{o}}der and Pratik Soni and Sri Aravinda Krishnan Thyagarajan}, editor = {Marc Joye and Gregor Leander}, title = {Foundations of Adaptor Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {161--189}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_6}, doi = {10.1007/978-3-031-58723-8\_6}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GerhartSST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GhoshalZS24, author = {Ashrujit Ghoshal and Mingxun Zhou and Elaine Shi}, editor = {Marc Joye and Gregor Leander}, title = {Efficient Pre-processing {PIR} Without Public-Key Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {210--240}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_8}, doi = {10.1007/978-3-031-58751-1\_8}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GhoshalZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GiuntaS24, author = {Emanuele Giunta and Alistair Stewart}, editor = {Marc Joye and Gregor Leander}, title = {Unbiasable Verifiable Random Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {142--167}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_6}, doi = {10.1007/978-3-031-58737-5\_6}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GiuntaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrassiMMMS24, author = {Lorenzo Grassi and Lo{\"{\i}}c Masure and Pierrick M{\'{e}}aux and Thorben Moos and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Joye and Gregor Leander}, title = {Generalized Feistel Ciphers for Efficient Prime Field Masking}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {188--220}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_7}, doi = {10.1007/978-3-031-58734-4\_7}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrassiMMMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrothS24, author = {Jens Groth and Victor Shoup}, editor = {Marc Joye and Gregor Leander}, title = {Fast Batched Asynchronous Distributed Key Generation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {370--400}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_13}, doi = {10.1007/978-3-031-58740-5\_13}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrothS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HamoudiLS24, author = {Yassine Hamoudi and Qipeng Liu and Makrand Sinha}, editor = {Marc Joye and Gregor Leander}, title = {The {NISQ} Complexity of Collision Finding}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {3--32}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_1}, doi = {10.1007/978-3-031-58737-5\_1}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HamoudiLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HazayY24, author = {Carmit Hazay and Yibin Yang}, editor = {Marc Joye and Gregor Leander}, title = {Toward Malicious Constant-Rate 2PC via Arithmetic Garbling}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {401--431}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_14}, doi = {10.1007/978-3-031-58740-5\_14}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HazayY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HeHLW24, author = {Jiahui He and Kai Hu and Hao Lei and Meiqin Wang}, editor = {Marc Joye and Gregor Leander}, title = {Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {368--397}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_13}, doi = {10.1007/978-3-031-58716-0\_13}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HeHLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Heath24, author = {David Heath}, editor = {Marc Joye and Gregor Leander}, title = {Efficient Arithmetic in Garbled Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {3--31}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_1}, doi = {10.1007/978-3-031-58740-5\_1}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Heath24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HeathKN24, author = {David Heath and Vladimir Kolesnikov and Lucien K. L. Ng}, editor = {Marc Joye and Gregor Leander}, title = {Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {185--215}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_7}, doi = {10.1007/978-3-031-58740-5\_7}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HeathKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HirokaKMNPY24, author = {Taiga Hiroka and Fuyuki Kitagawa and Tomoyuki Morimae and Ryo Nishimaki and Tapas Pal and Takashi Yamakawa}, editor = {Marc Joye and Gregor Leander}, title = {Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {434--456}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_15}, doi = {10.1007/978-3-031-58734-4\_15}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HirokaKMNPY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HsiehLL24, author = {Yao{-}Ching Hsieh and Huijia Lin and Ji Luo}, editor = {Marc Joye and Gregor Leander}, title = {A General Framework for Lattice-Based {ABE} Using Evasive Inner-Product Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {433--464}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_15}, doi = {10.1007/978-3-031-58723-8\_15}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HsiehLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiS24, author = {Yuval Ishai and Yifan Song}, editor = {Marc Joye and Gregor Leander}, title = {Leakage-Tolerant Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {196--225}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_8}, doi = {10.1007/978-3-031-58737-5\_8}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JacksonMW24, author = {Kelsey A. Jackson and Carl A. Miller and Daochen Wang}, editor = {Marc Joye and Gregor Leander}, title = {Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {418--446}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_15}, doi = {10.1007/978-3-031-58751-1\_15}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JacksonMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JaegerKS24, author = {Joseph Jaeger and Akshaya Kumar and Igors Stepanovs}, editor = {Marc Joye and Gregor Leander}, title = {Symmetric Signcryption and {E2EE} Group Messaging in Keybase}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {283--312}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_10}, doi = {10.1007/978-3-031-58734-4\_10}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JaegerKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JhaKNS24, author = {Ashwin Jha and Mustafa Khairallah and Mridul Nandi and Abishanka Saha}, editor = {Marc Joye and Gregor Leander}, title = {Tight Security of {TNT} and Beyond - Attacks, Proofs and Possibilities for the Cascaded {LRW} Paradigm}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {249--279}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_9}, doi = {10.1007/978-3-031-58716-0\_9}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JhaKNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasLS24, author = {Aggelos Kiayias and Nikos Leonardos and Yu Shen}, editor = {Marc Joye and Gregor Leander}, title = {Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {34--63}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_2}, doi = {10.1007/978-3-031-58734-4\_2}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiL24, author = {Hanjun Li and Tianren Liu}, editor = {Marc Joye and Gregor Leander}, title = {How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {331--360}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_12}, doi = {10.1007/978-3-031-58751-1\_12}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiLW24, author = {Yingxin Li and Fukang Liu and Gaoli Wang}, editor = {Marc Joye and Gregor Leander}, title = {New Records in Collision Attacks on {SHA-2}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {158--186}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_6}, doi = {10.1007/978-3-031-58716-0\_6}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LipmaaPS24, author = {Helger Lipmaa and Roberto Parisella and Janno Siim}, editor = {Marc Joye and Gregor Leander}, title = {Constant-Size zk-SNARKs in {ROM} from Falsifiable Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {34--64}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_2}, doi = {10.1007/978-3-031-58751-1\_2}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LipmaaPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuP24, author = {Yanyi Liu and Rafael Pass}, editor = {Marc Joye and Gregor Leander}, title = {A Direct {PRF} Construction from Kolmogorov Complexity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {375--406}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_14}, doi = {10.1007/978-3-031-58737-5\_14}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuWYY24, author = {Hanlin Liu and Xiao Wang and Kang Yang and Yu Yu}, editor = {Marc Joye and Gregor Leander}, title = {The Hardness of {LPN} over Any Integer Ring and Field for {PCG} Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {149--179}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_6}, doi = {10.1007/978-3-031-58751-1\_6}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuWYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuZhangMT24, author = {Chen{-}Da Liu{-}Zhang and Christian Matt and S{\o}ren Eller Thomsen}, editor = {Marc Joye and Gregor Leander}, title = {Asymptotically Optimal Message Dissemination with Applications to Blockchains}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {64--95}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_3}, doi = {10.1007/978-3-031-58734-4\_3}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuZhangMT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LossN24, author = {Julian Loss and Jesper Buus Nielsen}, editor = {Marc Joye and Gregor Leander}, title = {Early Stopping for Any Number of Corruptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {457--488}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_16}, doi = {10.1007/978-3-031-58734-4\_16}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LossN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LouMS24, author = {Paul Lou and Nathan Manohar and Amit Sahai}, editor = {Marc Joye and Gregor Leander}, title = {Witness Semantic Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {155--184}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_6}, doi = {10.1007/978-3-031-58740-5\_6}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LouMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LyuLH24, author = {You Lyu and Shengli Liu and Shuai Han}, editor = {Marc Joye and Gregor Leander}, title = {Universal Composable Password Authenticated Key Exchange for the Post-Quantum World}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {120--150}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_5}, doi = {10.1007/978-3-031-58754-2\_5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LyuLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MaHWW24, author = {Shihe Ma and Tairong Huang and Anyu Wang and Xiaoyun Wang}, editor = {Marc Joye and Gregor Leander}, title = {Accelerating {BGV} Bootstrapping for Large p Using Null Polynomials over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{pe\}{\textdollar}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {403--432}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_14}, doi = {10.1007/978-3-031-58723-8\_14}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MaHWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MajiNPY24, author = {Hemanta K. Maji and Hai H. Nguyen and Anat Paskin{-}Cherniavsky and Xiuyu Ye}, editor = {Marc Joye and Gregor Leander}, title = {Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {286--315}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_11}, doi = {10.1007/978-3-031-58737-5\_11}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MajiNPY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ManulisN24, author = {Mark Manulis and J{\'{e}}r{\^{o}}me Nguyen}, editor = {Marc Joye and Gregor Leander}, title = {Fully Homomorphic Encryption Beyond {IND-CCA1} Security: Integrity Through Verifiability}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {63--93}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_3}, doi = {10.1007/978-3-031-58723-8\_3}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ManulisN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MuNRV24, author = {Changrui Mu and Shafik Nassar and Ron D. Rothblum and Prashant Nalini Vasudevan}, editor = {Marc Joye and Gregor Leander}, title = {Strong Batching for Non-interactive Statistical Zero-Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {241--270}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_9}, doi = {10.1007/978-3-031-58751-1\_9}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MuNRV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MureauPPW24, author = {Guilhem Mureau and Alice Pellet{-}Mary and Georgii Pliatsok and Alexandre Wallet}, editor = {Marc Joye and Gregor Leander}, title = {Cryptanalysis of Rank-2 Module-LIP in Totally Real Number Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {226--255}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_9}, doi = {10.1007/978-3-031-58754-2\_9}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MureauPPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaitoSS24, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, editor = {Marc Joye and Gregor Leander}, title = {The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {97--127}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_4}, doi = {10.1007/978-3-031-58716-0\_4}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaitoSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NarayananQT24, author = {Anand Kumar Narayanan and Youming Qiao and Gang Tang}, editor = {Marc Joye and Gregor Leander}, title = {Algorithms for Matrix Code and Alternating Trilinear Form Equivalences via New Isomorphism Invariants}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {160--187}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_6}, doi = {10.1007/978-3-031-58734-4\_6}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NarayananQT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PageW24, author = {Aurel Page and Benjamin Wesolowski}, editor = {Marc Joye and Gregor Leander}, title = {The Supersingular Endomorphism Ring and One Endomorphism Problems are Equivalent}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {388--417}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_14}, doi = {10.1007/978-3-031-58751-1\_14}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PageW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PanRZ24, author = {Jiaxin Pan and Doreen Riepel and Runzhi Zeng}, editor = {Marc Joye and Gregor Leander}, title = {Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {59--89}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_3}, doi = {10.1007/978-3-031-58754-2\_3}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PanRZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PanW24, author = {Jiaxin Pan and Benedikt Wagner}, editor = {Marc Joye and Gregor Leander}, title = {Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {460--489}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_16}, doi = {10.1007/978-3-031-58716-0\_16}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PanW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PinoKMMPS24, author = {Rafa{\"{e}}l Del Pino and Shuichi Katsumata and Mary Maller and Fabrice Mouhartem and Thomas Prest and Markku{-}Juhani O. Saarinen}, editor = {Marc Joye and Gregor Leander}, title = {Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {219--248}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_8}, doi = {10.1007/978-3-031-58723-8\_8}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PinoKMMPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PoulyS24, author = {Amaury Pouly and Yixin Shen}, editor = {Marc Joye and Gregor Leander}, title = {Provable Dual Attacks on Learning with Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {256--285}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_10}, doi = {10.1007/978-3-031-58754-2\_10}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PoulyS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SantosEMR24, author = {Maria Corte{-}Real Santos and Jonathan Komada Eriksen and Michael Meyer and Krijn Reijnders}, editor = {Marc Joye and Gregor Leander}, title = {Apr{\`{e}}sSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {63--93}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_3}, doi = {10.1007/978-3-031-58716-0\_3}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SantosEMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Schage24, author = {Sven Sch{\"{a}}ge}, editor = {Marc Joye and Gregor Leander}, title = {New Limits of Provable Security and Applications to ElGamal Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, pages = {255--285}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5\_10}, doi = {10.1007/978-3-031-58737-5\_10}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Schage24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SettyTW24, author = {Srinath T. V. Setty and Justin Thaler and Riad S. Wahby}, editor = {Marc Joye and Gregor Leander}, title = {Unlocking the Lookup Singularity with Lasso}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {180--209}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_7}, doi = {10.1007/978-3-031-58751-1\_7}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SettyTW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SongYCHW24, author = {Ling Song and Qianqian Yang and Yincen Chen and Lei Hu and Jian Weng}, editor = {Marc Joye and Gregor Leander}, title = {Probabilistic Extensions: {A} One-Step Framework for Finding Rectangle Attacks and Beyond}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, pages = {339--367}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0\_12}, doi = {10.1007/978-3-031-58716-0\_12}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SongYCHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Steiner24, author = {Matthias Johann Steiner}, editor = {Marc Joye and Gregor Leander}, title = {The Complexity of Algebraic Algorithms for {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, pages = {375--403}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4\_13}, doi = {10.1007/978-3-031-58734-4\_13}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Steiner24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TairiU24, author = {Erkan Tairi and Akin {\"{U}}nal}, editor = {Marc Joye and Gregor Leander}, title = {Lower Bounds for Lattice-Based Compact Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {249--279}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_9}, doi = {10.1007/978-3-031-58723-8\_9}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TairiU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangWLLWLW24, author = {Ruida Wang and Yundi Wen and Zhihao Li and Xianhui Lu and Benqiang Wei and Kun Liu and Kunpeng Wang}, editor = {Marc Joye and Gregor Leander}, title = {Circuit Bootstrapping: Faster and Smaller}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {342--372}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_12}, doi = {10.1007/978-3-031-58723-8\_12}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangWLLWLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WeeW24, author = {Hoeteck Wee and David J. Wu}, editor = {Marc Joye and Gregor Leander}, title = {Succinct Functional Commitments for Circuits from k-sfLin}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {280--310}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_10}, doi = {10.1007/978-3-031-58723-8\_10}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WeeW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Xagawa24, author = {Keita Xagawa}, editor = {Marc Joye and Gregor Leander}, title = {Signatures with Memory-Tight Security in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {30--58}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2\_2}, doi = {10.1007/978-3-031-58754-2\_2}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Xagawa24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhuLZGQ24, author = {Ziqi Zhu and Jiangtao Li and Kai Zhang and Junqing Gong and Haifeng Qian}, editor = {Marc Joye and Gregor Leander}, title = {Registered Functional Encryptions from Pairings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, pages = {373--402}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8\_13}, doi = {10.1007/978-3-031-58723-8\_13}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhuLZGQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2024-1, editor = {Marc Joye and Gregor Leander}, title = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14651}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58716-0}, doi = {10.1007/978-3-031-58716-0}, isbn = {978-3-031-58715-3}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2024-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2024-2, editor = {Marc Joye and Gregor Leander}, title = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14652}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58723-8}, doi = {10.1007/978-3-031-58723-8}, isbn = {978-3-031-58722-1}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2024-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2024-3, editor = {Marc Joye and Gregor Leander}, title = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14653}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58734-4}, doi = {10.1007/978-3-031-58734-4}, isbn = {978-3-031-58733-7}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2024-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2024-4, editor = {Marc Joye and Gregor Leander}, title = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14654}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58737-5}, doi = {10.1007/978-3-031-58737-5}, isbn = {978-3-031-58736-8}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2024-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2024-5, editor = {Marc Joye and Gregor Leander}, title = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5}, doi = {10.1007/978-3-031-58740-5}, isbn = {978-3-031-58739-9}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2024-5.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2024-6, editor = {Marc Joye and Gregor Leander}, title = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1}, doi = {10.1007/978-3-031-58751-1}, isbn = {978-3-031-58750-4}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2024-6.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2024-7, editor = {Marc Joye and Gregor Leander}, title = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VII}}, series = {Lecture Notes in Computer Science}, volume = {14657}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58754-2}, doi = {10.1007/978-3-031-58754-2}, isbn = {978-3-031-58753-5}, timestamp = {Thu, 09 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2024-7.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbrahamAPP23, author = {Ittai Abraham and Gilad Asharov and Shravani Patil and Arpita Patra}, editor = {Carmit Hazay and Martijn Stam}, title = {Detect, Pack and Batch: Perfectly-Secure {MPC} with Linear Communication and Constant Expected Time}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {251--281}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_9}, doi = {10.1007/978-3-031-30617-4\_9}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbrahamAPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbusalahC23, author = {Hamza Abusalah and Valerio Cini}, editor = {Carmit Hazay and Martijn Stam}, title = {An Incremental PoSW for General Weight Distributions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {282--311}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_10}, doi = {10.1007/978-3-031-30617-4\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbusalahC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AfsharCMS23, author = {Abtin Afshar and Geoffroy Couteau and Mohammad Mahmoody and Elahe Sadeghi}, editor = {Carmit Hazay and Martijn Stam}, title = {Fine-Grained Non-interactive Key-Exchange: Constructions and Lower Bounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {55--85}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_3}, doi = {10.1007/978-3-031-30545-0\_3}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AfsharCMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgarwalBKK23, author = {Amit Agarwal and James Bartusek and Dakshita Khurana and Nishant Kumar}, editor = {Carmit Hazay and Martijn Stam}, title = {A New Framework for Quantum Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {363--394}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_13}, doi = {10.1007/978-3-031-30545-0\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgarwalBKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalKNYY23, author = {Shweta Agrawal and Fuyuki Kitagawa and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Carmit Hazay and Martijn Stam}, title = {Public Key Encryption with Secure Key Leasing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {581--610}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_20}, doi = {10.1007/978-3-031-30545-0\_20}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalKNYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalKYY23, author = {Shweta Agrawal and Simran Kumari and Anshu Yadav and Shota Yamada}, editor = {Carmit Hazay and Martijn Stam}, title = {Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {605--636}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_20}, doi = {10.1007/978-3-031-30620-4\_20}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalKYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtHMP23, author = {Martin R. Albrecht and Miro Haller and Lenka Marekov{\'{a}} and Kenneth G. Paterson}, editor = {Carmit Hazay and Martijn Stam}, title = {Caveat Implementor! Key Recovery Attacks on {MEGA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {190--218}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_7}, doi = {10.1007/978-3-031-30589-4\_7}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtHMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ApplebaumK23, author = {Benny Applebaum and Niv Konstantini}, editor = {Carmit Hazay and Martijn Stam}, title = {Actively Secure Arithmetic Computation and {VOLE} with Constant Computational Overhead}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {190--219}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_7}, doi = {10.1007/978-3-031-30617-4\_7}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ApplebaumK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AssoulineM23, author = {L{\'{e}}onard Assouline and Brice Minaud}, editor = {Carmit Hazay and Martijn Stam}, title = {Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {426--455}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_15}, doi = {10.1007/978-3-031-30545-0\_15}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AssoulineM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallLLL23, author = {Marshall Ball and Hanjun Li and Huijia Lin and Tianren Liu}, editor = {Carmit Hazay and Martijn Stam}, title = {New Ways to Garble Arithmetic Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {3--34}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_1}, doi = {10.1007/978-3-031-30617-4\_1}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BanegasKLMPRST23, author = {Gustavo Banegas and Juliane Kr{\"{a}}mer and Tanja Lange and Michael Meyer and Lorenz Panny and Krijn Reijnders and Jana Sot{\'{a}}kov{\'{a}} and Monika Trimoska}, editor = {Carmit Hazay and Martijn Stam}, title = {Disorientation Faults in {CSIDH}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {310--342}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_11}, doi = {10.1007/978-3-031-30589-4\_11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BanegasKLMPRST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaoHILLM23, author = {Zhenzhen Bao and Seongha Hwang and Akiko Inoue and ByeongHak Lee and Jooyoung Lee and Kazuhiko Minematsu}, editor = {Carmit Hazay and Martijn Stam}, title = {{XOCB:} Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {532--561}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_18}, doi = {10.1007/978-3-031-30634-1\_18}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaoHILLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BariantL23, author = {Augustin Bariant and Ga{\"{e}}tan Leurent}, editor = {Carmit Hazay and Martijn Stam}, title = {Truncated Boomerang Attacks and Application to AES-Based Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {3--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_1}, doi = {10.1007/978-3-031-30634-1\_1}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BariantL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartusekGJP23, author = {James Bartusek and Sanjam Garg and Abhishek Jain and Guru{-}Vamsi Policharla}, editor = {Carmit Hazay and Martijn Stam}, title = {End-to-End Secure Messaging with Traceability Only for Illegal Content}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {35--66}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_2}, doi = {10.1007/978-3-031-30589-4\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartusekGJP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BassoCCFFLMPPW23, author = {Andrea Basso and Giulio Codogni and Deirdre Connolly and Luca De Feo and Tako Boris Fouotsa and Guido Maria Lido and Travis Morrison and Lorenz Panny and Sikhar Patranabis and Benjamin Wesolowski}, editor = {Carmit Hazay and Martijn Stam}, title = {Supersingular Curves You Can Trust}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {405--437}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_14}, doi = {10.1007/978-3-031-30617-4\_14}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BassoCCFFLMPPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BennettGPS23, author = {Huck Bennett and Atul Ganju and Pura Peetathawatchai and Noah Stephens{-}Davidowitz}, editor = {Carmit Hazay and Martijn Stam}, title = {Just How Hard Are Rotations of {\textdollar}{\textbackslash}mathbb \{Z\}n{\textdollar}? Algorithms and Cryptography with the Simplest Lattice}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {252--281}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_9}, doi = {10.1007/978-3-031-30589-4\_9}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BennettGPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehGZ23, author = {Dan Boneh and Jiaxin Guan and Mark Zhandry}, editor = {Carmit Hazay and Martijn Stam}, title = {A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {507--531}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_18}, doi = {10.1007/978-3-031-30589-4\_18}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehGZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonnetainCSS23, author = {Xavier Bonnetain and Andr{\'{e}} Chailloux and Andr{\'{e}} Schrottenloher and Yixin Shen}, editor = {Carmit Hazay and Martijn Stam}, title = {Finding Many Collisions via Reusable Quantum Walks - Application to Lattice Sieving}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {221--251}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_8}, doi = {10.1007/978-3-031-30589-4\_8}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonnetainCSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BouraDBN23, author = {Christina Boura and Nicolas David and Rachelle Heim Boissier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Carmit Hazay and Martijn Stam}, title = {Better Steady than Speedy: Full Break of {SPEEDY-7-192}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {36--66}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_2}, doi = {10.1007/978-3-031-30634-1\_2}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BouraDBN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleCGIKRS23, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Nicolas Resch and Peter Scholl}, editor = {Carmit Hazay and Martijn Stam}, title = {Oblivious Transfer with Constant Computational Overhead}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {271--302}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_10}, doi = {10.1007/978-3-031-30545-0\_10}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleCGIKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleCM23, author = {Elette Boyle and Geoffroy Couteau and Pierre Meyer}, editor = {Carmit Hazay and Martijn Stam}, title = {Sublinear-Communication Secure Multiparty Computation Does Not Require {FHE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {159--189}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_6}, doi = {10.1007/978-3-031-30617-4\_6}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BriaudO23, author = {Pierre Briaud and Morten {\O}ygarden}, editor = {Carmit Hazay and Martijn Stam}, title = {A New Algebraic Approach to the Regular Syndrome Decoding Problem and Implications for {PCG} Constructions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {391--422}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_14}, doi = {10.1007/978-3-031-30589-4\_14}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BriaudO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CarozzaCJ23, author = {Eliana Carozza and Geoffroy Couteau and Antoine Joux}, editor = {Carmit Hazay and Martijn Stam}, title = {Short Signatures from Regular Syndrome Decoding in the Head}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {532--563}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_19}, doi = {10.1007/978-3-031-30589-4\_19}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CarozzaCJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastroP23, author = {Leo de Castro and Chris Peikert}, editor = {Carmit Hazay and Martijn Stam}, title = {Functional Commitments for All Functions, with Transparent Setup and from {SIS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {287--320}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_10}, doi = {10.1007/978-3-031-30620-4\_10}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastroP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastryckD23, author = {Wouter Castryck and Thomas Decru}, editor = {Carmit Hazay and Martijn Stam}, title = {An Efficient Key Recovery Attack on {SIDH}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {423--447}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_15}, doi = {10.1007/978-3-031-30589-4\_15}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastryckD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChakrabortyGS23, author = {Suvradip Chakraborty and Chaya Ganesh and Pratik Sarkar}, editor = {Carmit Hazay and Martijn Stam}, title = {Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {239--270}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_9}, doi = {10.1007/978-3-031-30545-0\_9}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChakrabortyGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChakrabortyHMR23, author = {Suvradip Chakraborty and Dennis Hofheinz and Ueli Maurer and Guilherme Rito}, editor = {Carmit Hazay and Martijn Stam}, title = {Deniable Authentication When Signing Keys Leak}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {69--100}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_3}, doi = {10.1007/978-3-031-30620-4\_3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChakrabortyHMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenBBZ23, author = {Binyi Chen and Benedikt B{\"{u}}nz and Dan Boneh and Zhenfei Zhang}, editor = {Carmit Hazay and Martijn Stam}, title = {HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {499--530}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_17}, doi = {10.1007/978-3-031-30617-4\_17}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenBBZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenCGOS23, author = {Megan Chen and Alessandro Chiesa and Tom Gur and Jack O'Connor and Nicholas Spooner}, editor = {Carmit Hazay and Martijn Stam}, title = {Proof-Carrying Data from Arithmetized Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {379--404}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_13}, doi = {10.1007/978-3-031-30617-4\_13}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenCGOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChungLM23, author = {Kai{-}Min Chung and Yao{-}Ting Lin and Mohammad Mahmoody}, editor = {Carmit Hazay and Martijn Stam}, title = {Black-Box Separations for Non-interactive Classical Commitments in a Quantum World}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {144--172}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_6}, doi = {10.1007/978-3-031-30545-0\_6}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChungLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CogliatiDNPS23, author = {Beno{\^{\i}}t Cogliati and Avijit Dutta and Mridul Nandi and Jacques Patarin and Abishanka Saha}, editor = {Carmit Hazay and Martijn Stam}, title = {Proof of Mirror Theory for a Wide Range of {\textdollar}{\textbackslash}xi {\_}\{{\textbackslash}max \}{\textdollar}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {470--501}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_16}, doi = {10.1007/978-3-031-30634-1\_16}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CogliatiDNPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouteauMPR23, author = {Geoffroy Couteau and Pierre Meyer and Alain Passel{\`{e}}gue and Mahshid Riahinia}, editor = {Carmit Hazay and Martijn Stam}, title = {Constrained Pseudorandom Functions from Homomorphic Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {194--224}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_7}, doi = {10.1007/978-3-031-30620-4\_7}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouteauMPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CuiWYY23, author = {Hongrui Cui and Xiao Wang and Kang Yang and Yu Yu}, editor = {Carmit Hazay and Martijn Stam}, title = {Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {35--67}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_2}, doi = {10.1007/978-3-031-30617-4\_2}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CuiWYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DAnvers23, author = {Jan{-}Pieter D'Anvers}, editor = {Carmit Hazay and Martijn Stam}, title = {One-Hot Conversion: Towards Faster Table-Based {A2B} Conversion}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {628--657}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_21}, doi = {10.1007/978-3-031-30634-1\_21}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DAnvers23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardRSY23, author = {Ivan Damg{\aa}rd and Divya Ravi and Luisa Siniscalchi and Sophia Yakoubov}, editor = {Carmit Hazay and Martijn Stam}, title = {Minimizing Setup in Broadcast-Optimal Two Round {MPC}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {129--158}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_5}, doi = {10.1007/978-3-031-30617-4\_5}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardRSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DaoG23, author = {Quang Dao and Paul Grubbs}, editor = {Carmit Hazay and Martijn Stam}, title = {Spartan and Bulletproofs are Simulation-Extractable (for Free!)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {531--562}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_18}, doi = {10.1007/978-3-031-30617-4\_18}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DaoG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DasJ23, author = {Dipayan Das and Antoine Joux}, editor = {Carmit Hazay and Martijn Stam}, title = {On the Hardness of the Finite Field Isomorphism Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {343--359}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_12}, doi = {10.1007/978-3-031-30589-4\_12}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DasJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DattaKW23, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, editor = {Carmit Hazay and Martijn Stam}, title = {Fully Adaptive Decentralized Multi-Authority {ABE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {447--478}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_15}, doi = {10.1007/978-3-031-30620-4\_15}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DattaKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DinurDKRS23, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Carmit Hazay and Martijn Stam}, title = {Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {98--127}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_4}, doi = {10.1007/978-3-031-30634-1\_4}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DinurDKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DinurSWZ23, author = {Itai Dinur and Uri Stemmer and David P. Woodruff and Samson Zhou}, editor = {Carmit Hazay and Martijn Stam}, title = {On Differential Privacy and Adaptive Data Analysis with Bounded Space}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {35--65}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_2}, doi = {10.1007/978-3-031-30620-4\_2}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DinurSWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisJKM23, author = {Yevgeniy Dodis and Daniel Jost and Balachandar Kesavan and Antonio Marcedone}, editor = {Carmit Hazay and Martijn Stam}, title = {End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {157--189}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_6}, doi = {10.1007/978-3-031-30589-4\_6}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisJKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisQW23, author = {Yevgeniy Dodis and Willy Quach and Daniel Wichs}, editor = {Carmit Hazay and Martijn Stam}, title = {Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {86--116}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_4}, doi = {10.1007/978-3-031-30545-0\_4}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisQW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingKLLMR23, author = {Nico D{\"{o}}ttling and Dimitris Kolonelos and Russell W. F. Lai and Chuanwei Lin and Giulio Malavolta and Ahmadreza Rahimi}, editor = {Carmit Hazay and Martijn Stam}, title = {Efficient Laconic Cryptography from Learning with Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {417--446}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_14}, doi = {10.1007/978-3-031-30620-4\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingKLLMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EscuderoGPSW23, author = {Daniel Escudero and Vipul Goyal and Antigoni Polychroniadou and Yifan Song and Chenkai Weng}, editor = {Carmit Hazay and Martijn Stam}, title = {SuperPack: Dishonest Majority {MPC} with Constant Online Communication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {220--250}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_8}, doi = {10.1007/978-3-031-30617-4\_8}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EscuderoGPSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EsserZ23, author = {Andre Esser and Floyd Zweydinger}, editor = {Carmit Hazay and Martijn Stam}, title = {New Time-Memory Trade-Offs for Subset Sum - Improving {ISD} in Theory and Practice}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {360--390}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_13}, doi = {10.1007/978-3-031-30589-4\_13}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EsserZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FeoLLW23, author = {Luca De Feo and Antonin Leroux and Patrick Longa and Benjamin Wesolowski}, editor = {Carmit Hazay and Martijn Stam}, title = {New Algorithms for the Deuring Correspondence - Towards Practical and Secure SQISign Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {659--690}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_23}, doi = {10.1007/978-3-031-30589-4\_23}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FeoLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FernandoJK23, author = {Rex Fernando and Aayush Jain and Ilan Komargodski}, editor = {Carmit Hazay and Martijn Stam}, title = {Maliciously-Secure MrNISC in the Plain Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {98--128}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_4}, doi = {10.1007/978-3-031-30617-4\_4}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FernandoJK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FleischhackerLS23, author = {Nils Fleischhacker and Kasper Green Larsen and Mark Simkin}, editor = {Carmit Hazay and Martijn Stam}, title = {How to Compress Encrypted Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {551--577}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_19}, doi = {10.1007/978-3-031-30545-0\_19}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FleischhackerLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FouotsaMP23, author = {Tako Boris Fouotsa and Tomoki Moriya and Christophe Petit}, editor = {Carmit Hazay and Martijn Stam}, title = {{M-SIDH} and {MD-SIDH:} Countering {SIDH} Attacks by Masking Information}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {282--309}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_10}, doi = {10.1007/978-3-031-30589-4\_10}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FouotsaMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FrancatiFMV23, author = {Danilo Francati and Daniele Friolo and Giulio Malavolta and Daniele Venturi}, editor = {Carmit Hazay and Martijn Stam}, title = {Multi-key and Multi-input Predicate Encryption from Learning with Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {573--604}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_19}, doi = {10.1007/978-3-031-30620-4\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FrancatiFMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FreitagGK23, author = {Cody Freitag and Ashrujit Ghoshal and Ilan Komargodski}, editor = {Carmit Hazay and Martijn Stam}, title = {Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {440--469}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_15}, doi = {10.1007/978-3-031-30634-1\_15}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FreitagGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaneshKOPTT23, author = {Chaya Ganesh and Yashvanth Kondi and Claudio Orlandi and Mahak Pancholi and Akira Takahashi and Daniel Tschudi}, editor = {Carmit Hazay and Martijn Stam}, title = {Witness-Succinct Universally-Composable SNARKs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {315--346}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_11}, doi = {10.1007/978-3-031-30617-4\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaneshKOPTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKLW23, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, editor = {Carmit Hazay and Martijn Stam}, title = {On Non-uniform Security for Black-Box Non-interactive {CCA} Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {173--204}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_7}, doi = {10.1007/978-3-031-30545-0\_7}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GeelenIKV23, author = {Robin Geelen and Ilia Iliashenko and Jiayi Kang and Frederik Vercauteren}, editor = {Carmit Hazay and Martijn Stam}, title = {On Polynomial Functions Modulo p\({}^{\mbox{e}}\) and Faster Bootstrapping for Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {257--286}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_9}, doi = {10.1007/978-3-031-30620-4\_9}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GeelenIKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GilbertBKR23, author = {Henri Gilbert and Rachelle Heim Boissier and Louiza Khati and Yann Rotella}, editor = {Carmit Hazay and Martijn Stam}, title = {Generic Attack on Duplex-Based {AEAD} Modes Using Random Function Statistics}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {348--378}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_12}, doi = {10.1007/978-3-031-30634-1\_12}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GilbertBKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoelHKS23, author = {Aarushi Goel and Mathias Hall{-}Andersen and Gabriel Kaptchuk and Nicholas Spooner}, editor = {Carmit Hazay and Martijn Stam}, title = {Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {347--378}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_12}, doi = {10.1007/978-3-031-30617-4\_12}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoelHKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GongLW23, author = {Junqing Gong and Ji Luo and Hoeteck Wee}, editor = {Carmit Hazay and Martijn Stam}, title = {Traitor Tracing with N\({}^{\mbox{1/3}}\)-Size Ciphertexts and O(1)-Size Keys from k-Lin}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {637--668}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_21}, doi = {10.1007/978-3-031-30620-4\_21}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GongLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrassiOSW23, author = {Lorenzo Grassi and Morten {\O}ygarden and Markus Schofnegger and Roman Walch}, editor = {Carmit Hazay and Martijn Stam}, title = {From Farfalle to Megafono via Ciminion: The {PRF} Hydra for {MPC} Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {255--286}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_9}, doi = {10.1007/978-3-031-30634-1\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrassiOSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuoWL23, author = {Chun Guo and Lei Wang and Dongdai Lin}, editor = {Carmit Hazay and Martijn Stam}, title = {Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {408--439}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_14}, doi = {10.1007/978-3-031-30634-1\_14}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuoWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuoYWZXZL23, author = {Xiaojie Guo and Kang Yang and Xiao Wang and Wenhao Zhang and Xiang Xie and Jiang Zhang and Zheli Liu}, editor = {Carmit Hazay and Martijn Stam}, title = {Half-Tree: Halving the Cost of Tree Expansion in {COT} and {DPF}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {330--362}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_12}, doi = {10.1007/978-3-031-30545-0\_12}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuoYWZXZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HadipourSE23, author = {Hosein Hadipour and Sadegh Sadeghi and Maria Eichlseder}, editor = {Carmit Hazay and Martijn Stam}, title = {Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {128--157}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_5}, doi = {10.1007/978-3-031-30634-1\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HadipourSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HallAndersenN23, author = {Mathias Hall{-}Andersen and Jesper Buus Nielsen}, editor = {Carmit Hazay and Martijn Stam}, title = {On Valiant's Conjecture - Impossibility of Incrementally Verifiable Computation from Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {438--469}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_15}, doi = {10.1007/978-3-031-30617-4\_15}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HallAndersenN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HanLG23, author = {Shuai Han and Shengli Liu and Dawu Gu}, editor = {Carmit Hazay and Martijn Stam}, title = {Almost Tight Multi-user Security Under Adaptive Corruptions {\&} Leakages in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {132--162}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_5}, doi = {10.1007/978-3-031-30620-4\_5}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HanLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Hanzlik23, author = {Lucjan Hanzlik}, editor = {Carmit Hazay and Martijn Stam}, title = {Non-interactive Blind Signatures for Random Messages}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {722--752}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_25}, doi = {10.1007/978-3-031-30589-4\_25}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Hanzlik23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HanzlikLW23, author = {Lucjan Hanzlik and Julian Loss and Benedikt Wagner}, editor = {Carmit Hazay and Martijn Stam}, title = {Rai-Choo! Evolving Blind Signatures to the Next Level}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {753--783}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_26}, doi = {10.1007/978-3-031-30589-4\_26}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HanzlikLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HesseJKW23, author = {Julia Hesse and Stanislaw Jarecki and Hugo Krawczyk and Christopher Wood}, editor = {Carmit Hazay and Martijn Stam}, title = {Password-Authenticated {TLS} via {OPAQUE} and Post-Handshake Authentication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {98--127}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_4}, doi = {10.1007/978-3-031-30589-4\_4}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HesseJKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HhanMY23, author = {Minki Hhan and Tomoyuki Morimae and Takashi Yamakawa}, editor = {Carmit Hazay and Martijn Stam}, title = {From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {639--667}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_22}, doi = {10.1007/978-3-031-30545-0\_22}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HhanMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerLWW23, author = {Susan Hohenberger and George Lu and Brent Waters and David J. Wu}, editor = {Carmit Hazay and Martijn Stam}, title = {Registered Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {511--542}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_17}, doi = {10.1007/978-3-031-30620-4\_17}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Carmit Hazay and Martijn Stam}, title = {Black-Box Reusable {NISC} with Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {68--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_3}, doi = {10.1007/978-3-031-30617-4\_3}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Jaeger23, author = {Joseph Jaeger}, editor = {Carmit Hazay and Martijn Stam}, title = {Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {101--131}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_4}, doi = {10.1007/978-3-031-30620-4\_4}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Jaeger23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainLL23, author = {Aayush Jain and Huijia Lin and Ji Luo}, editor = {Carmit Hazay and Martijn Stam}, title = {On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {479--510}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_16}, doi = {10.1007/978-3-031-30620-4\_16}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainLLS23, author = {Aayush Jain and Huijia Lin and Paul Lou and Amit Sahai}, editor = {Carmit Hazay and Martijn Stam}, title = {Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i{\unicode{54442}}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {205--235}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_8}, doi = {10.1007/978-3-031-30545-0\_8}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KalaiLV23, author = {Yael Tauman Kalai and Alex Lombardi and Vinod Vaikuntanathan}, editor = {Carmit Hazay and Martijn Stam}, title = {SNARGs and {PPAD} Hardness from the Decisional Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {470--498}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_16}, doi = {10.1007/978-3-031-30617-4\_16}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KalaiLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KohlweissLN23, author = {Markulf Kohlweiss and Anna Lysyanskaya and An Nguyen}, editor = {Carmit Hazay and Martijn Stam}, title = {Privacy-Preserving Blueprints}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {594--625}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_20}, doi = {10.1007/978-3-031-30617-4\_20}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KohlweissLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiZHYMW23, author = {Junzuo Lai and Gongxian Zeng and Zhengan Huang and Siu Ming Yiu and Xin Mu and Jian Weng}, editor = {Carmit Hazay and Martijn Stam}, title = {Asymmetric Group Message Franking: Definitions and Constructions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {67--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_3}, doi = {10.1007/978-3-031-30589-4\_3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiZHYMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LambinLN23, author = {Baptiste Lambin and Gregor Leander and Patrick Neumann}, editor = {Carmit Hazay and Martijn Stam}, title = {Pitfalls and Shortcomings for Decompositions and Alignment}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {318--347}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_11}, doi = {10.1007/978-3-031-30634-1\_11}, timestamp = {Sat, 03 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LambinLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeeMKCDEY23, author = {Yongwoo Lee and Daniele Micciancio and Andrey Kim and Rakyong Choi and Maxim Deryabin and Jieun Eom and Donghoon Yoo}, editor = {Carmit Hazay and Martijn Stam}, title = {Efficient {FHEW} Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {227--256}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_8}, doi = {10.1007/978-3-031-30620-4\_8}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeeMKCDEY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Liu23, author = {Qipeng Liu}, editor = {Carmit Hazay and Martijn Stam}, title = {Non-uniformity and Quantum Advice in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {117--143}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_5}, doi = {10.1007/978-3-031-30545-0\_5}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Liu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuAWMI23, author = {Fukang Liu and Ravi Anand and Libo Wang and Willi Meier and Takanori Isobe}, editor = {Carmit Hazay and Martijn Stam}, title = {Coefficient Grouping: Breaking Chaghri and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {287--317}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_10}, doi = {10.1007/978-3-031-30634-1\_10}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuAWMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuMZ23, author = {Jiahui Liu and Hart Montgomery and Mark Zhandry}, editor = {Carmit Hazay and Martijn Stam}, title = {Another Round of Breaking and Making Quantum Money: - How to Not Build It from Lattices, and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {611--638}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_21}, doi = {10.1007/978-3-031-30545-0\_21}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuW23, author = {Feng{-}Hao Liu and Han Wang}, editor = {Carmit Hazay and Martijn Stam}, title = {Batch Bootstrapping {I:} - {A} New Framework for {SIMD} Bootstrapping in Polynomial Modulus}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {321--352}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_11}, doi = {10.1007/978-3-031-30620-4\_11}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuW23a, author = {Feng{-}Hao Liu and Han Wang}, editor = {Carmit Hazay and Martijn Stam}, title = {Batch Bootstrapping {II:} - Bootstrapping in Polynomial Modulus only Requires O{\textasciitilde}(1){\textbackslash}documentclass[12pt]\{minimal\} {\textbackslash}usepackage\{amsmath\} {\textbackslash}usepackage\{wasysym\} {\textbackslash}usepackage\{amsfonts\} {\textbackslash}usepackage\{amssymb\} {\textbackslash}usepackage\{amsbsy\} {\textbackslash}usepackage\{mathrsfs\} {\textbackslash}usepackage\{upgreek\} {\textbackslash}setlength\{{\textbackslash}oddsidemargin\}\{-69pt\} {\textbackslash}begin\{document\}{\textdollar}{\textdollar}{\textbackslash}tilde\{O\}(1){\textdollar}{\textdollar}{\textbackslash}end\{document\} {FHE} Multiplications in Amortization}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {353--384}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_12}, doi = {10.1007/978-3-031-30620-4\_12}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuW23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuWSAMLI23, author = {Fukang Liu and Gaoli Wang and Santanu Sarkar and Ravi Anand and Willi Meier and Yingxin Li and Takanori Isobe}, editor = {Carmit Hazay and Martijn Stam}, title = {Analysis of {RIPEMD-160:} New Collision Attacks and Finding Characteristics with {MILP}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {189--219}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_7}, doi = {10.1007/978-3-031-30634-1\_7}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuWSAMLI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MainoMPPW23, author = {Luciano Maino and Chloe Martindale and Lorenz Panny and Giacomo Pope and Benjamin Wesolowski}, editor = {Carmit Hazay and Martijn Stam}, title = {A Direct Key Recovery Attack on {SIDH}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {448--471}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_16}, doi = {10.1007/978-3-031-30589-4\_16}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MainoMPPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MaoMZ23, author = {Xinyu Mao and Noam Mazor and Jiapeng Zhang}, editor = {Carmit Hazay and Martijn Stam}, title = {Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {502--531}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_17}, doi = {10.1007/978-3-031-30634-1\_17}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MaoMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MasureMMS23, author = {Lo{\"{\i}}c Masure and Pierrick M{\'{e}}aux and Thorben Moos and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Carmit Hazay and Martijn Stam}, title = {Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {596--627}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_20}, doi = {10.1007/978-3-031-30634-1\_20}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MasureMMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MelchorGHHJY23, author = {Carlos Aguilar Melchor and Nicolas Gama and James Howe and Andreas H{\"{u}}lsing and David Joseph and Dongze Yue}, editor = {Carmit Hazay and Martijn Stam}, title = {The Return of the SDitH}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {564--596}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_20}, doi = {10.1007/978-3-031-30589-4\_20}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MelchorGHHJY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MendaLGR23, author = {Sanketh Menda and Julia Len and Paul Grubbs and Thomas Ristenpart}, editor = {Carmit Hazay and Martijn Stam}, title = {Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {379--407}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_13}, doi = {10.1007/978-3-031-30634-1\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MendaLGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NarayananPSW23, author = {Varun Narayanan and Vinod M. Prabhakaran and Neha Sangwan and Shun Watanabe}, editor = {Carmit Hazay and Martijn Stam}, title = {Complete Characterization of Broadcast and Pseudo-signatures from Correlations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {563--593}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_19}, doi = {10.1007/978-3-031-30617-4\_19}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NarayananPSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PanW23, author = {Jiaxin Pan and Benedikt Wagner}, editor = {Carmit Hazay and Martijn Stam}, title = {Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {597--627}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_21}, doi = {10.1007/978-3-031-30589-4\_21}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PanW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ParkLS23, author = {Andrew Park and Wei{-}Kai Lin and Elaine Shi}, editor = {Carmit Hazay and Martijn Stam}, title = {NanoGRAM: Garbled {RAM} with {\textdollar}{\textbackslash}widetilde\{O\}({\textbackslash}log N){\textdollar} Overhead}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {456--486}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_16}, doi = {10.1007/978-3-031-30545-0\_16}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ParkLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PersianoY23, author = {Giuseppe Persiano and Kevin Yeo}, editor = {Carmit Hazay and Martijn Stam}, title = {Lower Bound Framework for Differentially Private and Oblivious Data Structures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {487--517}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_17}, doi = {10.1007/978-3-031-30545-0\_17}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PersianoY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/QinHDYW23, author = {Lingyue Qin and Jialiang Hua and Xiaoyang Dong and Hailun Yan and Xiaoyun Wang}, editor = {Carmit Hazay and Martijn Stam}, title = {Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {158--188}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_6}, doi = {10.1007/978-3-031-30634-1\_6}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/QinHDYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Robert23, author = {Damien Robert}, editor = {Carmit Hazay and Martijn Stam}, title = {Breaking {SIDH} in Polynomial Time}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {472--503}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_17}, doi = {10.1007/978-3-031-30589-4\_17}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Robert23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RoslerSS23, author = {Paul R{\"{o}}sler and Daniel Slamanig and Christoph Striecks}, editor = {Carmit Hazay and Martijn Stam}, title = {Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {3--34}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_1}, doi = {10.1007/978-3-031-30589-4\_1}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RoslerSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Rothblum23, author = {Guy N. Rothblum}, editor = {Carmit Hazay and Martijn Stam}, title = {Indistinguishable Predictions and Multi-group Fair Learning}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {3--21}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_1}, doi = {10.1007/978-3-031-30545-0\_1}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Rothblum23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SantosGJ23, author = {Bruno Freitas Dos Santos and Yanqi Gu and Stanislaw Jarecki}, editor = {Carmit Hazay and Martijn Stam}, title = {Randomized Half-Ideal Cipher on Groups with Applications to {UC} (a)PAKE}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {128--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_5}, doi = {10.1007/978-3-031-30589-4\_5}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SantosGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShiSSHY23, author = {Danping Shi and Siwei Sun and Ling Song and Lei Hu and Qianqian Yang}, editor = {Carmit Hazay and Martijn Stam}, title = {Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Sel{\c{c}}uk Meet-in-the-Middle Cryptanalysis of {SKINNY}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {67--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_3}, doi = {10.1007/978-3-031-30634-1\_3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShiSSHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TessaroZ23, author = {Stefano Tessaro and Chenzhi Zhu}, editor = {Carmit Hazay and Martijn Stam}, title = {Threshold and Multi-signature Schemes from Linear Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {628--658}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_22}, doi = {10.1007/978-3-031-30589-4\_22}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TessaroZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TessaroZ23a, author = {Stefano Tessaro and Chenzhi Zhu}, editor = {Carmit Hazay and Martijn Stam}, title = {Revisiting {BBS} Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {691--721}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_24}, doi = {10.1007/978-3-031-30589-4\_24}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TessaroZ23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Tomida23, author = {Junichi Tomida}, editor = {Carmit Hazay and Martijn Stam}, title = {Unbounded Quadratic Functional Encryption and More from Pairings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {543--572}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_18}, doi = {10.1007/978-3-031-30620-4\_18}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Tomida23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Unal23, author = {Akin {\"{U}}nal}, editor = {Carmit Hazay and Martijn Stam}, title = {Worst-Case Subexponential Attacks on PRGs of Constant Degree or Constant Locality}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {25--54}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_2}, doi = {10.1007/978-3-031-30545-0\_2}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Unal23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WeeW23, author = {Hoeteck Wee and David J. Wu}, editor = {Carmit Hazay and Martijn Stam}, title = {Succinct Vector, Polynomial, and Functional Commitments from Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {385--416}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_13}, doi = {10.1007/978-3-031-30620-4\_13}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WeeW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Yang23, author = {Rupeng Yang}, editor = {Carmit Hazay and Martijn Stam}, title = {Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {163--193}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_6}, doi = {10.1007/978-3-031-30620-4\_6}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Yang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Yeo23, author = {Kevin Yeo}, editor = {Carmit Hazay and Martijn Stam}, title = {Lower Bounds for (Batch) {PIR} with Private Preprocessing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {518--550}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_18}, doi = {10.1007/978-3-031-30545-0\_18}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Yeo23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhangHL23, author = {Zhongyi Zhang and Chengan Hou and Meicheng Liu}, editor = {Carmit Hazay and Martijn Stam}, title = {Collision Attacks on Round-Reduced {SHA-3} Using Conditional Internal Differentials}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {220--251}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_8}, doi = {10.1007/978-3-031-30634-1\_8}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhangHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhangLYW23, author = {Shiduo Zhang and Xiuhan Lin and Yang Yu and Weijia Wang}, editor = {Carmit Hazay and Martijn Stam}, title = {Improved Power Analysis Attacks on Falcon}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {565--595}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_19}, doi = {10.1007/978-3-031-30634-1\_19}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhangLYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhouLTS23, author = {Mingxun Zhou and Wei{-}Kai Lin and Yiannis Tselekounis and Elaine Shi}, editor = {Carmit Hazay and Martijn Stam}, title = {Optimal Single-Server Private Information Retrieval}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {395--425}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_14}, doi = {10.1007/978-3-031-30545-0\_14}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhouLTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhouSCM23, author = {Mingxun Zhou and Elaine Shi and T.{-}H. Hubert Chan and Shir Maimon}, editor = {Carmit Hazay and Martijn Stam}, title = {A Theory of Composition for Differential Obliviousness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {3--34}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_1}, doi = {10.1007/978-3-031-30620-4\_1}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhouSCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhouZZR23, author = {Zhelei Zhou and Bingsheng Zhang and Hong{-}Sheng Zhou and Kui Ren}, editor = {Carmit Hazay and Martijn Stam}, title = {Endemic Oblivious Transfer via Random Oracles, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {303--329}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_11}, doi = {10.1007/978-3-031-30545-0\_11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhouZZR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2023-1, editor = {Carmit Hazay and Martijn Stam}, title = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0}, doi = {10.1007/978-3-031-30545-0}, isbn = {978-3-031-30544-3}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2023-2, editor = {Carmit Hazay and Martijn Stam}, title = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4}, doi = {10.1007/978-3-031-30617-4}, isbn = {978-3-031-30616-7}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2023-3, editor = {Carmit Hazay and Martijn Stam}, title = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4}, doi = {10.1007/978-3-031-30620-4}, isbn = {978-3-031-30619-8}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2023-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2023-4, editor = {Carmit Hazay and Martijn Stam}, title = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1}, doi = {10.1007/978-3-031-30634-1}, isbn = {978-3-031-30633-4}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2023-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2023-5, editor = {Carmit Hazay and Martijn Stam}, title = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4}, doi = {10.1007/978-3-031-30589-4}, isbn = {978-3-031-30588-7}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2023-5.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbramSY22, author = {Damiano Abram and Peter Scholl and Sophia Yakoubov}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {790--820}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_27}, doi = {10.1007/978-3-031-06944-4\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbramSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgarwalNPPPR22, author = {Pratyush Agarwal and Varun Narayanan and Shreya Pathak and Manoj Prabhakaran and Vinod M. Prabhakaran and Mohammad Ali Rehan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Secure Non-interactive Reduction and Spectral Analysis of Correlations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {797--827}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_28}, doi = {10.1007/978-3-031-07082-2\_28}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgarwalNPPPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlagicBKM22, author = {Gorjan Alagic and Chen Bai and Jonathan Katz and Christian Majenz}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Post-Quantum Security of the Even-Mansour Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {458--487}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_17}, doi = {10.1007/978-3-031-07082-2\_17}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlagicBKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlmashaqbehCEGM22, author = {Ghada Almashaqbeh and Ran Canetti and Yaniv Erlich and Jonathan Gershoni and Tal Malkin and Itsik Pe'er and Anna Roitburd{-}Berman and Eran Tromer}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Unclonable Polymers and Their Cryptographic Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {759--789}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_26}, doi = {10.1007/978-3-031-06944-4\_26}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlmashaqbehCEGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenANKPPW22, author = {Jo{\"{e}}l Alwen and Benedikt Auerbach and Miguel Cueto Noval and Karen Klein and Guillermo Pascual{-}Perez and Krzysztof Pietrzak and Michael Walter}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {CoCoA: Concurrent Continuous Group Key Agreement}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {815--844}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_28}, doi = {10.1007/978-3-031-07085-3\_28}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenANKPPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AmzalegD22, author = {Dor Amzaleg and Itai Dinur}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Refined Cryptanalysis of the {GPRS} Ciphers {GEA-1} and {GEA-2}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {57--85}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_3}, doi = {10.1007/978-3-031-07082-2\_3}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AmzalegD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ArnonCY22, author = {Gal Arnon and Alessandro Chiesa and Eylon Yogev}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {A {PCP} Theorem for Interactive Proofs and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {64--94}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_3}, doi = {10.1007/978-3-031-07085-3\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ArnonCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AungLJTWY22, author = {Khin Mi Mi Aung and Enhui Lim and Sim Jun Jie and Benjamin Hong Meng Tan and Huaxiong Wang and Sze Ling Yeo}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Field Instruction Multiple Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {611--641}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_21}, doi = {10.1007/978-3-031-06944-4\_21}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AungLJTWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BangaloreOPV22, author = {Laasya Bangalore and Rafail Ostrovsky and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Adaptively Secure Computation for {RAM} Programs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {187--216}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_7}, doi = {10.1007/978-3-031-07085-3\_7}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BangaloreOPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareH22, author = {Mihir Bellare and Viet Tung Hoang}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Efficient Schemes for Committing Authenticated Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {845--875}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_29}, doi = {10.1007/978-3-031-07085-3\_29}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeullensDKLP22, author = {Ward Beullens and Samuel Dobson and Shuichi Katsumata and Yi{-}Fu Lai and Federico Pintore}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {95--126}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_4}, doi = {10.1007/978-3-031-07085-3\_4}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeullensDKLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BitanskyLS22, author = {Nir Bitansky and Huijia Lin and Omri Shmueli}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Non-malleable Commitments Against Quantum Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {519--550}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_19}, doi = {10.1007/978-3-031-07082-2\_19}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BitanskyLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlockiL22, author = {Jeremiah Blocki and Seunghoon Lee}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {On the Multi-user Security of Short Schnorr Signatures with Preprocessing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {614--643}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_21}, doi = {10.1007/978-3-031-07085-3\_21}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlockiL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonnetainSS22, author = {Xavier Bonnetain and Andr{\'{e}} Schrottenloher and Ferdinand Sibleyras}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {315--344}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_12}, doi = {10.1007/978-3-031-07082-2\_12}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonnetainSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BootleCHO22, author = {Jonathan Bootle and Alessandro Chiesa and Yuncong Hu and Michele Orr{\`{u}}}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Gemini: Elastic SNARKs for Diverse Environments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {427--457}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_15}, doi = {10.1007/978-3-031-07085-3\_15}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BootleCHO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BootleCL22, author = {Jonathan Bootle and Alessandro Chiesa and Siqi Liu}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {275--304}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_10}, doi = {10.1007/978-3-031-07085-3\_10}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BootleCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleGIN22, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Secure Multiparty Computation with Sublinear Preprocessing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {427--457}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_15}, doi = {10.1007/978-3-031-06944-4\_15}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleGIN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiBDP22, author = {Zvika Brakerski and Pedro Branco and Nico D{\"{o}}ttling and Sihang Pu}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Batch-OT with Optimal Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {157--186}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_6}, doi = {10.1007/978-3-031-07085-3\_6}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiBDP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrzuskaC22, author = {Chris Brzuska and Geoffroy Couteau}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {584--613}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_20}, doi = {10.1007/978-3-031-07085-3\_20}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrzuskaC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiCKKPP22, author = {Ran Canetti and Suvradip Chakraborty and Dakshita Khurana and Nishant Kumar and Oxana Poburinnaya and Manoj Prabhakaran}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {COA-Secure Obfuscation and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {731--758}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_25}, doi = {10.1007/978-3-031-06944-4\_25}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiCKKPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastroHIVV22, author = {Leo de Castro and Carmit Hazay and Yuval Ishai and Vinod Vaikuntanathan and Muthuramakrishnan Venkitasubramaniam}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Asymptotically Quasi-Optimal Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {303--334}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_11}, doi = {10.1007/978-3-031-06944-4\_11}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastroHIVV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastroP22, author = {Leo de Castro and Antigoni Polychroniadou}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Lightweight, Maliciously Secure Verifiable Function Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {150--179}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_6}, doi = {10.1007/978-3-031-06944-4\_6}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastroP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChakrabortyMNV22, author = {Suvradip Chakraborty and Bernardo Magri and Jesper Buus Nielsen and Daniele Venturi}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Universally Composable Subversion-Resilient Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {272--302}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_10}, doi = {10.1007/978-3-031-06944-4\_10}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChakrabortyMNV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenCS22, author = {Megan Chen and Alessandro Chiesa and Nicholas Spooner}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {On Succinct Non-interactive Arguments in Relativized Worlds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {336--366}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_12}, doi = {10.1007/978-3-031-07085-3\_12}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenLZ22, author = {Yilei Chen and Qipeng Liu and Mark Zhandry}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {372--401}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_14}, doi = {10.1007/978-3-031-07082-2\_14}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheonL22, author = {Jung Hee Cheon and Keewoo Lee}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Limits of Polynomial Packings for {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{pk\}{\textdollar} and {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{pk\}{\textdollar}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {521--550}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_18}, doi = {10.1007/978-3-031-06944-4\_18}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheonL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChungLLW22, author = {Kai{-}Min Chung and Yi Lee and Han{-}Hsuan Lin and Xiaodi Wu}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Constant-Round Blind Classical Verification of Quantum Sampling}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {707--736}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_25}, doi = {10.1007/978-3-031-07082-2\_25}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChungLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CiampiOWZ22, author = {Michele Ciampi and Rafail Ostrovsky and Hendrik Waldner and Vassilis Zikas}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Round-Optimal and Communication-Efficient Multiparty Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {65--95}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_3}, doi = {10.1007/978-3-031-06944-4\_3}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CiampiOWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CiampiRSW22, author = {Michele Ciampi and Divya Ravi and Luisa Siniscalchi and Hendrik Waldner}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Round-Optimal Multi-party Computation with Identifiable Abort}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {335--364}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_12}, doi = {10.1007/978-3-031-06944-4\_12}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CiampiRSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CohenDKS22, author = {Ran Cohen and Jack Doerner and Yashvanth Kondi and Abhi Shelat}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Guaranteed Output in {\textdollar}O({\textbackslash}sqrt\{n\}){\textdollar} Rounds for Round-Robin Sampling Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {241--271}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_9}, doi = {10.1007/978-3-031-06944-4\_9}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CohenDKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Corrigan-GibbsH22, author = {Henry Corrigan{-}Gibbs and Alexandra Henzinger and Dmitry Kogan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Single-Server Private Information Retrieval with Sublinear Amortized Time}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {3--33}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_1}, doi = {10.1007/978-3-031-07085-3\_1}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Corrigan-GibbsH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavisDGJ22, author = {Hannah Davis and Denis Diemert and Felix G{\"{u}}nther and Tibor Jager}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {On the Concrete Security of {TLS} 1.3 {PSK} Mode}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {876--906}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_30}, doi = {10.1007/978-3-031-07085-3\_30}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavisDGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DeyGSS22, author = {Sabyasachi Dey and Hirendra Kumar Garai and Santanu Sarkar and Nitin Kumar Sharma}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {86--114}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_4}, doi = {10.1007/978-3-031-07082-2\_4}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DeyGSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisQW22, author = {Yevgeniy Dodis and Willy Quach and Daniel Wichs}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Authentication in the Bounded Storage Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {737--766}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_26}, doi = {10.1007/978-3-031-07082-2\_26}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisQW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DonFMS22, author = {Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Online-Extractability in the Quantum Random-Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {677--706}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_24}, doi = {10.1007/978-3-031-07082-2\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DonFMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DongQSW22, author = {Xiaoyang Dong and Lingyue Qin and Siwei Sun and Xiaoyun Wang}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {3--33}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_1}, doi = {10.1007/978-3-031-07082-2\_1}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DongQSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucasW22, author = {L{\'{e}}o Ducas and Wessel P. J. van Woerden}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {643--673}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_23}, doi = {10.1007/978-3-031-07082-2\_23}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucasW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EspitauFGRTTWY22, author = {Thomas Espitau and Pierre{-}Alain Fouque and Fran{\c{c}}ois G{\'{e}}rard and M{\'{e}}lissa Rossi and Akira Takahashi and Mehdi Tibouchi and Alexandre Wallet and Yang Yu}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Mitaka: {A} Simpler, Parallelizable, Maskable Variant of Falcon}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {222--253}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_9}, doi = {10.1007/978-3-031-07082-2\_9}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EspitauFGRTTWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EsserMZ22, author = {Andre Esser and Alexander May and Floyd Zweydinger}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {McEliece Needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern {ISD}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {433--457}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_16}, doi = {10.1007/978-3-031-07082-2\_16}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EsserMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FleischhackerLS22, author = {Nils Fleischhacker and Kasper Green Larsen and Mark Simkin}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {764--781}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_26}, doi = {10.1007/978-3-031-07085-3\_26}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FleischhackerLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaneshOPTT22, author = {Chaya Ganesh and Claudio Orlandi and Mahak Pancholi and Akira Takahashi and Daniel Tschudi}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {397--426}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_14}, doi = {10.1007/978-3-031-07085-3\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaneshOPTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaoO22, author = {Si Gao and Elisabeth Oswald}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {254--283}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_10}, doi = {10.1007/978-3-031-07082-2\_10}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaoO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaoOP22, author = {Si Gao and Elisabeth Oswald and Dan Page}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {284--311}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_11}, doi = {10.1007/978-3-031-07082-2\_11}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaoOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargGLW22, author = {Rachit Garg and Rishab Goyal and George Lu and Brent Waters}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {736--763}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_25}, doi = {10.1007/978-3-031-07085-3\_25}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargGLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryHL22, author = {Craig Gentry and Shai Halevi and Vadim Lyubashevsky}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {458--487}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_16}, doi = {10.1007/978-3-031-06944-4\_16}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GhineaGL22, author = {Diana Ghinea and Vipul Goyal and Chen{-}Da Liu{-}Zhang}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Round-Optimal Byzantine Agreement}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {96--119}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_4}, doi = {10.1007/978-3-031-06944-4\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GhineaGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GhoshalGJT22, author = {Ashrujit Ghoshal and Riddhi Ghosal and Joseph Jaeger and Stefano Tessaro}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Hiding in Plain Sight: Memory-Tight Proofs via Randomness Programming}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {706--735}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_24}, doi = {10.1007/978-3-031-07085-3\_24}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GhoshalGJT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoelGHK22, author = {Aarushi Goel and Matthew Green and Mathias Hall{-}Andersen and Gabriel Kaptchuk}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Stacking Sigmas: {A} Framework to Compose {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocols for Disjunctions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {458--487}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_16}, doi = {10.1007/978-3-031-07085-3\_16}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoelGHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoelHHJ22, author = {Aarushi Goel and Mathias Hall{-}Andersen and Aditya Hegde and Abhishek Jain}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Secure Multiparty Computation with Free Branching}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {397--426}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_14}, doi = {10.1007/978-3-031-06944-4\_14}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoelHHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalIS22, author = {Vipul Goyal and Yuval Ishai and Yifan Song}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Private Circuits with Quasilinear Randomness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {192--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_8}, doi = {10.1007/978-3-031-07082-2\_8}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalIS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrothS22, author = {Jens Groth and Victor Shoup}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {On the Security of {ECDSA} with Additive Key Derivation and Presignatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {365--396}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_13}, doi = {10.1007/978-3-031-06944-4\_13}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrothS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrubbsMP22, author = {Paul Grubbs and Varun Maram and Kenneth G. Paterson}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Anonymous, Robust Post-quantum Public Key Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {402--432}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_15}, doi = {10.1007/978-3-031-07082-2\_15}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrubbsMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuanWZ22, author = {Jiaxin Guan and Daniel Wichs and Mark Zhandry}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Incompressible Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {700--730}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_24}, doi = {10.1007/978-3-031-06944-4\_24}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuanWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuoS22, author = {Fuchun Guo and Willy Susilo}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Optimal Tightness for Chain-Based Unique Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {553--583}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_19}, doi = {10.1007/978-3-031-07085-3\_19}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuoS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HaKLLS22, author = {Jincheol Ha and Seongkwang Kim and ByeongHak Lee and Jooyoung Lee and Mincheol Son}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Rubato: Noisy Ciphers for Approximate Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {581--610}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_20}, doi = {10.1007/978-3-031-06944-4\_20}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HaKLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HaitnerMRT22, author = {Iftach Haitner and Nikolaos Makriyannis and Samuel Ranellucci and Eliad Tsfadia}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Highly Efficient OT-Based Multiplication Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {180--209}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_7}, doi = {10.1007/978-3-031-06944-4\_7}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HaitnerMRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HaqueHKLOS22, author = {Abida Haque and David Heath and Vladimir Kolesnikov and Steve Lu and Rafail Ostrovsky and Akash Shah}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Garbled Circuits with Sublinear Evaluator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {37--64}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_2}, doi = {10.1007/978-3-031-06944-4\_2}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/HaqueHKLOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HeathKO22, author = {David Heath and Vladimir Kolesnikov and Rafail Ostrovsky}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {EpiGRAM: Practical Garbled {RAM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {3--33}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_1}, doi = {10.1007/978-3-031-06944-4\_1}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HeathKO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HousniG22, author = {Youssef El Housni and Aurore Guillevic}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Families of SNARK-Friendly 2-Chains of Elliptic Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {367--396}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_13}, doi = {10.1007/978-3-031-07085-3\_13}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HousniG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Huguenin-Dumittan22, author = {Lo{\"{\i}}s Huguenin{-}Dumittan and Serge Vaudenay}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {On IND-qCCA Security in the {ROM} and Its Applications - {CPA} Security Is Sufficient for {TLS} 1.3}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {613--642}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_22}, doi = {10.1007/978-3-031-07082-2\_22}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Huguenin-Dumittan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HulettJKS22, author = {James Hulett and Ruta Jawale and Dakshita Khurana and Akshayaram Srinivasan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {SNARGs for {P} from Sub-exponential {DDH} and {QR}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {520--549}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_18}, doi = {10.1007/978-3-031-07085-3\_18}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HulettJKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Round-Optimal Black-Box Protocol Compilers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {210--240}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_8}, doi = {10.1007/978-3-031-06944-4\_8}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainLS22, author = {Aayush Jain and Huijia Lin and Amit Sahai}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Indistinguishability Obfuscation from {LPN} over {\textdollar}{\textbackslash}mathbb \{F\}{\_}p{\textdollar}, DLIN, and PRGs in NC\({}^{\mbox{0}}\)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {670--699}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_23}, doi = {10.1007/978-3-031-06944-4\_23}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JutlaM22, author = {Charanjit S. Jutla and Nathan Manohar}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Sine Series Approximation of the Mod Function for Bootstrapping of Approximate {HE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {491--520}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_17}, doi = {10.1007/978-3-031-06944-4\_17}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JutlaM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhorasganiMN22, author = {Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Secure Non-interactive Simulation: Feasibility and Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {767--796}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_27}, doi = {10.1007/978-3-031-07082-2\_27}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhorasganiMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KitagawaN22, author = {Fuyuki Kitagawa and Ryo Nishimaki}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Watermarking PRFs Against Quantum Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {488--518}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_18}, doi = {10.1007/978-3-031-07082-2\_18}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KitagawaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeeLKKNK22, author = {Yongwoo Lee and Joon{-}Woo Lee and Young{-}Sik Kim and Yongjune Kim and Jong{-}Seon No and HyungChul Kang}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {551--580}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_19}, doi = {10.1007/978-3-031-06944-4\_19}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeeLKKNK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertNPY22, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {One-Shot Fiat-Shamir-Based {NIZK} Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {488--519}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_17}, doi = {10.1007/978-3-031-07085-3\_17}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertNPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MaurerPR22, author = {Ueli Maurer and Christopher Portmann and Guilherme Rito}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Multi-Designated Receiver Signed Public Key Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {644--673}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_22}, doi = {10.1007/978-3-031-07085-3\_22}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MaurerPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MayNS22, author = {Alexander May and Julian Nowakowski and Santanu Sarkar}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {147--167}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_6}, doi = {10.1007/978-3-031-07082-2\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MayNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NagelerDE22, author = {Marcel Nageler and Christoph Dobraunig and Maria Eichlseder}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Information-Combining Differential Fault Attacks on {DEFAULT}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {168--191}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_7}, doi = {10.1007/978-3-031-07082-2\_7}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NagelerDE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PersianoPY22, author = {Giuseppe Persiano and Duong Hieu Phan and Moti Yung}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Anamorphic Encryption: Private Communication Against a Dictator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {34--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_2}, doi = {10.1007/978-3-031-07085-3\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PersianoPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RauschKC22, author = {Daniel Rausch and Ralf K{\"{u}}sters and C{\'{e}}line Chevalier}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Embedding the {UC} Model into the {IITM} Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {242--272}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_9}, doi = {10.1007/978-3-031-07085-3\_9}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RauschKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SantosGJK22, author = {Bruno Freitas Dos Santos and Yanqi Gu and Stanislaw Jarecki and Hugo Krawczyk}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Asymmetric {PAKE} with Low Computation and communication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {127--156}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_5}, doi = {10.1007/978-3-031-07085-3\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SantosGJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShiJZCDJ22, author = {Zhen Shi and Chenhui Jin and Jiyan Zhang and Ting Cui and Lin Ding and Yu Jin}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {A Correlation Attack on Full {SNOW-V} and SNOW-Vi}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {34--56}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_2}, doi = {10.1007/978-3-031-07082-2\_2}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShiJZCDJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SunPWW22, author = {Ling Sun and Bart Preneel and Wei Wang and Meiqin Wang}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {A Greater {GIFT:} Strengthening {GIFT} Against Statistical Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {115--144}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_5}, doi = {10.1007/978-3-031-07082-2\_5}, timestamp = {Tue, 27 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/SunPWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TangDJPQS22, author = {Gang Tang and Dung Hoang Duong and Antoine Joux and Thomas Plantard and Youming Qiao and Willy Susilo}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {582--612}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_21}, doi = {10.1007/978-3-031-07082-2\_21}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TangDJPQS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TessaroZ22, author = {Stefano Tessaro and Chenzhi Zhu}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Short Pairing-Free Blind Signatures with Exponential Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {782--811}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_27}, doi = {10.1007/978-3-031-07085-3\_27}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TessaroZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TyagiCRSTW22, author = {Nirvan Tyagi and Sof{\'{\i}}a Celi and Thomas Ristenpart and Nick Sullivan and Stefano Tessaro and Christopher A. Wood}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {A Fast and Simple Partially Oblivious PRF, with Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {674--705}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_23}, doi = {10.1007/978-3-031-07085-3\_23}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/TyagiCRSTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangP22, author = {Yuyu Wang and Jiaxin Pan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {305--335}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_11}, doi = {10.1007/978-3-031-07085-3\_11}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wee22, author = {Hoeteck Wee}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Optimal Broadcast Encryption and {CP-ABE} from Evasive Lattice Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {217--241}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_8}, doi = {10.1007/978-3-031-07085-3\_8}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wee22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wesolowski22, author = {Benjamin Wesolowski}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Orientations and the Supersingular Endomorphism Ring Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {345--371}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_13}, doi = {10.1007/978-3-031-07082-2\_13}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wesolowski22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WuAS22, author = {Ke Wu and Gilad Asharov and Elaine Shi}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {120--149}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_5}, doi = {10.1007/978-3-031-06944-4\_5}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/WuAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Xagawa22, author = {Keita Xagawa}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Anonymity of {NIST} {PQC} Round 3 KEMs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {551--581}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_20}, doi = {10.1007/978-3-031-07082-2\_20}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Xagawa22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YaoCY22, author = {Li Yao and Yilei Chen and Yu Yu}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {645--669}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_22}, doi = {10.1007/978-3-031-06944-4\_22}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/YaoCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2022-1, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4}, doi = {10.1007/978-3-031-06944-4}, isbn = {978-3-031-06943-7}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2022-2, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3}, doi = {10.1007/978-3-031-07085-3}, isbn = {978-3-031-07084-6}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2022-3, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2}, doi = {10.1007/978-3-031-07082-2}, isbn = {978-3-031-07081-5}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001B021, author = {Elena Andreeva and Rishiraj Bhattacharyya and Arnab Roy}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Compactness of Hashing Modes and Efficiency Beyond Merkle Tree}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {92--123}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_4}, doi = {10.1007/978-3-030-77886-6\_4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001B021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001KL21, author = {Matthew Green and Gabriel Kaptchuk and Gijs Van Laer}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Abuse Resistant Law Enforcement Access Systems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {553--583}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_19}, doi = {10.1007/978-3-030-77883-5\_19}, timestamp = {Wed, 16 Jun 2021 12:03:13 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001KL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0002J21, author = {Abhishek Jain and Zhengzhong Jin}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Non-interactive Zero Knowledge from Sub-exponential {DDH}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {3--32}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_1}, doi = {10.1007/978-3-030-77870-5\_1}, timestamp = {Wed, 16 Jun 2021 11:49:32 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0002J21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0008X21, author = {Wei Yu and Guangwu Xu}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Pre-computation Scheme of Window {\(\tau\)}NAF for Koblitz Curves Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {187--218}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_7}, doi = {10.1007/978-3-030-77886-6\_7}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0008X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgarwalBGKM21, author = {Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Post-Quantum Multi-Party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {435--464}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_16}, doi = {10.1007/978-3-030-77870-5\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgarwalBGKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AggarwalLS21, author = {Divesh Aggarwal and Zeyong Li and Noah Stephens{-}Davidowitz}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A 2\({}^{\mbox{n/2}}\)-Time Algorithm for {\textdollar}{\textbackslash}sqrt\{n\}{\textdollar}-SVP and {\textdollar}{\textbackslash}sqrt\{n\}{\textdollar}-Hermite SVP, and an Improved Time-Approximation Tradeoff for {(H)SVP}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {467--497}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_17}, doi = {10.1007/978-3-030-77870-5\_17}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AggarwalLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtH21, author = {Martin R. Albrecht and Nadia Heninger}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {528--558}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_19}, doi = {10.1007/978-3-030-77870-5\_19}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenBHKLR21, author = {Jo{\"{e}}l Alwen and Bruno Blanchet and Eduard Hauck and Eike Kiltz and Benjamin Lipp and Doreen Riepel}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Analysing the {HPKE} Standard}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {87--116}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_4}, doi = {10.1007/978-3-030-77870-5\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenBHKLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AmonDKRS21, author = {Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Three Third Generation Attacks on the Format Preserving Encryption Scheme {FF3}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {127--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_5}, doi = {10.1007/978-3-030-77886-6\_5}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AmonDKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthADG21, author = {Prabhanjan Ananth and Gilad Asharov and Hila Dahari and Vipul Goyal}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Accountability in {CRS} Generation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {278--308}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_10}, doi = {10.1007/978-3-030-77883-5\_10}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthADG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthJJM21, author = {Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin and Giulio Malavolta}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Unbounded Multi-party Computation from Learning with Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {754--781}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_26}, doi = {10.1007/978-3-030-77886-6\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthJJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthP21, author = {Prabhanjan Ananth and Rolando L. La Placa}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Software Leasing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {501--530}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_17}, doi = {10.1007/978-3-030-77886-6\_17}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadertscherGKRZ21, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Dynamic Ad Hoc Clock Synchronization}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {399--428}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_14}, doi = {10.1007/978-3-030-77883-5\_14}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadertscherGKRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaoD00SS021, author = {Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {771--804}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_27}, doi = {10.1007/978-3-030-77870-5\_27}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaoD00SS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaumDDNO21, author = {Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {{TARDIS:} {A} Foundation of Time-Lock Puzzles in {UC}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {429--459}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_15}, doi = {10.1007/978-3-030-77883-5\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaumDDNO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeckG0K21, author = {Gabrielle Beck and Aarushi Goel and Abhishek Jain and Gabriel Kaptchuk}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Order-C Secure Multiparty Computation for Highly Repetitive Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {663--693}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_23}, doi = {10.1007/978-3-030-77886-6\_23}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeckG0K21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeierleDLLRRRS21, author = {Christof Beierle and Patrick Derbez and Gregor Leander and Ga{\"{e}}tan Leurent and H{\aa}vard Raddum and Yann Rotella and David Rupprecht and Lukas Stennes}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Cryptanalysis of the {GPRS} Encryption Algorithms {GEA-1} and {GEA-2}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {155--183}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_6}, doi = {10.1007/978-3-030-77886-6\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeierleDLLRRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BelaidRT21, author = {Sonia Bela{\"{\i}}d and Matthieu Rivain and Abdul Rahman Taleb}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the Power of Expansion: More Efficient Constructions in the Random Probing Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {313--343}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_11}, doi = {10.1007/978-3-030-77886-6\_11}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BelaidRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ben-EfraimCOOSS21, author = {Aner Ben{-}Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria{-}Vazquez}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Large Scale, Actively Secure Computation from {LPN} and Free-XOR Garbled Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {33--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_2}, doi = {10.1007/978-3-030-77883-5\_2}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ben-EfraimCOOSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BenamiraGPT21, author = {Adrien Benamira and David G{\'{e}}rault and Thomas Peyrin and Quan Quan Tan}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A Deeper Look at Machine Learning-Based Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {805--835}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_28}, doi = {10.1007/978-3-030-77870-5\_28}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BenamiraGPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Benhamouda0KL21, author = {Fabrice Benhamouda and Aayush Jain and Ilan Komargodski and Huijia Lin}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Multiparty Reusable Non-interactive Secure Computation from {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {724--753}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_25}, doi = {10.1007/978-3-030-77886-6\_25}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Benhamouda0KL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BenhamoudaLLO021, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Julian Loss and Michele Orr{\`{u}} and Mariana Raykova}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the (in)security of {ROS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {33--53}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_2}, doi = {10.1007/978-3-030-77870-5\_2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BenhamoudaLLO021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Beullens21, author = {Ward Beullens}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Cryptanalysis of {UOV} and Rainbow}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {348--373}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_13}, doi = {10.1007/978-3-030-77870-5\_13}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Beullens21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BiryukovU21, author = {Alex Biryukov and Aleksei Udovenko}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Dummy Shuffling Against Algebraic Attacks in White-Box Implementations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {219--248}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_8}, doi = {10.1007/978-3-030-77886-6\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BiryukovU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BordesK21, author = {Nicolas Bordes and Pierre Karpman}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fast Verification of Masking Schemes in Characteristic Two}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {283--312}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_10}, doi = {10.1007/978-3-030-77886-6\_10}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BordesK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BossuatMTH21, author = {Jean{-}Philippe Bossuat and Christian Mouchet and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Jean{-}Pierre Hubaux}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-sparse Keys}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {587--617}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_21}, doi = {10.1007/978-3-030-77870-5\_21}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BossuatMTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleCG0I0R21, author = {Elette Boyle and Nishanth Chandran and Niv Gilboa and Divya Gupta and Yuval Ishai and Nishant Kumar and Mayank Rathee}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {871--900}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_30}, doi = {10.1007/978-3-030-77886-6\_30}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleCG0I0R21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrianFO00S021, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and Jo{\~{a}}o Ribeiro and Mark Simkin and Maciej Sk{\'{o}}rski and Daniele Venturi}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {408--437}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_14}, doi = {10.1007/978-3-030-77886-6\_14}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrianFO00S021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BurdgesF21, author = {Jeffrey Burdges and Luca De Feo}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Delay Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {302--326}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_11}, doi = {10.1007/978-3-030-77870-5\_11}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BurdgesF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CayrelCDMB21, author = {Pierre{-}Louis Cayrel and Brice Colombier and Vlad{-}Florin Dragoi and Alexandre Menu and Lilian Bossuet}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {438--467}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_15}, doi = {10.1007/978-3-030-77886-6\_15}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CayrelCDMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChungFHL21, author = {Kai{-}Min Chung and Serge Fehr and Yu{-}Hsuan Huang and Tai{-}Ning Liao}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {598--629}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_21}, doi = {10.1007/978-3-030-77886-6\_21}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChungFHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CiampiGO21, author = {Michele Ciampi and Vipul Goyal and Rafail Ostrovsky}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Threshold Garbled Circuits and Ad Hoc Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {64--93}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_3}, doi = {10.1007/978-3-030-77883-5\_3}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CiampiGO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CostelloMN21, author = {Craig Costello and Michael Meyer and Michael Naehrig}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {272--301}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_10}, doi = {10.1007/978-3-030-77870-5\_10}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CostelloMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouteauKLR21, author = {Geoffroy Couteau and Michael Kloo{\ss} and Huang Lin and Michael Reichle}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {247--277}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_9}, doi = {10.1007/978-3-030-77883-5\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouteauKLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouteauM21, author = {Geoffroy Couteau and Pierre Meyer}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial {LPN}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {842--870}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_29}, doi = {10.1007/978-3-030-77886-6\_29}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouteauM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoutinhoN21, author = {Murilo Coutinho and Tertuliano C. Souza Neto}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Linear Approximations to {ARX} Ciphers and Attacks Against ChaCha}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {711--740}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_25}, doi = {10.1007/978-3-030-77870-5\_25}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoutinhoN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DattaKW21, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Decentralized Multi-authority {ABE} for DNFs from {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {177--209}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_7}, doi = {10.1007/978-3-030-77870-5\_7}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DattaKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DingDVY21, author = {Jintai Ding and Joshua Deaton and Vishakha and Bo{-}Yin Yang}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The Nested Subset Differential Attack - {A} Practical Direct Attack Against {LUOV} Which Forges a Signature Within 210 Minutes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {329--347}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_12}, doi = {10.1007/978-3-030-77870-5\_12}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DingDVY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dinur21, author = {Itai Dinur}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over {GF(2)}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {374--403}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_14}, doi = {10.1007/978-3-030-77870-5\_14}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dinur21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dobraunig0GK21, author = {Christoph Dobraunig and Lorenzo Grassi and Anna Guinet and Dani{\"{e}}l Kuijsters}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {3--34}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_1}, doi = {10.1007/978-3-030-77886-6\_1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dobraunig0GK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DobraunigM21, author = {Christoph Dobraunig and Bart Mennink}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage Resilient Value Comparison with Application to Message Authentication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {377--407}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_13}, doi = {10.1007/978-3-030-77886-6\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DobraunigM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ducas0W21, author = {L{\'{e}}o Ducas and Marc Stevens and Wessel P. J. van Woerden}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Advanced Lattice Sieving on GPUs, with Tensor Cores}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {249--279}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_9}, doi = {10.1007/978-3-030-77886-6\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ducas0W21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FalkNO21, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Alibi: {A} Flaw in Cuckoo-Hashing Based Hierarchical {ORAM} Schemes and a Solution}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {338--369}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_12}, doi = {10.1007/978-3-030-77883-5\_12}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FalkNO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FarshimT21, author = {Pooya Farshim and Stefano Tessaro}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Password Hashing and Preprocessing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {64--91}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_3}, doi = {10.1007/978-3-030-77886-6\_3}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FarshimT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustHKS21, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Generic Compiler for Publicly Verifiable Covert Multi-Party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {782--811}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_27}, doi = {10.1007/978-3-030-77886-6\_27}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustHKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Fleischhacker021, author = {Nils Fleischhacker and Mark Simkin}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Robust Property-Preserving Hash Functions for Hamming Distance and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {311--337}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_11}, doi = {10.1007/978-3-030-77883-5\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Fleischhacker021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKLW21, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Black-Box Non-interactive Non-malleable Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {159--185}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_6}, doi = {10.1007/978-3-030-77883-5\_6}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GayJLS21, author = {Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {97--126}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_4}, doi = {10.1007/978-3-030-77883-5\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GayJLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GeorgeKM21, author = {Marilyn George and Seny Kamara and Tarik Moataz}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Structured Encryption and Dynamic Leakage Suppression}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {370--396}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_13}, doi = {10.1007/978-3-030-77883-5\_13}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GeorgeKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GhaziG0PV21, author = {Badih Ghazi and Noah Golowich and Ravi Kumar and Rasmus Pagh and Ameya Velingker}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the Power of Multiple Anonymous Messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {463--488}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_16}, doi = {10.1007/978-3-030-77883-5\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GhaziG0PV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GordonSY21, author = {S. Dov Gordon and Daniel Starin and Arkady Yerukhimovich}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The More the Merrier: Reducing the Cost of Large Scale {MPC}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {694--723}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_24}, doi = {10.1007/978-3-030-77886-6\_24}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GordonSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalSZ21, author = {Vipul Goyal and Akshayaram Srinivasan and Chenzhi Zhu}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Multi-source Non-malleable Extractors and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {468--497}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_16}, doi = {10.1007/978-3-030-77886-6\_16}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GriloL0V21, author = {Alex B. Grilo and Huijia Lin and Fang Song and Vinod Vaikuntanathan}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Oblivious Transfer Is in MiniQCrypt}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {531--561}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_18}, doi = {10.1007/978-3-030-77886-6\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GriloL0V21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GurkanJMMST21, author = {Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Aggregatable Distributed Key Generation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {147--176}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_6}, doi = {10.1007/978-3-030-77870-5\_6}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GurkanJMMST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HeathK21, author = {David Heath and Vladimir Kolesnikov}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {sf LogStack: Stacked Garbling with O(b log b) Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {3--32}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_1}, doi = {10.1007/978-3-030-77883-5\_1}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HeathK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JagerKRS21, author = {Tibor Jager and Eike Kiltz and Doreen Riepel and Sven Sch{\"{a}}ge}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Tightly-Secure Authenticated Key Exchange, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {117--146}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_5}, doi = {10.1007/978-3-030-77870-5\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JagerKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KaslasiRV21, author = {Inbar Kaslasi and Ron D. Rothblum and Prashant Nalini Vasudevan}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Public-Coin Statistical Zero-Knowledge Batch Verification Against Malicious Verifiers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {219--246}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_8}, doi = {10.1007/978-3-030-77883-5\_8}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KaslasiRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y21, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {404--434}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_15}, doi = {10.1007/978-3-030-77870-5\_15}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KellerR21, author = {Nathan Keller and Asaf Rosemarin}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Mind the Middle Layer: The {HADES} Design Strategy Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {35--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_2}, doi = {10.1007/978-3-030-77886-6\_2}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KellerR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Khurana21, author = {Dakshita Khurana}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Non-interactive Distributional Indistinguishability {(NIDI)} and Non-malleable Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {186--215}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_7}, doi = {10.1007/978-3-030-77883-5\_7}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Khurana21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KutasMPW21, author = {P{\'{e}}ter Kutas and Simon{-}Philipp Merz and Christophe Petit and Charlotte Weitk{\"{a}}mper}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {242--271}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_9}, doi = {10.1007/978-3-030-77870-5\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KutasMPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiGG21, author = {Yi{-}Fu Lai and Steven D. Galbraith and Cyprien Delpech de Saint Guilhem}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {213--241}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_8}, doi = {10.1007/978-3-030-77870-5\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiLW21, author = {Qiqi Lai and Feng{-}Hao Liu and Zhedong Wang}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {498--527}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_18}, doi = {10.1007/978-3-030-77870-5\_18}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeeLLKN21, author = {Joon{-}Woo Lee and Eunsang Lee and Yongwoo Lee and Young{-}Sik Kim and Jong{-}Seon No}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {High-Precision Bootstrapping of {RNS-CKKS} Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {618--647}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_22}, doi = {10.1007/978-3-030-77870-5\_22}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeeLLKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeurentP21, author = {Ga{\"{e}}tan Leurent and Clara Pernot}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {New Representations of the {AES} Key Schedule}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {54--84}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_3}, doi = {10.1007/978-3-030-77870-5\_3}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeurentP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiM21, author = {Baiyu Li and Daniele Micciancio}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the Security of Homomorphic Encryption on Approximate Numbers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {648--677}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_23}, doi = {10.1007/978-3-030-77870-5\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertNPY21, author = {Beno{\^{\i}}t Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {521--552}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_18}, doi = {10.1007/978-3-030-77883-5\_18}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertNPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuSL21, author = {Yunwen Liu and Siwei Sun and Chao Li}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Rotational Cryptanalysis from a Differential-Linear Perspective - Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {741--770}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_26}, doi = {10.1007/978-3-030-77870-5\_26}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MajiNPSW21, author = {Hemanta K. Maji and Hai H. Nguyen and Anat Paskin{-}Cherniavsky and Tom Suad and Mingyuan Wang}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {344--374}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_12}, doi = {10.1007/978-3-030-77886-6\_12}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MajiNPSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OrlandiSY21, author = {Claudio Orlandi and Peter Scholl and Sophia Yakoubov}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent {OT}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {678--708}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_24}, doi = {10.1007/978-3-030-77870-5\_24}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OrlandiSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pan0WC21, author = {Yanbin Pan and Jun Xu and Nick Wadleigh and Qi Cheng}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the Ideal Shortest Vector Problem over Random Rational Primes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {559--583}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_20}, doi = {10.1007/978-3-030-77870-5\_20}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pan0WC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PolychroniadouS21, author = {Antigoni Polychroniadou and Yifan Song}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {812--841}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_28}, doi = {10.1007/978-3-030-77886-6\_28}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PolychroniadouS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RindalS21, author = {Peter Rindal and Phillipp Schoppmann}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {{VOLE-PSI:} Fast {OPRF} and Circuit-PSI from Vector-OLE}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {901--930}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_31}, doi = {10.1007/978-3-030-77886-6\_31}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RindalS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Roberts21, author = {Bhaskar Roberts}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Security Analysis of Quantum Lightning}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {562--567}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_19}, doi = {10.1007/978-3-030-77886-6\_19}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Roberts21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShiW21, author = {Elaine Shi and Ke Wu}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Non-Interactive Anonymous Router}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {489--520}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_17}, doi = {10.1007/978-3-030-77883-5\_17}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/VidickZ21, author = {Thomas Vidick and Tina Zhang}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Classical Proofs of Quantum Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {630--660}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_22}, doi = {10.1007/978-3-030-77886-6\_22}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/VidickZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WeeW21, author = {Hoeteck Wee and Daniel Wichs}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Candidate Obfuscation via Oblivious {LWE} Sampling}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {127--156}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_5}, doi = {10.1007/978-3-030-77883-5\_5}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WeeW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YamakawaZ21, author = {Takashi Yamakawa and Mark Zhandry}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Classical vs Quantum Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {568--597}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_20}, doi = {10.1007/978-3-030-77886-6\_20}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/YamakawaZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2021-1, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5}, doi = {10.1007/978-3-030-77870-5}, isbn = {978-3-030-77869-9}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2021-2, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6}, doi = {10.1007/978-3-030-77886-6}, isbn = {978-3-030-77885-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2021-3, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5}, doi = {10.1007/978-3-030-77883-5}, isbn = {978-3-030-77882-8}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2021-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001LRRS20, author = {Lorenzo Grassi and Reinhard L{\"{u}}ftenegger and Christian Rechberger and Dragos Rotaru and Markus Schofnegger}, editor = {Anne Canteaut and Yuval Ishai}, title = {On a Generalization of Substitution-Permutation Networks: The {HADES} Design Strategy}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {674--704}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_23}, doi = {10.1007/978-3-030-45724-2\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001LRRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001SS20, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, editor = {Anne Canteaut and Yuval Ishai}, title = {Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {705--735}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_24}, doi = {10.1007/978-3-030-45724-2\_24}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001SS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0008ML20, author = {Wei Yu and Saud Al Musa and Bao Li}, editor = {Anne Canteaut and Yuval Ishai}, title = {Double-Base Chains for Scalar Multiplications on Elliptic Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {538--565}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_18}, doi = {10.1007/978-3-030-45727-3\_18}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0008ML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AggarwalO0SV20, author = {Divesh Aggarwal and Maciej Obremski and Jo{\~{a}}o Ribeiro and Luisa Siniscalchi and Ivan Visconti}, editor = {Anne Canteaut and Yuval Ishai}, title = {How to Extract Useful Randomness from Unreliable Sources}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {343--372}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_13}, doi = {10.1007/978-3-030-45721-1\_13}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AggarwalO0SV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Agrawal020, author = {Shweta Agrawal and Shota Yamada}, editor = {Anne Canteaut and Yuval Ishai}, title = {Optimal Broadcast Encryption from Pairings and {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {13--43}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_2}, doi = {10.1007/978-3-030-45721-1\_2}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Agrawal020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalP20, author = {Shweta Agrawal and Alice Pellet{-}Mary}, editor = {Anne Canteaut and Yuval Ishai}, title = {Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear {FE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {110--140}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_5}, doi = {10.1007/978-3-030-45721-1\_5}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrikolaHK20, author = {Thomas Agrikola and Dennis Hofheinz and Julia Kastner}, editor = {Anne Canteaut and Yuval Ishai}, title = {On Instantiating the Algebraic Group Model from Falsifiable Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {96--126}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_4}, doi = {10.1007/978-3-030-45724-2\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrikolaHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlagicMR020, author = {Gorjan Alagic and Christian Majenz and Alexander Russell and Fang Song}, editor = {Anne Canteaut and Yuval Ishai}, title = {Quantum-Access-Secure Message Authentication via Blind-Unforgeability}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {788--817}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_27}, doi = {10.1007/978-3-030-45727-3\_27}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlagicMR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlagicMR20, author = {Gorjan Alagic and Christian Majenz and Alexander Russell}, editor = {Anne Canteaut and Yuval Ishai}, title = {Efficient Simulation of Random States and Random Unitaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {759--787}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_26}, doi = {10.1007/978-3-030-45727-3\_26}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlagicMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AranhaO0Z20, author = {Diego F. Aranha and Claudio Orlandi and Akira Takahashi and Greg Zaverucha}, editor = {Anne Canteaut and Yuval Ishai}, title = {Security of Hedged Fiat-Shamir Signatures Under Fault Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {644--674}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_23}, doi = {10.1007/978-3-030-45721-1\_23}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AranhaO0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AsharovKLNPS20, author = {Gilad Asharov and Ilan Komargodski and Wei{-}Kai Lin and Kartik Nayak and Enoch Peserico and Elaine Shi}, editor = {Anne Canteaut and Yuval Ishai}, title = {OptORAMa: Optimal Oblivious {RAM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {403--432}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_14}, doi = {10.1007/978-3-030-45724-2\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AsharovKLNPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AuerbachGK20, author = {Benedikt Auerbach and Federico Giacon and Eike Kiltz}, editor = {Anne Canteaut and Yuval Ishai}, title = {Everybody's a Target: Scalability in Public-Key Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {475--506}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_16}, doi = {10.1007/978-3-030-45727-3\_16}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AuerbachGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananF20, author = {Saikrishna Badrinarayanan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai}, editor = {Anne Canteaut and Yuval Ishai}, title = {Statistical {ZAP} Arguments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {642--667}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_22}, doi = {10.1007/978-3-030-45727-3\_22}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaoG0S20, author = {Zhenzhen Bao and Chun Guo and Jian Guo and Ling Song}, editor = {Anne Canteaut and Yuval Ishai}, title = {{TNT:} How to Tweak a Block Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {641--673}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_22}, doi = {10.1007/978-3-030-45724-2\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaoG0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BardetBBGNRT20, author = {Magali Bardet and Pierre Briaud and Maxime Bros and Philippe Gaborit and Vincent Neiger and Olivier Ruatta and Jean{-}Pierre Tillich}, editor = {Anne Canteaut and Yuval Ishai}, title = {An Algebraic Attack on Rank Metric Code-Based Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {64--93}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_3}, doi = {10.1007/978-3-030-45727-3\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BardetBBGNRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeimelO20, author = {Amos Beimel and Hussien Othman}, editor = {Anne Canteaut and Yuval Ishai}, title = {Evolving Ramp Secret Sharing with a Small Gap}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {529--555}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_19}, doi = {10.1007/978-3-030-45721-1\_19}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeimelO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BelaidDMRW20, author = {Sonia Bela{\"{\i}}d and Pierre{-}{\'{E}}variste Dagand and Darius Mercadier and Matthieu Rivain and Rapha{\"{e}}l Wintersdorff}, editor = {Anne Canteaut and Yuval Ishai}, title = {Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {311--341}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_11}, doi = {10.1007/978-3-030-45727-3\_11}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BelaidDMRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareD020, author = {Mihir Bellare and Hannah Davis and Felix G{\"{u}}nther}, editor = {Anne Canteaut and Yuval Ishai}, title = {Separate Your Domains: {NIST} {PQC} KEMs, Oracle Cloning and Read-Only Indifferentiability}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {3--32}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_1}, doi = {10.1007/978-3-030-45724-2\_1}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareD020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareS20, author = {Mihir Bellare and Igors Stepanovs}, editor = {Anne Canteaut and Yuval Ishai}, title = {Security Under Message-Derived Keys: Signcryption in iMessage}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {507--537}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_17}, doi = {10.1007/978-3-030-45727-3\_17}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Beullens20, author = {Ward Beullens}, editor = {Anne Canteaut and Yuval Ishai}, title = {Sigma Protocols for MQ, {PKP} and SIS, and Fishy Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {183--211}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_7}, doi = {10.1007/978-3-030-45727-3\_7}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Beullens20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoerDF20, author = {Koen de Boer and L{\'{e}}o Ducas and Serge Fehr}, editor = {Anne Canteaut and Yuval Ishai}, title = {On the Quantum Complexity of the Continuous Hidden Subgroup Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {341--370}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_12}, doi = {10.1007/978-3-030-45724-2\_12}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoerDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonnetainS20, author = {Xavier Bonnetain and Andr{\'{e}} Schrottenloher}, editor = {Anne Canteaut and Yuval Ishai}, title = {Quantum Security Analysis of {CSIDH}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {493--522}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_17}, doi = {10.1007/978-3-030-45724-2\_17}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonnetainS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiD20, author = {Zvika Brakerski and Nico D{\"{o}}ttling}, editor = {Anne Canteaut and Yuval Ishai}, title = {Hardness of {LWE} on General Entropic Distributions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {551--575}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_19}, doi = {10.1007/978-3-030-45724-2\_19}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiDGM20, author = {Zvika Brakerski and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, editor = {Anne Canteaut and Yuval Ishai}, title = {Candidate iO from Homomorphic Encryption Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {79--109}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_4}, doi = {10.1007/978-3-030-45721-1\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiDGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BunzFS20, author = {Benedikt B{\"{u}}nz and Ben Fisch and Alan Szepieniec}, editor = {Anne Canteaut and Yuval Ishai}, title = {Transparent SNARKs from {DARK} Compilers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {677--706}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_24}, doi = {10.1007/978-3-030-45721-1\_24}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BunzFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastryckPV20, author = {Wouter Castryck and Lorenz Panny and Frederik Vercauteren}, editor = {Anne Canteaut and Yuval Ishai}, title = {Rational Isogenies from Irrational Endomorphisms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {523--548}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_18}, doi = {10.1007/978-3-030-45724-2\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastryckPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChiesaHMMVW20, author = {Alessandro Chiesa and Yuncong Hu and Mary Maller and Pratyush Mishra and Psi Vesely and Nicholas P. Ward}, editor = {Anne Canteaut and Yuval Ishai}, title = {Marlin: Preprocessing zkSNARKs with Universal and Updatable {SRS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {738--768}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_26}, doi = {10.1007/978-3-030-45721-1\_26}, timestamp = {Mon, 07 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChiesaHMMVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChiesaOS20, author = {Alessandro Chiesa and Dev Ojha and Nicholas Spooner}, editor = {Anne Canteaut and Yuval Ishai}, title = {Fractal: Post-quantum and Transparent Recursive Proofs from Holography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {769--793}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_27}, doi = {10.1007/978-3-030-45721-1\_27}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChiesaOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CohenGZ20, author = {Ran Cohen and Juan A. Garay and Vassilis Zikas}, editor = {Anne Canteaut and Yuval Ishai}, title = {Broadcast-Optimal Two-Round {MPC}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {828--858}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_28}, doi = {10.1007/978-3-030-45724-2\_28}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CohenGZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoronGZ20, author = {Jean{-}S{\'{e}}bastien Coron and Aur{\'{e}}lien Greuet and Rina Zeitoun}, editor = {Anne Canteaut and Yuval Ishai}, title = {Side-Channel Masking with Pseudo-Random Generator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {342--375}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_12}, doi = {10.1007/978-3-030-45727-3\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoronGZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Corrigan-GibbsK20, author = {Henry Corrigan{-}Gibbs and Dmitry Kogan}, editor = {Anne Canteaut and Yuval Ishai}, title = {Private Information Retrieval with Sublinear Online Time}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {44--75}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_3}, doi = {10.1007/978-3-030-45721-1\_3}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Corrigan-GibbsK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouteauKU20, author = {Geoffroy Couteau and Shuichi Katsumata and Bogdan Ursu}, editor = {Anne Canteaut and Yuval Ishai}, title = {Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {442--471}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_15}, doi = {10.1007/978-3-030-45727-3\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouteauKU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerX20, author = {Ronald Cramer and Chaoping Xing}, editor = {Anne Canteaut and Yuval Ishai}, title = {Blackbox Secret Sharing Revisited: {A} Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {499--528}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_18}, doi = {10.1007/978-3-030-45721-1\_18}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DAnversRV20, author = {Jan{-}Pieter D'Anvers and M{\'{e}}lissa Rossi and Fernando Virdia}, editor = {Anne Canteaut and Yuval Ishai}, title = {(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {3--33}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_1}, doi = {10.1007/978-3-030-45727-3\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DAnversRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dinur20, author = {Itai Dinur}, editor = {Anne Canteaut and Yuval Ishai}, title = {Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {405--434}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_15}, doi = {10.1007/978-3-030-45721-1\_15}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dinur20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dinur20a, author = {Itai Dinur}, editor = {Anne Canteaut and Yuval Ishai}, title = {On the Streaming Indistinguishability of a Random Permutation and a Random Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {433--460}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_15}, doi = {10.1007/978-3-030-45724-2\_15}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dinur20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisVW20, author = {Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, editor = {Anne Canteaut and Yuval Ishai}, title = {Extracting Randomness from Extractor-Dependent Sources}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {313--342}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_12}, doi = {10.1007/978-3-030-45721-1\_12}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingGHMW20, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs}, editor = {Anne Canteaut and Yuval Ishai}, title = {Two-Round Oblivious Transfer from {CDH} or {LPN}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {768--797}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_26}, doi = {10.1007/978-3-030-45724-2\_26}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingGHMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucasGPY20, author = {L{\'{e}}o Ducas and Steven D. Galbraith and Thomas Prest and Yang Yu}, editor = {Anne Canteaut and Yuval Ishai}, title = {Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {608--637}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_21}, doi = {10.1007/978-3-030-45724-2\_21}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucasGPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DulekGJMS20, author = {Yfke Dulek and Alex B. Grilo and Stacey Jeffery and Christian Majenz and Christian Schaffner}, editor = {Anne Canteaut and Yuval Ishai}, title = {Secure Multi-party Quantum Computation with a Dishonest Majority}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {729--758}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_25}, doi = {10.1007/978-3-030-45727-3\_25}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DulekGJMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKLS20, author = {Orr Dunkelman and Nathan Keller and Noam Lasry and Adi Shamir}, editor = {Anne Canteaut and Yuval Ishai}, title = {New Slide Attacks on Almost Self-similar Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {250--279}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_10}, doi = {10.1007/978-3-030-45721-1\_10}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKRS20, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Anne Canteaut and Yuval Ishai}, title = {The Retracing Boomerang Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {280--309}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_11}, doi = {10.1007/978-3-030-45721-1\_11}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EphraimFKP20, author = {Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass}, editor = {Anne Canteaut and Yuval Ishai}, title = {SPARKs: Succinct Parallelizable Arguments of Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {707--737}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_25}, doi = {10.1007/978-3-030-45721-1\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EphraimFKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EphraimFKP20a, author = {Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass}, editor = {Anne Canteaut and Yuval Ishai}, title = {Continuous Verifiable Delay Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {125--154}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_5}, doi = {10.1007/978-3-030-45727-3\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EphraimFKP20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Esser020, author = {Andre Esser and Alexander May}, editor = {Anne Canteaut and Yuval Ishai}, title = {Low Weight Discrete Logarithm and Subset Sum in 2\({}^{\mbox{0.65n}}\) with Polynomial Memory}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {94--122}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_4}, doi = {10.1007/978-3-030-45727-3\_4}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Esser020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FischlinHJ20, author = {Marc Fischlin and Patrick Harasser and Christian Janson}, editor = {Anne Canteaut and Yuval Ishai}, title = {Signatures from Sequential-OR Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {212--244}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_8}, doi = {10.1007/978-3-030-45727-3\_8}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FischlinHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Florez-Gutierrez20, author = {Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Anne Canteaut and Yuval Ishai}, title = {Improving Key-Recovery in Linear Attacks: Application to 28-Round {PRESENT}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {221--249}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_9}, doi = {10.1007/978-3-030-45721-1\_9}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Florez-Gutierrez20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FouqueKTWY20, author = {Pierre{-}Alain Fouque and Paul Kirchner and Mehdi Tibouchi and Alexandre Wallet and Yang Yu}, editor = {Anne Canteaut and Yuval Ishai}, title = {Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over {NTRU} Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {34--63}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_2}, doi = {10.1007/978-3-030-45727-3\_2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FouqueKTWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FuchsbauerPS20, author = {Georg Fuchsbauer and Antoine Plouviez and Yannick Seurin}, editor = {Anne Canteaut and Yuval Ishai}, title = {Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {63--95}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_3}, doi = {10.1007/978-3-030-45724-2\_3}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FuchsbauerPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayKOPZ20, author = {Juan A. Garay and Aggelos Kiayias and Rafail M. Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas}, editor = {Anne Canteaut and Yuval Ishai}, title = {Resource-Restricted Cryptography: Revisiting {MPC} Bounds in the Proof-of-Work Era}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {129--158}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_5}, doi = {10.1007/978-3-030-45724-2\_5}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayKOPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargGV20, author = {Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan}, editor = {Anne Canteaut and Yuval Ishai}, title = {Formalizing Data Deletion in the Context of the Right to Be Forgotten}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {373--402}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_13}, doi = {10.1007/978-3-030-45724-2\_13}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKK20, author = {Ankit Garg and Yael Tauman Kalai and Dakshita Khurana}, editor = {Anne Canteaut and Yuval Ishai}, title = {Low Error Efficient Computational Extractors in the {CRS} Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {373--402}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_14}, doi = {10.1007/978-3-030-45721-1\_14}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GhaziMPV20, author = {Badih Ghazi and Pasin Manurangsi and Rasmus Pagh and Ameya Velingker}, editor = {Anne Canteaut and Yuval Ishai}, title = {Private Aggregation from Fewer Anonymous Messages}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {798--827}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_27}, doi = {10.1007/978-3-030-45724-2\_27}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GhaziMPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GhoshalT20, author = {Ashrujit Ghoshal and Stefano Tessaro}, editor = {Anne Canteaut and Yuval Ishai}, title = {On the Memory-Tightness of Hashed ElGamal}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {33--62}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_2}, doi = {10.1007/978-3-030-45724-2\_2}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GhoshalT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GongW20, author = {Junqing Gong and Hoeteck Wee}, editor = {Anne Canteaut and Yuval Ishai}, title = {Adaptively Secure {ABE} for {DFA} from k-Lin and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {278--308}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_10}, doi = {10.1007/978-3-030-45727-3\_10}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GongW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalJJM20, author = {Vipul Goyal and Abhishek Jain and Zhengzhong Jin and Giulio Malavolta}, editor = {Anne Canteaut and Yuval Ishai}, title = {Statistical Zaps and New Oblivious Transfer Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {668--699}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_23}, doi = {10.1007/978-3-030-45727-3\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalJJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HaoLMT020, author = {Yonglin Hao and Gregor Leander and Willi Meier and Yosuke Todo and Qingju Wang}, editor = {Anne Canteaut and Yuval Ishai}, title = {Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {466--495}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_17}, doi = {10.1007/978-3-030-45721-1\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HaoLMT020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HazayPV20, author = {Carmit Hazay and Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Anne Canteaut and Yuval Ishai}, title = {Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {599--619}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_20}, doi = {10.1007/978-3-030-45727-3\_20}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HazayPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HazayVW20, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, editor = {Anne Canteaut and Yuval Ishai}, title = {The Price of Active Security in Cryptographic Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {184--215}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_7}, doi = {10.1007/978-3-030-45724-2\_7}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HazayVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HeathK20, author = {David Heath and Vladimir Kolesnikov}, editor = {Anne Canteaut and Yuval Ishai}, title = {Stacked Garbling for Disjunctive Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {569--598}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_19}, doi = {10.1007/978-3-030-45727-3\_19}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HeathK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HosoyamadaS20, author = {Akinori Hosoyamada and Yu Sasaki}, editor = {Anne Canteaut and Yuval Ishai}, title = {Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {249--279}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_9}, doi = {10.1007/978-3-030-45724-2\_9}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HosoyamadaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainMS20, author = {Aayush Jain and Nathan Manohar and Amit Sahai}, editor = {Anne Canteaut and Yuval Ishai}, title = {Combiners for Functional Encryption, Unconditionally}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {141--168}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_6}, doi = {10.1007/978-3-030-45721-1\_6}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JaquesNRV20, author = {Samuel Jaques and Michael Naehrig and Martin Roetteler and Fernando Virdia}, editor = {Anne Canteaut and Yuval Ishai}, title = {Implementing Grover Oracles for Quantum Key Search on {AES} and LowMC}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {280--310}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_10}, doi = {10.1007/978-3-030-45724-2\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JaquesNRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JayantiR020, author = {Siddhartha Jayanti and Srinivasan Raghuraman and Nikhil Vyas}, editor = {Anne Canteaut and Yuval Ishai}, title = {Efficient Constructions for Almost-Everywhere Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {159--183}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_6}, doi = {10.1007/978-3-030-45724-2\_6}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JayantiR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y20, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Anne Canteaut and Yuval Ishai}, title = {Compact NIZKs from Standard Assumptions on Bilinear Maps}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {379--409}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_13}, doi = {10.1007/978-3-030-45727-3\_13}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kim20, author = {Sam Kim}, editor = {Anne Canteaut and Yuval Ishai}, title = {Key-Homomorphic Pseudorandom Functions from {LWE} with Small Modulus}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {576--607}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_20}, doi = {10.1007/978-3-030-45724-2\_20}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KimLL20, author = {Seongkwang Kim and ByeongHak Lee and Jooyoung Lee}, editor = {Anne Canteaut and Yuval Ishai}, title = {Tight Security Bounds for Double-Block Hash-then-Sum MACs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {435--465}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_16}, doi = {10.1007/978-3-030-45721-1\_16}, timestamp = {Wed, 11 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KimLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KuchtaSSSS20, author = {Veronika Kuchta and Amin Sakzad and Damien Stehl{\'{e}} and Ron Steinfeld and Shifeng Sun}, editor = {Anne Canteaut and Yuval Ishai}, title = {Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and {CCA} Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {703--728}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_24}, doi = {10.1007/978-3-030-45727-3\_24}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KuchtaSSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertPWW20, author = {Beno{\^{\i}}t Libert and Alain Passel{\`{e}}gue and Hoeteck Wee and David J. Wu}, editor = {Anne Canteaut and Yuval Ishai}, title = {New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {410--441}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_14}, doi = {10.1007/978-3-030-45727-3\_14}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertPWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LinL20, author = {Huijia Lin and Ji Luo}, editor = {Anne Canteaut and Yuval Ishai}, title = {Compact Adaptively Secure {ABE} from k-Lin: Beyond NC\({}^{\mbox{1}}\) and Towards {NL}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {247--277}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_9}, doi = {10.1007/978-3-030-45727-3\_9}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LinL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LombardiVW20, author = {Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs}, editor = {Anne Canteaut and Yuval Ishai}, title = {Statistical {ZAPR} Arguments from Bilinear Maps}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {620--641}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_21}, doi = {10.1007/978-3-030-45727-3\_21}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LombardiVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MorganPP20, author = {Andrew Morgan and Rafael Pass and Antigoni Polychroniadou}, editor = {Anne Canteaut and Yuval Ishai}, title = {Succinct Non-interactive Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {216--245}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_8}, doi = {10.1007/978-3-030-45724-2\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MorganPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Nandi20, author = {Mridul Nandi}, editor = {Anne Canteaut and Yuval Ishai}, title = {Mind the Composition: Birthday Bound Attacks on {EWCDMD} and SoKAC21}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {203--220}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_8}, doi = {10.1007/978-3-030-45721-1\_8}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Nandi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Naya-PlasenciaS20, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, editor = {Anne Canteaut and Yuval Ishai}, title = {Optimal Merging in Quantum k-xor and k-xor-sum Algorithms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {311--340}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_11}, doi = {10.1007/978-3-030-45724-2\_11}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Naya-PlasenciaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Nielsen020, author = {Jesper Buus Nielsen and Mark Simkin}, editor = {Anne Canteaut and Yuval Ishai}, title = {Lower Bounds for Leakage-Resilient Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {556--577}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_20}, doi = {10.1007/978-3-030-45721-1\_20}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Nielsen020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Peikert20, author = {Chris Peikert}, editor = {Anne Canteaut and Yuval Ishai}, title = {He Gives C-Sieves on the {CSIDH}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {463--492}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_16}, doi = {10.1007/978-3-030-45724-2\_16}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Peikert20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PinkasRTY20, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Anne Canteaut and Yuval Ishai}, title = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {739--767}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_25}, doi = {10.1007/978-3-030-45724-2\_25}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PinkasRTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Rotem0S20, author = {Lior Rotem and Gil Segev and Ido Shahaf}, editor = {Anne Canteaut and Yuval Ishai}, title = {Generic-Group Delay Functions Require Hidden-Order Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {155--180}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_6}, doi = {10.1007/978-3-030-45727-3\_6}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Rotem0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SahaBRPM20, author = {Sayandeep Saha and Arnab Bag and Debapriya Basu Roy and Sikhar Patranabis and Debdeep Mukhopadhyay}, editor = {Anne Canteaut and Yuval Ishai}, title = {Fault Template Attacks on Block Ciphers Exploiting Fault Propagation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {612--643}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_22}, doi = {10.1007/978-3-030-45721-1\_22}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SahaBRPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Silverberg20, author = {Alice Silverberg}, editor = {Anne Canteaut and Yuval Ishai}, title = {Mathematics and Cryptography: {A} Marriage of Convenience? - Invited Talk}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {3--9}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_1}, doi = {10.1007/978-3-030-45721-1\_1}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Silverberg20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SimonBDGMP0S20, author = {Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel}, editor = {Anne Canteaut and Yuval Ishai}, title = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {581--611}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_21}, doi = {10.1007/978-3-030-45721-1\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SimonBDGMP0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Unal20, author = {Akin {\"{U}}nal}, editor = {Anne Canteaut and Yuval Ishai}, title = {Impossibility Results for Lattice-Based Functional Encryption Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {169--199}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_7}, doi = {10.1007/978-3-030-45721-1\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Unal20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2020-1, editor = {Anne Canteaut and Yuval Ishai}, title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1}, doi = {10.1007/978-3-030-45721-1}, isbn = {978-3-030-45720-4}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2020-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2020-2, editor = {Anne Canteaut and Yuval Ishai}, title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2}, doi = {10.1007/978-3-030-45724-2}, isbn = {978-3-030-45723-5}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2020-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2020-3, editor = {Anne Canteaut and Yuval Ishai}, title = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3}, doi = {10.1007/978-3-030-45727-3}, isbn = {978-3-030-45726-6}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2020-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001DHKS19, author = {Michael Backes and Nico D{\"{o}}ttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {281--311}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_10}, doi = {10.1007/978-3-030-17659-4\_10}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001DHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0030CS19, author = {Hao Chen and Ilaria Chillotti and Yongsoo Song}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Improved Bootstrapping for Approximate Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {34--54}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_2}, doi = {10.1007/978-3-030-17656-3\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/0030CS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbusalahKKPW19, author = {Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Reversible Proofs of Sequential Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {277--291}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_10}, doi = {10.1007/978-3-030-17656-3\_10}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbusalahKKPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgarwalAP19, author = {Navneet Agarwal and Sanat Anand and Manoj Prabhakaran}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Uncovering Algebraic Structures in the {MPC} Landscape}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {381--406}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_14}, doi = {10.1007/978-3-030-17656-3\_14}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgarwalAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AggarwalCLV19, author = {Divesh Aggarwal and Kai{-}Min Chung and Han{-}Hsuan Lin and Thomas Vidick}, editor = {Yuval Ishai and Vincent Rijmen}, title = {A Quantum-Proof Non-malleable Extractor - With Application to Privacy Amplification Against Active Quantum Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {442--469}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_16}, doi = {10.1007/978-3-030-17656-3\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AggarwalCLV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AggarwalDNOP19, author = {Divesh Aggarwal and Nico D{\"{o}}ttling and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Continuous Non-Malleable Codes in the 8-Split-State Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {531--561}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_18}, doi = {10.1007/978-3-030-17653-2\_18}, timestamp = {Tue, 14 May 2019 13:47:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AggarwalDNOP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Agrawal19, author = {Shweta Agrawal}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {191--225}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_7}, doi = {10.1007/978-3-030-17653-2\_7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Agrawal19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AharonovBCGLS19, author = {Dorit Aharonov and Zvika Brakerski and Kai{-}Min Chung and Ayal Green and Ching{-}Yi Lai and Or Sattath}, editor = {Yuval Ishai and Vincent Rijmen}, title = {On Quantum Advantage in Information Theoretic Single-Server {PIR}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {219--246}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_8}, doi = {10.1007/978-3-030-17659-4\_8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AharonovBCGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlamatiMP019, author = {Navid Alamati and Hart Montgomery and Sikhar Patranabis and Arnab Roy}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Minicrypt Primitives with Algebraic Structure and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {55--82}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_3}, doi = {10.1007/978-3-030-17656-3\_3}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlamatiMP019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtDHKPS19, author = {Martin R. Albrecht and L{\'{e}}o Ducas and Gottfried Herold and Elena Kirshanova and Eamonn W. Postlethwaite and Marc Stevens}, editor = {Yuval Ishai and Vincent Rijmen}, title = {The General Sieve Kernel and New Records in Lattice Reduction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {717--746}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_25}, doi = {10.1007/978-3-030-17656-3\_25}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtDHKPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenCD19, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis}, editor = {Yuval Ishai and Vincent Rijmen}, title = {The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {129--158}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_5}, doi = {10.1007/978-3-030-17653-2\_5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenCD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthCG019, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Two Round Information-Theoretic {MPC} with Malicious Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {532--561}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_19}, doi = {10.1007/978-3-030-17656-3\_19}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthCG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ApplebaumBFNP19, author = {Benny Applebaum and Amos Beimel and Oriol Farr{\`{a}}s and Oded Nir and Naty Peter}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Secret-Sharing Schemes for General and Uniform Access Structures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {441--471}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_15}, doi = {10.1007/978-3-030-17659-4\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ApplebaumBFNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ApplebaumBT19, author = {Benny Applebaum and Zvika Brakerski and Rotem Tsabary}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Degree 2 is Complete for the Round-Complexity of Malicious {MPC}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {504--531}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_18}, doi = {10.1007/978-3-030-17656-3\_18}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ApplebaumBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AragonBGHZ19, author = {Nicolas Aragon and Olivier Blazy and Philippe Gaborit and Adrien Hauteville and Gilles Z{\'{e}}mor}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Durandal: {A} Rank Metric Based Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {728--758}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_25}, doi = {10.1007/978-3-030-17659-4\_25}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AragonBGHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AsharovCNP0S19, author = {Gilad Asharov and T.{-}H. Hubert Chan and Kartik Nayak and Rafael Pass and Ling Ren and Elaine Shi}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Locality-Preserving Oblivious {RAM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {214--243}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_8}, doi = {10.1007/978-3-030-17656-3\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AsharovCNP0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Attrapadung19, author = {Nuttapong Attrapadung}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {34--67}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_2}, doi = {10.1007/978-3-030-17653-2\_2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Attrapadung19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AviramGJ19, author = {Nimrod Aviram and Kai Gellert and Tibor Jager}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Session Resumption Protocols and Efficient Forward Security for {TLS} 1.3 0-RTT}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {117--150}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_5}, doi = {10.1007/978-3-030-17656-3\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AviramGJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananS19, author = {Saikrishna Badrinarayanan and Akshayaram Srinivasan}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Revisiting Non-Malleable Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {593--622}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_20}, doi = {10.1007/978-3-030-17653-2\_20}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaetuDHTV19, author = {Ciprian Baetu and F. Bet{\"{u}}l Durak and Lo{\"{\i}}s Huguenin{-}Dumittan and Abdullah Talayhan and Serge Vaudenay}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Misuse Attacks on Post-quantum Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {747--776}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_26}, doi = {10.1007/978-3-030-17656-3\_26}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaetuDHTV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKLM19, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {501--530}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_17}, doi = {10.1007/978-3-030-17653-2\_17}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bar-OnDKW19, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Ariel Weizman}, editor = {Yuval Ishai and Vincent Rijmen}, title = {{DLCT:} {A} New Tool for Differential-Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {313--342}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_11}, doi = {10.1007/978-3-030-17653-2\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bar-OnDKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarakHJKS19, author = {Boaz Barak and Samuel B. Hopkins and Aayush Jain and Pravesh Kothari and Amit Sahai}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Sum-of-Squares Meets Program Obfuscation, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {226--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_8}, doi = {10.1007/978-3-030-17653-2\_8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarakHJKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartusekLMZ19, author = {James Bartusek and Tancr{\`{e}}de Lepoint and Fermi Ma and Mark Zhandry}, editor = {Yuval Ishai and Vincent Rijmen}, title = {New Techniques for Obfuscating Conjunctions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {636--666}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_22}, doi = {10.1007/978-3-030-17659-4\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartusekLMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ben-SassonCRSVW19, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Michael Riabzev and Nicholas Spooner and Madars Virza and Nicholas P. Ward}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Aurora: Transparent Succinct Arguments for {R1CS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {103--128}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_4}, doi = {10.1007/978-3-030-17653-2\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ben-SassonCRSVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bernstein0MP19, author = {Daniel J. Bernstein and Tanja Lange and Chloe Martindale and Lorenz Panny}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Quantum Circuits for the {CSIDH:} Optimizing Quantum Evaluation of Isogenies}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {409--441}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_15}, doi = {10.1007/978-3-030-17656-3\_15}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bernstein0MP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BitanskyHKY19, author = {Nir Bitansky and Iftach Haitner and Ilan Komargodski and Eylon Yogev}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Distributional Collision Resistance Beyond One-Way Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {667--695}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_23}, doi = {10.1007/978-3-030-17659-4\_23}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BitanskyHKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleKS19, author = {Elette Boyle and Lisa Kohl and Peter Scholl}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Homomorphic Secret Sharing from Lattices Without {FHE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {3--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_1}, doi = {10.1007/978-3-030-17656-3\_1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiLVW19, author = {Zvika Brakerski and Vadim Lyubashevsky and Vinod Vaikuntanathan and Daniel Wichs}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Worst-Case Hardness for {LPN} and Cryptographic Hashing via Code Smoothing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {619--635}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_21}, doi = {10.1007/978-3-030-17659-4\_21}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiLVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanteautLLNW19, author = {Anne Canteaut and Virginie Lallemand and Gregor Leander and Patrick Neumann and Friedrich Wiemer}, editor = {Yuval Ishai and Vincent Rijmen}, title = {bison Instantiating the Whitened Swap-Or-Not Construction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {585--616}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_20}, doi = {10.1007/978-3-030-17659-4\_20}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanteautLLNW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChanPS19, author = {T.{-}H. Hubert Chan and Rafael Pass and Elaine Shi}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Consensus Through Herding}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {720--749}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_24}, doi = {10.1007/978-3-030-17653-2\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChanPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheuSUZZ19, author = {Albert Cheu and Adam D. Smith and Jonathan R. Ullman and David Zeber and Maxim Zhilyaev}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Distributed Differential Privacy via Shuffling}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {375--403}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_13}, doi = {10.1007/978-3-030-17653-2\_13}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheuSUZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChoudhuriG019, author = {Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Founding Secure Computation on Blockchains}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {351--380}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_13}, doi = {10.1007/978-3-030-17656-3\_13}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChoudhuriG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ColadangeloGJV19, author = {Andrea Coladangelo and Alex Bredariol Grilo and Stacey Jeffery and Thomas Vidick}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {247--277}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_9}, doi = {10.1007/978-3-030-17659-4\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/ColadangeloGJV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Couteau19, author = {Geoffroy Couteau}, editor = {Yuval Ishai and Vincent Rijmen}, title = {A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {473--503}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_17}, doi = {10.1007/978-3-030-17656-3\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Couteau19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouteauH19, author = {Geoffroy Couteau and Dennis Hofheinz}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Designated-Verifier Pseudorandom Generators, and Their Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {562--592}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_20}, doi = {10.1007/978-3-030-17656-3\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouteauH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DinurKPRR19, author = {Itai Dinur and Daniel Kales and Angela Promitzer and Sebastian Ramacher and Christian Rechberger}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {343--372}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_12}, doi = {10.1007/978-3-030-17653-2\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DinurKPRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DinurN19, author = {Itai Dinur and Niv Nadler}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Multi-target Attacks on the Picnic Signature Scheme and Related Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {699--727}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_24}, doi = {10.1007/978-3-030-17659-4\_24}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DinurN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingLM19, author = {Nico D{\"{o}}ttling and Russell W. F. Lai and Giulio Malavolta}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Incremental Proofs of Sequential Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {292--323}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_11}, doi = {10.1007/978-3-030-17656-3\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DuttaNT19, author = {Avijit Dutta and Mridul Nandi and Suprita Talnikar}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Beyond Birthday Bound Secure {MAC} in Faulty Nonce Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {437--466}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_15}, doi = {10.1007/978-3-030-17653-2\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DuttaNT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DziembowskiEFHH19, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Julia Hesse and Kristina Host{\'{a}}kov{\'{a}}}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Multi-party Virtual State Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {625--656}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_21}, doi = {10.1007/978-3-030-17653-2\_21}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DziembowskiEFHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FehrY19, author = {Serge Fehr and Chen Yuan}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {472--499}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_16}, doi = {10.1007/978-3-030-17659-4\_16}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FehrY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FeoG19, author = {Luca De Feo and Steven D. Galbraith}, editor = {Yuval Ishai and Vincent Rijmen}, title = {SeaSign: Compact Isogeny Signatures from Class Group Actions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {759--789}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_26}, doi = {10.1007/978-3-030-17659-4\_26}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FeoG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Fisch19, author = {Ben Fisch}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Tight Proofs of Space and Replication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {324--348}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_12}, doi = {10.1007/978-3-030-17656-3\_12}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Fisch19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FuchsbauerOS19, author = {Georg Fuchsbauer and Michele Orr{\`{u}} and Yannick Seurin}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Aggregate Cash Systems: {A} Cryptographic Investigation of Mimblewimble}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {657--689}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_22}, doi = {10.1007/978-3-030-17653-2\_22}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FuchsbauerOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaneshOT19, author = {Chaya Ganesh and Claudio Orlandi and Daniel Tschudi}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Proof-of-Stake Protocols for Privacy-Aware Blockchains}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {690--719}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_23}, doi = {10.1007/978-3-030-17653-2\_23}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaneshOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargGH19, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, editor = {Yuval Ishai and Vincent Rijmen}, title = {New Techniques for Efficient Trapdoor Functions and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {33--63}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_2}, doi = {10.1007/978-3-030-17659-4\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GeniseMP19, author = {Nicholas Genise and Daniele Micciancio and Yuriy Polyakov}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {655--684}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_23}, doi = {10.1007/978-3-030-17656-3\_23}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GeniseMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GhoshN19, author = {Satrajit Ghosh and Tobias Nilges}, editor = {Yuval Ishai and Vincent Rijmen}, title = {An Algebraic Approach to Maliciously Secure Private Set Intersection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {154--185}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_6}, doi = {10.1007/978-3-030-17659-4\_6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GhoshN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalS19, author = {Vipul Goyal and Yifan Song}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Correlated-Source Extractors and Cryptography with Correlated-Random Tapes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {562--592}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_19}, doi = {10.1007/978-3-030-17653-2\_19}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GuanZ19, author = {Jiaxin Guan and Mark Zhandry}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Simple Schemes in the Bounded Storage Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {500--524}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_17}, doi = {10.1007/978-3-030-17659-4\_17}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GuanZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HamlinOWW19, author = {Ariel Hamlin and Rafail Ostrovsky and Mor Weiss and Daniel Wichs}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Private Anonymous Data Access}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {244--273}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_9}, doi = {10.1007/978-3-030-17656-3\_9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HamlinOWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HauckKL19, author = {Eduard Hauck and Eike Kiltz and Julian Loss}, editor = {Yuval Ishai and Vincent Rijmen}, title = {A Modular Treatment of Blind Signatures from Identification Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {345--375}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_12}, doi = {10.1007/978-3-030-17659-4\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HauckKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HoangMT19, author = {Viet Tung Hoang and David Miller and Ni Trieu}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Attacks only Get Better: How to Break {FF3} on Large Domains}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {85--116}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_4}, doi = {10.1007/978-3-030-17656-3\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HoangMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HongKKLW19, author = {Cheng Hong and Jonathan Katz and Vladimir Kolesnikov and Wen{-}jie Lu and Xiao Wang}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Covert Security with Public Verifiability: Faster, Leaner, and Simpler}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {97--121}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_4}, doi = {10.1007/978-3-030-17659-4\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HongKKLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JaegerT19, author = {Joseph Jaeger and Stefano Tessaro}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Tight Time-Memory Trade-Offs for Symmetric Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {467--497}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_16}, doi = {10.1007/978-3-030-17653-2\_16}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JaegerT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainL0S19, author = {Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, editor = {Yuval Ishai and Vincent Rijmen}, title = {How to Leverage Hardness of Constant-Degree Expanding Polynomials over {\textbackslash}mathbb {R} {R} to build i{\unicode{54442}} i {O}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {251--281}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_9}, doi = {10.1007/978-3-030-17653-2\_9}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainL0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JostMM19, author = {Daniel Jost and Ueli Maurer and Marta Mularczyk}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {159--188}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_6}, doi = {10.1007/978-3-030-17653-2\_6}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JostMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KamaraM19, author = {Seny Kamara and Tarik Moataz}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Computationally Volume-Hiding Structured Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {183--213}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_7}, doi = {10.1007/978-3-030-17656-3\_7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KamaraM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Katsumata019, author = {Shuichi Katsumata and Shota Yamada}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Group Signatures Without {NIZK:} From Lattices in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {312--344}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_11}, doi = {10.1007/978-3-030-17659-4\_11}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Katsumata019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y19, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {622--651}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_22}, doi = {10.1007/978-3-030-17656-3\_22}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KloossLR19, author = {Michael Kloo{\ss} and Anja Lehmann and Andy Rupp}, editor = {Yuval Ishai and Vincent Rijmen}, title = {{(R)CCA} Secure Updatable Encryption with Integrity Protection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {68--99}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_3}, doi = {10.1007/978-3-030-17653-2\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KloossLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kolsch19, author = {Lukas K{\"{o}}lsch}, editor = {Yuval Ishai and Vincent Rijmen}, title = {XOR-Counts and Lightweight Multiplication with Fixed Elements in Binary Finite Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {285--312}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_10}, doi = {10.1007/978-3-030-17653-2\_10}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kolsch19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KowalczykW19, author = {Lucas Kowalczyk and Hoeteck Wee}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Compact Adaptively Secure {ABE} for {\textbackslash}mathsf {NC1} from k-Lin}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {3--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_1}, doi = {10.1007/978-3-030-17653-2\_1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KowalczykW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeurentP19, author = {Ga{\"{e}}tan Leurent and Thomas Peyrin}, editor = {Yuval Ishai and Vincent Rijmen}, title = {From Collisions to Chosen-Prefix Collisions Application to Full {SHA-1}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {527--555}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_18}, doi = {10.1007/978-3-030-17659-4\_18}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeurentP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiS19, author = {Ting Li and Yao Sun}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Preimage Attacks on Round-Reduced Keccak-224/256 via an Allocating Approach}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {556--584}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_19}, doi = {10.1007/978-3-030-17659-4\_19}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuZ19, author = {Qipeng Liu and Mark Zhandry}, editor = {Yuval Ishai and Vincent Rijmen}, title = {On Finding Quantum Multi-collisions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {189--218}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_7}, doi = {10.1007/978-3-030-17659-4\_7}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Micciancio19, author = {Daniele Micciancio}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Symbolic Encryption with Pseudorandom Keys}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {64--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_3}, doi = {10.1007/978-3-030-17659-4\_3}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Micciancio19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pellet-MaryHS19, author = {Alice Pellet{-}Mary and Guillaume Hanrot and Damien Stehl{\'{e}}}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Approx-SVP in Ideal Lattices with Pre-processing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {685--716}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_24}, doi = {10.1007/978-3-030-17656-3\_24}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pellet-MaryHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PersianoY19, author = {Giuseppe Persiano and Kevin Yeo}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Lower Bounds for Differentially Private RAMs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {404--434}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_14}, doi = {10.1007/978-3-030-17653-2\_14}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PersianoY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pinkas0TY19, author = {Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Efficient Circuit-Based {PSI} with Linear Communication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {122--153}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_5}, doi = {10.1007/978-3-030-17659-4\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pinkas0TY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/QuachRW19, author = {Willy Quach and Ron D. Rothblum and Daniel Wichs}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Reusable Designated-Verifier NIZKs for all {NP} from {CDH}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {593--621}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_21}, doi = {10.1007/978-3-030-17656-3\_21}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/QuachRW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wesolowski19, author = {Benjamin Wesolowski}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Efficient Verifiable Delay Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {379--407}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_13}, doi = {10.1007/978-3-030-17659-4\_13}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wesolowski19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WoodageS19, author = {Joanne Woodage and Dan Shumow}, editor = {Yuval Ishai and Vincent Rijmen}, title = {An Analysis of {NIST} {SP} 800-90A}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {151--180}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_6}, doi = {10.1007/978-3-030-17656-3\_6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WoodageS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Zhandry19, author = {Mark Zhandry}, editor = {Yuval Ishai and Vincent Rijmen}, title = {On ELFs, Deterministic Encryption, and Correlated-Input Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {3--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_1}, doi = {10.1007/978-3-030-17659-4\_1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Zhandry19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Zhandry19a, author = {Mark Zhandry}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Quantum Lightning Never Strikes the Same State Twice}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {408--438}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_14}, doi = {10.1007/978-3-030-17659-4\_14}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Zhandry19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-1, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2}, doi = {10.1007/978-3-030-17653-2}, isbn = {978-3-030-17652-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-2, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3}, doi = {10.1007/978-3-030-17656-3}, isbn = {978-3-030-17655-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-3, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4}, doi = {10.1007/978-3-030-17659-4}, isbn = {978-3-030-17658-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0021GKW18, author = {Jie Chen and Junqing Gong and Lucas Kowalczyk and Hoeteck Wee}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Unbounded {ABE} via Bilinear Entropy Expansion, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {503--534}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_19}, doi = {10.1007/978-3-319-78381-9\_19}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0021GKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlagicGM18, author = {Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Unforgeable Quantum Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {489--519}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_16}, doi = {10.1007/978-3-319-78372-7\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlagicGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenBP18, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Sustained Space Complexity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {99--130}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_4}, doi = {10.1007/978-3-319-78375-8\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ApplebaumHMS18, author = {Benny Applebaum and Thomas Holenstein and Manoj Mishra and Ofer Shayevitz}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {The Communication Complexity of Private Simultaneous Messages, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {261--286}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_9}, doi = {10.1007/978-3-319-78375-8\_9}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ApplebaumHMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadertscherGMTZ18, author = {Christian Badertscher and Juan A. Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {But Why Does It Work? {A} Rational Protocol Design Treatment of Bitcoin}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {34--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_2}, doi = {10.1007/978-3-319-78375-8\_2}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadertscherGMTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallBMM18, author = {Marshall Ball and Elette Boyle and Tal Malkin and Tal Moran}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Exploring the Boundaries of Topology-Hiding Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {294--325}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_10}, doi = {10.1007/978-3-319-78372-7\_10}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallBMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKM18, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Non-malleable Codes from Average-Case Hardness: {\textdollar}{\textdollar}\{{\textbackslash}mathsf \{A\}\}\{{\textbackslash}mathsf \{C\}\}0{\textdollar}{\textdollar} , Decision Trees, and Streaming Space-Bounded Tampering}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {618--650}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_20}, doi = {10.1007/978-3-319-78372-7\_20}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarakBKK18, author = {Boaz Barak and Zvika Brakerski and Ilan Komargodski and Pravesh K. Kothari}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {649--679}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_21}, doi = {10.1007/978-3-319-78375-8\_21}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarakBKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartheBEFGRT18, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Thomas Espitau and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and M{\'{e}}lissa Rossi and Mehdi Tibouchi}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Masking the {GLP} Lattice-Based Signature Scheme at Any Order}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {354--384}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_12}, doi = {10.1007/978-3-319-78375-8\_12}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartheBEFGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeimelKN18, author = {Amos Beimel and Eyal Kushilevitz and Pnina Nissim}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {The Complexity of Multiparty {PSM} Protocols and Related Models}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {287--318}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_10}, doi = {10.1007/978-3-319-78375-8\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeimelKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BenhamoudaL18, author = {Fabrice Benhamouda and Huijia Lin}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {500--532}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_17}, doi = {10.1007/978-3-319-78375-8\_17}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BenhamoudaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BermanDRV18, author = {Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Multi-Collision Resistant Hash Functions and Their Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {133--161}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_5}, doi = {10.1007/978-3-319-78375-8\_5}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BermanDRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BerndtL18, author = {Sebastian Berndt and Maciej Liskiewicz}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {On the Gold Standard for Security of Universal Steganography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {29--60}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_2}, doi = {10.1007/978-3-319-78381-9\_2}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BerndtL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BhattacharyaN18, author = {Srimanta Bhattacharya and Mridul Nandi}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the {\textbackslash}chi 2 Method}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {387--412}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_15}, doi = {10.1007/978-3-319-78381-9\_15}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BhattacharyaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BloemGIKMW18, author = {Roderick Bloem and Hannes Gro{\ss} and Rinat Iusupov and Bettina K{\"{o}}nighofer and Stefan Mangard and Johannes Winter}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Formal Verification of Masked Hardware Implementations in the Presence of Glitches}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {321--353}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_11}, doi = {10.1007/978-3-319-78375-8\_11}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BloemGIKMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehISW18, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {222--255}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_8}, doi = {10.1007/978-3-319-78372-7\_8}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehISW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoseHT18, author = {Priyanka Bose and Viet Tung Hoang and Stefano Tessaro}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Revisiting {AES-GCM-SIV:} Multi-user Security, Faster Key Derivation, and Better Bounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {468--499}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_18}, doi = {10.1007/978-3-319-78381-9\_18}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoseHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiLSV18, author = {Zvika Brakerski and Alex Lombardi and Gil Segev and Vinod Vaikuntanathan}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {535--564}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_20}, doi = {10.1007/978-3-319-78381-9\_20}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiLSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CamenischDGLN18, author = {Jan Camenisch and Manu Drijvers and Tommaso Gagliardoni and Anja Lehmann and Gregory Neven}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {The Wonderful World of Global Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {280--312}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_11}, doi = {10.1007/978-3-319-78381-9\_11}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CamenischDGLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiCRR18, author = {Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {91--122}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_4}, doi = {10.1007/978-3-319-78381-9\_4}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiCRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastryckIV18, author = {Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Homomorphic {SIM} 2 {D} Operations: Single Instruction Much More Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {338--359}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_13}, doi = {10.1007/978-3-319-78381-9\_13}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastryckIV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaidosC18, author = {Pyrros Chaidos and Geoffroy Couteau}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {193--221}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_7}, doi = {10.1007/978-3-319-78372-7\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaidosC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenCL18, author = {Yi{-}Hsiu Chen and Kai{-}Min Chung and Jyun{-}Jie Liao}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {On the Complexity of Simulating Auxiliary Input}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {371--390}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_12}, doi = {10.1007/978-3-319-78372-7\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenH18, author = {Hao Chen and Kyoohyung Han}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Homomorphic Lower Digits Removal and Improved {FHE} Bootstrapping}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {315--337}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_12}, doi = {10.1007/978-3-319-78381-9\_12}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheonHKKS18, author = {Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Bootstrapping for Approximate Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {360--384}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_14}, doi = {10.1007/978-3-319-78381-9\_14}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheonHKKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CidHPSS18, author = {Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Boomerang Connectivity Table: {A} New Cryptanalysis Tool}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {683--714}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_22}, doi = {10.1007/978-3-319-78375-8\_22}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CidHPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CohenP18, author = {Bram Cohen and Krzysztof Pietrzak}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Simple Proofs of Sequential Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {451--467}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_15}, doi = {10.1007/978-3-319-78375-8\_15}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CohenP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CorettiDGS18, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo and John P. Steinberger}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Random Oracles and Non-uniformity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {227--258}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_9}, doi = {10.1007/978-3-319-78381-9\_9}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CorettiDGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Corrigan-GibbsK18, author = {Henry Corrigan{-}Gibbs and Dmitry Kogan}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {The Discrete-Logarithm Problem with Preprocessing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {415--447}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_14}, doi = {10.1007/978-3-319-78375-8\_14}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Corrigan-GibbsK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DavidGKR18, author = {Bernardo David and Peter Gazi and Aggelos Kiayias and Alexander Russell}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {66--98}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_3}, doi = {10.1007/978-3-319-78375-8\_3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DavidGKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DegabrieleS18, author = {Jean Paul Degabriele and Martijn Stam}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Untagging Tor: {A} Formal Treatment of Onion Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {259--293}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_9}, doi = {10.1007/978-3-319-78372-7\_9}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DegabrieleS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DerlerJSS18, author = {David Derler and Tibor Jager and Daniel Slamanig and Christoph Striecks}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {425--455}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_14}, doi = {10.1007/978-3-319-78372-7\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DerlerJSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dinur18, author = {Itai Dinur}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {An Improved Affine Equivalence Algorithm for Random Permutations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {413--442}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_16}, doi = {10.1007/978-3-319-78381-9\_16}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dinur18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ducas18, author = {L{\'{e}}o Ducas}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Shortest Vector from Lattice Sieving: {A} Few Dimensions for Free}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {125--145}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_5}, doi = {10.1007/978-3-319-78381-9\_5}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ducas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DupontHPRY18, author = {Pierre{-}Alain Dupont and Julia Hesse and David Pointcheval and Leonid Reyzin and Sophia Yakoubov}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Fuzzy Password-Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {393--424}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_13}, doi = {10.1007/978-3-319-78372-7\_13}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DupontHPRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/EisentragerHLMP18, author = {Kirsten Eisentr{\"{a}}ger and Sean Hallgren and Kristin E. Lauter and Travis Morrison and Christophe Petit}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {329--368}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_11}, doi = {10.1007/978-3-319-78372-7\_11}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EisentragerHLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FarrasKMP18, author = {Oriol Farr{\`{a}}s and Tarik Kaced and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Carles Padr{\'{o}}}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {597--621}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_22}, doi = {10.1007/978-3-319-78381-9\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FarrasKMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FleischhackerG018, author = {Nils Fleischhacker and Vipul Goyal and Abhishek Jain}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {On the Existence of Three Round Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {3--33}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_1}, doi = {10.1007/978-3-319-78372-7\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FleischhackerG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKP18, author = {Sanjam Garg and Susumu Kiyoshima and Omkant Pandey}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {A New Approach to Black-Box Concurrent Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {566--599}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_19}, doi = {10.1007/978-3-319-78375-8\_19}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargS18, author = {Sanjam Garg and Akshayaram Srinivasan}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Two-Round Multiparty Secure Computation from Minimal Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {468--499}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_16}, doi = {10.1007/978-3-319-78375-8\_16}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargS18a, author = {Sanjam Garg and Akshayaram Srinivasan}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Adaptively Secure Garbling with Near Optimal Online Complexity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {535--565}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_18}, doi = {10.1007/978-3-319-78375-8\_18}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GayHKP18, author = {Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {More Efficient (Almost) Tightly Secure Structure-Preserving Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {230--258}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_8}, doi = {10.1007/978-3-319-78375-8\_8}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GayHKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GeniseM18, author = {Nicholas Genise and Daniele Micciancio}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {174--203}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_7}, doi = {10.1007/978-3-319-78381-9\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GeniseM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrossoS18, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Masking Proofs Are Tight and How to Exploit it in Security Evaluations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {385--412}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_13}, doi = {10.1007/978-3-319-78375-8\_13}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrossoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerW18, author = {Susan Hohenberger and Brent Waters}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Synchronized Aggregate Signatures from the {RSA} Assumption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {197--229}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_7}, doi = {10.1007/978-3-319-78375-8\_7}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HubacekRV18, author = {Pavel Hub{\'{a}}cek and Alon Rosen and Margarita Vald}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {66--87}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_3}, doi = {10.1007/978-3-319-78372-7\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HubacekRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JareckiKX18, author = {Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {{OPAQUE:} An Asymmetric {PAKE} Protocol Secure Against Pre-computation Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {456--486}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_15}, doi = {10.1007/978-3-319-78372-7\_15}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JareckiKX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KalaiKS18, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {34--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_2}, doi = {10.1007/978-3-319-78372-7\_2}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KalaiKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KanukurthiOS18, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Non-malleable Randomness Encoders and Their Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {589--617}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_19}, doi = {10.1007/978-3-319-78372-7\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KanukurthiOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KellerPR18, author = {Marcel Keller and Valerio Pastro and Dragos Rotaru}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Overdrive: Making {SPDZ} Great Again}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {158--189}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_6}, doi = {10.1007/978-3-319-78372-7\_6}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KellerPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KellerY18, author = {Marcel Keller and Avishay Yanai}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Efficient Maliciously Secure Multiparty Computation for {RAM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {91--124}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_4}, doi = {10.1007/978-3-319-78372-7\_4}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KellerY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzLS18, author = {Eike Kiltz and Vadim Lyubashevsky and Christian Schaffner}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {552--586}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_18}, doi = {10.1007/978-3-319-78372-7\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KitagawaNT18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Obfustopia Built on Secret-Key Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {603--648}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_20}, doi = {10.1007/978-3-319-78375-8\_20}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KitagawaNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KomargodskiNY18, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {162--194}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_6}, doi = {10.1007/978-3-319-78375-8\_6}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KomargodskiNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KomargodskiY18, author = {Ilan Komargodski and Eylon Yogev}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Another Step Towards Realizing Random Oracles: Non-malleable Point Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {259--279}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_10}, doi = {10.1007/978-3-319-78381-9\_10}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KomargodskiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LehmannT18, author = {Anja Lehmann and Bj{\"{o}}rn Tackmann}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Updatable Encryption with Post-Compromise Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {685--716}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_22}, doi = {10.1007/978-3-319-78372-7\_22}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LehmannT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeurentS18, author = {Ga{\"{e}}tan Leurent and Ferdinand Sibleyras}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {The Missing Difference Problem, and Its Applications to Counter Mode Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {745--770}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_24}, doi = {10.1007/978-3-319-78375-8\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeurentS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuVW18, author = {Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Towards Breaking the Exponential Barrier for General Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {567--596}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_21}, doi = {10.1007/978-3-319-78381-9\_21}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LiuYWL18, author = {Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {715--744}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_23}, doi = {10.1007/978-3-319-78375-8\_23}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LiuYWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuykxP18, author = {Atul Luykx and Bart Preneel}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {445--467}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_17}, doi = {10.1007/978-3-319-78381-9\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuykxP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LyubashevskyS18, author = {Vadim Lyubashevsky and Gregor Seiler}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {204--224}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_8}, doi = {10.1007/978-3-319-78381-9\_8}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LyubashevskyS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Micciancio018, author = {Daniele Micciancio and Michael Walter}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {On the Bit Security of Cryptographic Primitives}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {3--28}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_1}, doi = {10.1007/978-3-319-78381-9\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Micciancio018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PassS18, author = {Rafael Pass and Elaine Shi}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Thunderella: Blockchains with Optimistic Instant Confirmation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {3--33}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_1}, doi = {10.1007/978-3-319-78375-8\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PassS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pinkas0WW18, author = {Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Efficient Circuit-Based {PSI} via Cuckoo Hashing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {125--157}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_5}, doi = {10.1007/978-3-319-78372-7\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pinkas0WW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RoscaSW18, author = {Miruna Rosca and Damien Stehl{\'{e}} and Alexandre Wallet}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {On the Ring-LWE and Polynomial-LWE Problems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {146--173}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_6}, doi = {10.1007/978-3-319-78381-9\_6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RoscaSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SaitoXY18, author = {Tsunekazu Saito and Keita Xagawa and Takashi Yamakawa}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {520--551}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_17}, doi = {10.1007/978-3-319-78372-7\_17}, timestamp = {Sat, 05 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SaitoXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SoniT18, author = {Pratik Soni and Stefano Tessaro}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Naor-Reingold Goes Public: The Complexity of Known-Key Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {653--684}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_21}, doi = {10.1007/978-3-319-78372-7\_21}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SoniT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wang0HT18, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Memory Lower Bounds of Reductions Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {61--90}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_3}, doi = {10.1007/978-3-319-78381-9\_3}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wang0HT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhangXM18, author = {Bin Zhang and Chao Xu and Willi Meier}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Fast Near Collision Attack on the Grain v1 Stream Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {771--802}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_25}, doi = {10.1007/978-3-319-78375-8\_25}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhangXM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2018-1, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9}, doi = {10.1007/978-3-319-78381-9}, isbn = {978-3-319-78380-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2018-2, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8}, doi = {10.1007/978-3-319-78375-8}, isbn = {978-3-319-78374-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2018-3, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7}, doi = {10.1007/978-3-319-78372-7}, isbn = {978-3-319-78371-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2018-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001HJL17, author = {Felix G{\"{u}}nther and Britta Hale and Tibor Jager and Sebastian Lauer}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {0-RTT Key Exchange with Full Forward Secrecy}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {519--548}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_18}, doi = {10.1007/978-3-319-56617-7\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001HJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001RR17, author = {Lorenzo Grassi and Christian Rechberger and Sondre R{\o}njom}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {A New Structural-Differential Property of 5-Round {AES}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {289--317}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_10}, doi = {10.1007/978-3-319-56614-6\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001RR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaG0W17, author = {Michel Abdalla and Romain Gay and Mariana Raykova and Hoeteck Wee}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Multi-input Inner-Product Functional Encryption from Pairings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {601--626}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_21}, doi = {10.1007/978-3-319-56620-7\_21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaG0W17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalC17, author = {Shashank Agrawal and Melissa Chase}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Simplifying Design and Analysis of Complex Predicate Encryption Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {627--656}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_22}, doi = {10.1007/978-3-319-56620-7\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalW17, author = {Shashank Agrawal and David J. Wu}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {30--61}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_2}, doi = {10.1007/978-3-319-56614-6\_2}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AkaviaM17, author = {Adi Akavia and Tal Moran}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Topology-Hiding Computation Beyond Logarithmic Diameter}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {609--637}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_21}, doi = {10.1007/978-3-319-56617-7\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AkaviaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlagicR17, author = {Gorjan Alagic and Alexander Russell}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {65--93}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_3}, doi = {10.1007/978-3-319-56617-7\_3}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlagicR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Albrecht17, author = {Martin R. Albrecht}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {On Dual Lattice Attacks Against Small-Secret {LWE} and Parameter Choices in HElib and {SEAL}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {103--129}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_4}, doi = {10.1007/978-3-319-56614-6\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Albrecht17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenBP17, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Depth-Robust Graphs and Their Cumulative Memory Complexity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {3--32}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_1}, doi = {10.1007/978-3-319-56617-7\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenCPRT17, author = {Jo{\"{e}}l Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Scrypt Is Maximally Memory-Hard}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {33--62}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_2}, doi = {10.1007/978-3-319-56617-7\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenCPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthCJ17, author = {Prabhanjan Ananth and Aloni Cohen and Abhishek Jain}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Cryptography with Updates}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {445--472}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_15}, doi = {10.1007/978-3-319-56614-6\_15}, timestamp = {Tue, 25 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthJS17, author = {Prabhanjan Ananth and Aayush Jain and Amit Sahai}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {91--121}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_4}, doi = {10.1007/978-3-319-56620-7\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthJS17a, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Patchable Indistinguishability Obfuscation: i\emph{O} for Evolving Software}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {127--155}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_5}, doi = {10.1007/978-3-319-56617-7\_5}, timestamp = {Tue, 25 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthJS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthS17, author = {Prabhanjan Ananth and Amit Sahai}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {152--181}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_6}, doi = {10.1007/978-3-319-56620-7\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AonoN17, author = {Yoshinori Aono and Phong Q. Nguyen}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Random Sampling Revisited: Lattice Enumeration with Discrete Pruning}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {65--102}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_3}, doi = {10.1007/978-3-319-56614-6\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AonoN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananK17, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {382--411}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_14}, doi = {10.1007/978-3-319-56620-7\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartheDFGSS17, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Sebastian Faust and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {535--566}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_19}, doi = {10.1007/978-3-319-56620-7\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartheDFGSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BauchBVLV17, author = {Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Short Generators Without Quantum Computers: The Case of Multiquadratics}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {27--59}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_2}, doi = {10.1007/978-3-319-56620-7\_2}, timestamp = {Mon, 25 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BauchBVLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeimelIK17, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Ad Hoc {PSM} Protocols: Secure Computation Without Coordination}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {580--608}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_20}, doi = {10.1007/978-3-319-56617-7\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeimelIK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ben-SassonBCGGH17, author = {Eli Ben{-}Sasson and Iddo Bentov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Computational Integrity with a Public Random String from Quasi-Linear PCPs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {551--579}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_19}, doi = {10.1007/978-3-319-56617-7\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ben-SassonBCGGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BiasseEFGK17, author = {Jean{-}Fran{\c{c}}ois Biasse and Thomas Espitau and Pierre{-}Alain Fouque and Alexandre G{\'{e}}lin and Paul Kirchner}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Computing Generator in Cyclotomic Integer Rings - {A} Subfield Algorithm for the Principal Ideal Problem in L\({}_{\mbox{{\(\vert\)}{\(\Delta\)}{\(\mathbb{K}\)}{\(\vert\)}}}\)({\textonehalf}) and Application to the Cryptanalysis of a {FHE} Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {60--88}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_3}, doi = {10.1007/978-3-319-56620-7\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BiasseEFGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BitanskyLP17, author = {Nir Bitansky and Huijia Lin and Omer Paneth}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {On Removing Graded Encodings from Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {3--29}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_1}, doi = {10.1007/978-3-319-56614-6\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BitanskyLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BitanskyV17, author = {Nir Bitansky and Vinod Vaikuntanathan}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {A Note on Perfect Correctness by Derandomization}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {592--606}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_20}, doi = {10.1007/978-3-319-56614-6\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BitanskyV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehISW17, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {247--277}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_9}, doi = {10.1007/978-3-319-56617-7\_9}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehISW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehKM17, author = {Dan Boneh and Sam Kim and Hart William Montgomery}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Private Puncturable PRFs from Standard Lattice Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {415--445}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_15}, doi = {10.1007/978-3-319-56620-7\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleGI17, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {163--193}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_6}, doi = {10.1007/978-3-319-56614-6\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleGI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BroadnaxDHMN17, author = {Brandon Broadnax and Nico D{\"{o}}ttling and Gunnar Hartung and J{\"{o}}rn M{\"{u}}ller{-}Quade and Matthias Nagel}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Concurrently Composable Security with Shielded Super-Polynomial Simulators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {351--381}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_13}, doi = {10.1007/978-3-319-56620-7\_13}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BroadnaxDHMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiC17, author = {Ran Canetti and Yilei Chen}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Constraint-Hiding Constrained PRFs for NC\({}^{\mbox{1}}\) from {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {446--476}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_16}, doi = {10.1007/978-3-319-56620-7\_16}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaillouxL17, author = {Andr{\'{e}} Chailloux and Anthony Leverrier}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Relativistic (or 2-Prover 1-Round) Zero-Knowledge Protocol for {\textbackslash}mathsf {NP} Secure Against Quantum Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {369--396}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_13}, doi = {10.1007/978-3-319-56617-7\_13}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaillouxL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenGH17, author = {Yilei Chen and Craig Gentry and Shai Halevi}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Cryptanalyses of Candidate Branching Program Obfuscators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {278--307}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_10}, doi = {10.1007/978-3-319-56617-7\_10}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chiesa0LMMM17, author = {Alessandro Chiesa and Matthew Green and Jingcheng Liu and Peihan Miao and Ian Miers and Pratyush Mishra}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Decentralized Anonymous Micropayments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {609--642}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_21}, doi = {10.1007/978-3-319-56614-6\_21}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chiesa0LMMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CostelloJLNRU17, author = {Craig Costello and David Jao and Patrick Longa and Michael Naehrig and Joost Renes and David Urbanik}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Efficient Compression of {SIDH} Public Keys}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {679--706}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_24}, doi = {10.1007/978-3-319-56620-7\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CostelloJLNRU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouteauPP17, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Removing the Strong {RSA} Assumption from Arguments over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {321--350}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_11}, doi = {10.1007/978-3-319-56614-6\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouteauPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDW17, author = {Ronald Cramer and L{\'{e}}o Ducas and Benjamin Wesolowski}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Short Stickelberger Class Relations and Application to Ideal-SVP}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {324--348}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_12}, doi = {10.1007/978-3-319-56620-7\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDXY17, author = {Ronald Cramer and Ivan Damg{\aa}rd and Chaoping Xing and Chen Yuan}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {479--500}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_17}, doi = {10.1007/978-3-319-56620-7\_17}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Deng17, author = {Yi Deng}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Magic Adversaries Versus Individual Reduction: Science Wins Either Way}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {351--377}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_12}, doi = {10.1007/978-3-319-56614-6\_12}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Deng17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisGK17, author = {Yevgeniy Dodis and Siyao Guo and Jonathan Katz}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {473--495}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_16}, doi = {10.1007/978-3-319-56614-6\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FanGK17, author = {Xiong Fan and Chaya Ganesh and Vladimir Kolesnikov}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Hashing Garbled Circuits for Free}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {456--485}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_16}, doi = {10.1007/978-3-319-56617-7\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FanGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FehrS17, author = {Serge Fehr and Louis Salvail}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Quantum Authentication and Encryption with Key Recycling - Or: How to Re-use a One-Time Pad Even if P=NP - Safely {\&} Feasibly}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {311--338}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_11}, doi = {10.1007/978-3-319-56617-7\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FehrS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FriedGHT17, author = {Joshua Fried and Pierrick Gaudry and Nadia Heninger and Emmanuel Thom{\'{e}}}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {A Kilobit Hidden {SNFS} Discrete Logarithm Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {202--231}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_8}, doi = {10.1007/978-3-319-56620-7\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FriedGHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FurukawaLNW17, author = {Jun Furukawa and Yehuda Lindell and Ariel Nof and Or Weinstein}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {225--255}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_8}, doi = {10.1007/978-3-319-56614-6\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FurukawaLNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKP17, author = {Sanjam Garg and Susumu Kiyoshima and Omkant Pandey}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {On the Exact Round Complexity of Self-composable Two-Party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {194--224}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_7}, doi = {10.1007/978-3-319-56614-6\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargPSZ17, author = {Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Breaking the Sub-Exponential Barrier in Obfustopia}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {156--181}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_6}, doi = {10.1007/978-3-319-56617-7\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargPSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoudarziR17, author = {Dahmun Goudarzi and Matthieu Rivain}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {How Fast Can Higher-Order Masking Be in Software?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {567--597}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_20}, doi = {10.1007/978-3-319-56620-7\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoudarziR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalKW17, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {528--557}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_18}, doi = {10.1007/978-3-319-56614-6\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrubbsRY17, author = {Paul Grubbs and Thomas Ristenpart and Yuval Yarom}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Modifying an Enciphering Scheme After Deployment}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {499--527}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_17}, doi = {10.1007/978-3-319-56614-6\_17}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrubbsRY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HajiabadiK17, author = {Mohammad Hajiabadi and Bruce M. Kapron}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {561--591}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_19}, doi = {10.1007/978-3-319-56614-6\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/HajiabadiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HoangT17, author = {Viet Tung Hoang and Stefano Tessaro}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {The Multi-user Security of Double Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {381--411}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_13}, doi = {10.1007/978-3-319-56614-6\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HoangT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Hofheinz17, author = {Dennis Hofheinz}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Adaptive Partitioning}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {489--518}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_17}, doi = {10.1007/978-3-319-56617-7\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Hofheinz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HuangWXWZ17, author = {Senyang Huang and Xiaoyun Wang and Guangwu Xu and Meiqin Wang and Jingyuan Zhao}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Conditional Cube Attack on Reduced-Round Keccak Sponge Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {259--288}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_9}, doi = {10.1007/978-3-319-56614-6\_9}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/HuangWXWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KamaraM17, author = {Seny Kamara and Tarik Moataz}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {94--124}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_4}, doi = {10.1007/978-3-319-56617-7\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KamaraM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KirchnerF17, author = {Paul Kirchner and Pierre{-}Alain Fouque}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Revisiting Lattice Attacks on Overstretched {NTRU} Parameters}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {3--26}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_1}, doi = {10.1007/978-3-319-56620-7\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KirchnerF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KleinjungDLPS17, author = {Thorsten Kleinjung and Claus Diem and Arjen K. Lenstra and Christine Priplata and Colin Stahlke}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Computation of a 768-Bit Prime Field Discrete Logarithm}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {185--201}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_7}, doi = {10.1007/978-3-319-56620-7\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KleinjungDLPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kohel17, author = {David Kohel}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Twisted {\(\mu\)}\({}_{\mbox{4}}\)-Normal Form for Elliptic Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {659--678}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_23}, doi = {10.1007/978-3-319-56620-7\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kohel17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KomargodskiS17, author = {Ilan Komargodski and Gil Segev}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {From Minicrypt to Obfustopia via Private-Key Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {122--151}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_5}, doi = {10.1007/978-3-319-56620-7\_5}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KomargodskiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LyubashevskyN17, author = {Vadim Lyubashevsky and Gregory Neven}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {One-Shot Verifiable Encryption from Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {293--323}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_11}, doi = {10.1007/978-3-319-56620-7\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LyubashevskyN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MohasselR17, author = {Payman Mohassel and Mike Rosulek}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Non-interactive Secure 2PC in the Offline/Online and Batch Settings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {425--455}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_15}, doi = {10.1007/978-3-319-56617-7\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MohasselR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MohasselRS17, author = {Payman Mohassel and Mike Rosulek and Alessandra Scafuro}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Sublinear Zero-Knowledge Arguments for {RAM} Programs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {501--531}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_18}, doi = {10.1007/978-3-319-56620-7\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MohasselRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PassSS17, author = {Rafael Pass and Lior Seeman and Abhi Shelat}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Analysis of the Blockchain Protocol in Asynchronous Networks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {643--673}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_22}, doi = {10.1007/978-3-319-56614-6\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PassSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PassST17, author = {Rafael Pass and Elaine Shi and Florian Tram{\`{e}}r}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Formal Abstractions for Attested Execution Secure Processors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {260--289}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_10}, doi = {10.1007/978-3-319-56620-7\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PassST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Portmann17, author = {Christopher Portmann}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Quantum Authentication with Key Recycling}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {339--368}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_12}, doi = {10.1007/978-3-319-56617-7\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Portmann17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/QiaoSL017, author = {Kexin Qiao and Ling Song and Meicheng Liu and Jian Guo}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {New Collision Attacks on Round-Reduced Keccak}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {216--243}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_8}, doi = {10.1007/978-3-319-56617-7\_8}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/QiaoSL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RindalR17, author = {Peter Rindal and Mike Rosulek}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Improved Private Set Intersection Against Malicious Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {235--259}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_9}, doi = {10.1007/978-3-319-56620-7\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RindalR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SasakiT17, author = {Yu Sasaki and Yosuke Todo}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {185--215}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_7}, doi = {10.1007/978-3-319-56617-7\_7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SasakiT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SoniT17, author = {Pratik Soni and Stefano Tessaro}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Public-Seed Pseudorandom Permutations}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {412--441}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_14}, doi = {10.1007/978-3-319-56614-6\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SoniT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TakayasuLP17, author = {Atsushi Takayasu and Yao Lu and Liqiang Peng}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Small CRT-Exponent {RSA} Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {130--159}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_5}, doi = {10.1007/978-3-319-56614-6\_5}, timestamp = {Sun, 10 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TakayasuLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangMK17, author = {Xiao Wang and Alex J. Malozemoff and Jonathan Katz}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Faster Secure Two-Party Computation in the Single-Execution Setting}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {399--424}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_14}, doi = {10.1007/978-3-319-56617-7\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2017-1, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7}, doi = {10.1007/978-3-319-56620-7}, isbn = {978-3-319-56619-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2017-2, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6}, doi = {10.1007/978-3-319-56614-6}, isbn = {978-3-319-56613-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2017-3, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7}, doi = {10.1007/978-3-319-56617-7}, isbn = {978-3-319-56616-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2017-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtP16, author = {Martin R. Albrecht and Kenneth G. Paterson}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation of {TLS}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {622--643}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_24}, doi = {10.1007/978-3-662-49890-3\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenCKKPT16, author = {Jo{\"{e}}l Alwen and Binyi Chen and Chethan Kamath and Vladimir Kolmogorov and Krzysztof Pietrzak and Stefano Tessaro}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {358--387}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_13}, doi = {10.1007/978-3-662-49896-5\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenCKKPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AmbronaBS16, author = {Miguel Ambrona and Gilles Barthe and Benedikt Schmidt}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {822--851}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_29}, doi = {10.1007/978-3-662-49896-5\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AmbronaBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AndrychowiczDF16, author = {Marcin Andrychowicz and Stefan Dziembowski and Sebastian Faust}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Circuit Compilers with O(1/{\textbackslash}log (n)) Leakage Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {586--615}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_21}, doi = {10.1007/978-3-662-49896-5\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AndrychowiczDF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AonoW0T16, author = {Yoshinori Aono and Yuntao Wang and Takuya Hayashi and Tsuyoshi Takagi}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Improved Progressive {BKZ} Algorithms and Their Precise Cost Estimation by Sharp Simulator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {789--819}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_30}, doi = {10.1007/978-3-662-49890-3\_30}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AonoW0T16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaderJLS16, author = {Christoph Bader and Tibor Jager and Yong Li and Sven Sch{\"{a}}ge}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Impossibility of Tight Cryptographic Reductions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {273--304}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_10}, doi = {10.1007/978-3-662-49896-5\_10}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaderJLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananM16, author = {Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {764--791}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_27}, doi = {10.1007/978-3-662-49896-5\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKM16, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {881--908}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_31}, doi = {10.1007/978-3-662-49896-5\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BelaidBPPTV16, author = {Sonia Bela{\"{\i}}d and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Randomness Complexity of Private Circuits for Multiplication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {616--648}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_22}, doi = {10.1007/978-3-662-49896-5\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BelaidBPPTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareBT16, author = {Mihir Bellare and Daniel J. Bernstein and Stefano Tessaro}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Hash-Function Based PRFs: {AMAC} and Its Multi-User Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {566--595}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_22}, doi = {10.1007/978-3-662-49890-3\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareSW16, author = {Mihir Bellare and Igors Stepanovs and Brent Waters}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {New Negative Results on Differing-Inputs Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {792--821}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_28}, doi = {10.1007/978-3-662-49896-5\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareT16, author = {Mihir Bellare and Bj{\"{o}}rn Tackmann}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Nonce-Based Cryptography: Retaining Security When Randomness Fails}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {729--757}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_28}, doi = {10.1007/978-3-662-49890-3\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BiryukovPU16, author = {Alex Biryukov and L{\'{e}}o Perrin and Aleksei Udovenko}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {372--402}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_15}, doi = {10.1007/978-3-662-49890-3\_15}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BiryukovPU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BishopPRW16, author = {Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {58--86}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_3}, doi = {10.1007/978-3-662-49890-3\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BishopPRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BootleCCGP16, author = {Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Jens Groth and Christophe Petit}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {327--357}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_12}, doi = {10.1007/978-3-662-49896-5\_12}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BootleCCGP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiKS16, author = {Zvika Brakerski and Ilan Komargodski and Gil Segev}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {852--880}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_30}, doi = {10.1007/978-3-662-49896-5\_30}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrzuskaJS16, author = {Christina Brzuska and H{\aa}kon Jacobsen and Douglas Stebila}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Safely Exporting Keys from Secure Channels - On the Security of {EAP-TLS} and {TLS} Key Exporters}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {670--698}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_26}, doi = {10.1007/978-3-662-49890-3\_26}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrzuskaJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiFPRS16, author = {Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam D. Smith}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Reusable Fuzzy Extractors for Low-Entropy Distributions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {117--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_5}, doi = {10.1007/978-3-662-49890-3\_5}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiFPRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastryckIV16, author = {Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Provably Weak Instances of Ring-LWE Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {147--167}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_6}, doi = {10.1007/978-3-662-49890-3\_6}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastryckIV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheonFLMR16, author = {Jung Hee Cheon and Pierre{-}Alain Fouque and Changmin Lee and Brice Minaud and Hansol Ryu}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Cryptanalysis of the New {CLT} Multilinear Map over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {509--536}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_20}, doi = {10.1007/978-3-662-49890-3\_20}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheonFLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CiampiPSSV16, author = {Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Online/Offline {OR} Composition of Sigma Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {63--92}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_3}, doi = {10.1007/978-3-662-49896-5\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CiampiPSSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDPR16, author = {Ronald Cramer and L{\'{e}}o Ducas and Chris Peikert and Oded Regev}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {559--585}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_20}, doi = {10.1007/978-3-662-49896-5\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dachman-SoledKT16, author = {Dana Dachman{-}Soled and Jonathan Katz and Aishwarya Thiruvengadam}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {10-Round Feistel is Indifferentiable from an Ideal Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {649--678}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_23}, doi = {10.1007/978-3-662-49896-5\_23}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dachman-SoledKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardNOR16, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Rafail Ostrovsky and Adi Ros{\'{e}}n}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Unconditionally Secure Computation with Reduced Interaction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {420--447}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_15}, doi = {10.1007/978-3-662-49896-5\_15}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardNOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DeshpandeKW16, author = {Apoorvaa Deshpande and Venkata Koppula and Brent Waters}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Constrained Pseudorandom Functions for Unconstrained Inputs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {124--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_5}, doi = {10.1007/978-3-662-49896-5\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DeshpandeKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dinur16, author = {Itai Dinur}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {New Attacks on the Concatenation and {XOR} Hash Combiners}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {484--508}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_19}, doi = {10.1007/978-3-662-49890-3\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dinur16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisSSL16, author = {Yevgeniy Dodis and Martijn Stam and John P. Steinberger and Tianren Liu}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Indifferentiability of Confusion-Diffusion Networks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {679--704}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_24}, doi = {10.1007/978-3-662-49896-5\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisSSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucasS16, author = {L{\'{e}}o Ducas and Damien Stehl{\'{e}}}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Sanitization of {FHE} Ciphertexts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {294--310}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_12}, doi = {10.1007/978-3-662-49890-3\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucasS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DurvauxS16, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {240--262}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_10}, doi = {10.1007/978-3-662-49890-3\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DurvauxS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FehrF16, author = {Serge Fehr and Max Fillinger}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {477--496}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_17}, doi = {10.1007/978-3-662-49896-5\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FehrF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GamaINX16, author = {Nicolas Gama and Malika Izabach{\`{e}}ne and Phong Q. Nguyen and Xiang Xie}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {528--558}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_19}, doi = {10.1007/978-3-662-49896-5\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GamaINX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargMPP16, author = {Sanjam Garg and Pratyay Mukherjee and Omkant Pandey and Antigoni Polychroniadou}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {The Exact Round Complexity of Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {448--476}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_16}, doi = {10.1007/978-3-662-49896-5\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargMPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GayHKW16, author = {Romain Gay and Dennis Hofheinz and Eike Kiltz and Hoeteck Wee}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Tightly CCA-Secure Encryption Without Pairings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {1--27}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_1}, doi = {10.1007/978-3-662-49890-3\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GayHKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaziT16, author = {Peter Gazi and Stefano Tessaro}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Provably Robust Sponge-Based PRNGs and KDFs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {87--116}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_4}, doi = {10.1007/978-3-662-49890-3\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaziT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrangerJMN16, author = {Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {263--293}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_11}, doi = {10.1007/978-3-662-49890-3\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrangerJMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Groth16, author = {Jens Groth}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Size of Pairing-Based Non-interactive Arguments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {305--326}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_11}, doi = {10.1007/978-3-662-49896-5\_11}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Groth16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HuJ16, author = {Yupu Hu and Huiwen Jia}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Cryptanalysis of {GGH} Map}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {537--565}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_21}, doi = {10.1007/978-3-662-49890-3\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HuJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JaegerRT16, author = {Joseph Jaeger and Thomas Ristenpart and Qiang Tang}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Honey Encryption Beyond Message Recovery Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {758--788}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_29}, doi = {10.1007/978-3-662-49890-3\_29}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JaegerRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhuranaKMPS16, author = {Dakshita Khurana and Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {All Complete Functionalities are Reversible}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {213--242}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_8}, doi = {10.1007/978-3-662-49896-5\_8}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhuranaKMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhuranaMS16, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Secure Computation from Elastic Noisy Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {184--212}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_7}, doi = {10.1007/978-3-662-49896-5\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhuranaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasZZ16, author = {Aggelos Kiayias and Hong{-}Sheng Zhou and Vassilis Zikas}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Fair and Robust Multi-party Computation Using a Global Transaction Ledger}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {705--734}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_25}, doi = {10.1007/978-3-662-49896-5\_25}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kiss016, author = {{\'{A}}gnes Kiss and Thomas Schneider}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Valiant's Universal Circuit is Practical}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {699--728}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_27}, doi = {10.1007/978-3-662-49890-3\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kiss016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kiyoshima16, author = {Susumu Kiyoshima}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {93--123}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_4}, doi = {10.1007/978-3-662-49896-5\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kiyoshima16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Leurent16, author = {Ga{\"{e}}tan Leurent}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {344--371}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_14}, doi = {10.1007/978-3-662-49890-3\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Leurent16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertLNW16, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {1--31}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_1}, doi = {10.1007/978-3-662-49896-5\_1}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertLNW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Lin16, author = {Huijia Lin}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {28--57}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_2}, doi = {10.1007/978-3-662-49890-3\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Lin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuykxPSY16, author = {Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Influence of Message Length in PMAC's Security Bounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {596--621}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_23}, doi = {10.1007/978-3-662-49890-3\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuykxPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MahmoodyM16, author = {Mohammad Mahmoody and Ameer Mohammed}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Power of Hierarchical Identity-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {243--272}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_9}, doi = {10.1007/978-3-662-49896-5\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MahmoodyM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MeauxJSC16, author = {Pierrick M{\'{e}}aux and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {311--343}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_13}, doi = {10.1007/978-3-662-49890-3\_13}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MeauxJSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MicciancioW16, author = {Daniele Micciancio and Michael Walter}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Practical, Predictable Lattice Basis Reduction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {820--849}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_31}, doi = {10.1007/978-3-662-49890-3\_31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MicciancioW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MukherjeeW16, author = {Pratyay Mukherjee and Daniel Wichs}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Two Round Multiparty Computation via Multi-key {FHE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {735--763}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_26}, doi = {10.1007/978-3-662-49896-5\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MukherjeeW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NishimakiWZ16, author = {Ryo Nishimaki and Daniel Wichs and Mark Zhandry}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {388--419}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_14}, doi = {10.1007/978-3-662-49896-5\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NishimakiWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RenesCB16, author = {Joost Renes and Craig Costello and Lejla Batina}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Complete Addition Formulas for Prime Order Elliptic Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {403--428}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_16}, doi = {10.1007/978-3-662-49890-3\_16}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/RenesCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Sarkar016, author = {Palash Sarkar and Shashank Singh}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {429--458}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_17}, doi = {10.1007/978-3-662-49890-3\_17}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Sarkar016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/StevensKP16, author = {Marc Stevens and Pierre Karpman and Thomas Peyrin}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Freestart Collision for Full {SHA-1}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {459--483}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_18}, doi = {10.1007/978-3-662-49890-3\_18}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/StevensKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Strenzke16, author = {Falko Strenzke}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {An Analysis of OpenSSL's Random Number Generator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {644--669}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_25}, doi = {10.1007/978-3-662-49890-3\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Strenzke16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SunLGRL16, author = {Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {196--213}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_8}, doi = {10.1007/978-3-662-49890-3\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SunLGRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Tiessen16, author = {Tyge Tiessen}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Polytopic Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {214--239}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_9}, doi = {10.1007/978-3-662-49890-3\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Tiessen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Unruh16, author = {Dominique Unruh}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Computationally Binding Quantum Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {497--527}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_18}, doi = {10.1007/978-3-662-49896-5\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Unruh16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Yamada16, author = {Shota Yamada}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {32--62}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_2}, doi = {10.1007/978-3-662-49896-5\_2}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Yamada16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YuS16, author = {Yu Yu and John P. Steinberger}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Pseudorandom Functions in Almost Constant Depth from Low-Noise {LPN}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {154--183}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_6}, doi = {10.1007/978-3-662-49896-5\_6}, timestamp = {Mon, 14 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/YuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhangJW16, author = {Bin Zhang and Lin Jiao and Mingsheng Wang}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Faster Algorithms for Solving {LPN}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {168--195}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_7}, doi = {10.1007/978-3-662-49890-3\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhangJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2016-1, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3}, doi = {10.1007/978-3-662-49890-3}, isbn = {978-3-662-49889-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2016-2, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5}, doi = {10.1007/978-3-662-49896-5}, isbn = {978-3-662-49895-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001O15, author = {Alexander May and Ilya Ozerov}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {203--228}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_9}, doi = {10.1007/978-3-662-46800-5\_9}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001O15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Disjunctions for Hash Proof Systems: New Constructions and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {69--100}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_3}, doi = {10.1007/978-3-662-46803-6\_3}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdelraheemBBT15, author = {Mohamed Ahmed Abdelraheem and Peter Beelen and Andrey Bogdanov and Elmar Tischhauser}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Twisted Polynomials and Forgery Attacks on {GCM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {762--786}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_29}, doi = {10.1007/978-3-662-46800-5\_29}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdelraheemBBT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbeKOT15, author = {Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Fully Structure-Preserving Signatures and Shrinking Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {35--65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_2}, doi = {10.1007/978-3-662-46803-6\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbeKOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AfsharHMR15, author = {Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {How to Efficiently Evaluate {RAM} Programs with Malicious Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {702--729}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_27}, doi = {10.1007/978-3-662-46800-5\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AfsharHMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalAP15, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {501--531}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_17}, doi = {10.1007/978-3-662-46803-6\_17}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlbrechtR0TZ15, author = {Martin R. Albrecht and Christian Rechberger and Thomas Schneider and Tyge Tiessen and Michael Zohner}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Ciphers for {MPC} and {FHE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {430--454}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_17}, doi = {10.1007/978-3-662-46800-5\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlbrechtR0TZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AsharovL0Z15, author = {Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {673--701}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_26}, doi = {10.1007/978-3-662-46800-5\_26}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AsharovL0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BalaschFG15, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Inner Product Masking Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {486--510}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_19}, doi = {10.1007/978-3-662-46800-5\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BalaschFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bar-OnDDLKT15, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cryptanalysis of {SP} Networks with Partial Non-Linear Layers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {315--342}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_13}, doi = {10.1007/978-3-662-46800-5\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bar-OnDDLKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarbulescuGGM15, author = {Razvan Barbulescu and Pierrick Gaudry and Aurore Guillevic and Fran{\c{c}}ois Morain}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Improving {NFS} for the Discrete Logarithm Problem in Non-prime Finite Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {129--155}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_6}, doi = {10.1007/978-3-662-46800-5\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarbulescuGGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartheBDFGS15, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Pierre{-}Yves Strub}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Verified Proofs of Higher-Order Masking}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {457--485}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_18}, doi = {10.1007/978-3-662-46800-5\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartheBDFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BartheCLS15, author = {Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {689--718}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_23}, doi = {10.1007/978-3-662-46803-6\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BartheCLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareH15, author = {Mihir Bellare and Viet Tung Hoang}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {627--656}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_21}, doi = {10.1007/978-3-662-46803-6\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BernsteinHHLNPS15, author = {Daniel J. Bernstein and Daira Hopwood and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox{-}O'Hearn}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {{SPHINCS:} Practical Stateless Hash-Based Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {368--397}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_15}, doi = {10.1007/978-3-662-46800-5\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BernsteinHHLNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Boneh0MS15, author = {Dan Boneh and Divya Gupta and Ilya Mironov and Amit Sahai}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Hosting Services on an Untrusted Cloud}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {404--436}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_14}, doi = {10.1007/978-3-662-46803-6\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Boneh0MS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehL0SZZ15, author = {Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {563--594}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_19}, doi = {10.1007/978-3-662-46803-6\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehL0SZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleGI15, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Function Secret Sharing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {337--367}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_12}, doi = {10.1007/978-3-662-46803-6\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleGI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanteautR15, author = {Anne Canteaut and Jo{\"{e}}lle Rou{\'{e}}}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {45--74}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_3}, doi = {10.1007/978-3-662-46800-5\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanteautR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaseOV15, author = {Melissa Chase and Rafail Ostrovsky and Ivan Visconti}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {532--560}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_18}, doi = {10.1007/978-3-662-46803-6\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaseOV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenGW15, author = {Jie Chen and Romain Gay and Hoeteck Wee}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Improved Dual System {ABE} in Prime-Order Groups via Predicate Encodings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {595--624}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_20}, doi = {10.1007/978-3-662-46803-6\_20}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheonHLRS15, author = {Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehl{\'{e}}}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cryptanalysis of the Multilinear Map over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {3--12}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_1}, doi = {10.1007/978-3-662-46800-5\_1}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheonHLRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheonS15, author = {Jung Hee Cheon and Damien Stehl{\'{e}}}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Fully Homomophic Encryption over the Integers Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {513--536}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_20}, doi = {10.1007/978-3-662-46800-5\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheonS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChiesaTV15, author = {Alessandro Chiesa and Eran Tromer and Madars Virza}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cluster Computing in Zero Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {371--403}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_13}, doi = {10.1007/978-3-662-46803-6\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChiesaTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CogliatiS15, author = {Benoit Cogliati and Yannick Seurin}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {584--613}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_23}, doi = {10.1007/978-3-662-46800-5\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CogliatiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDFS15, author = {Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Nico D{\"{o}}ttling and Serge Fehr and Gabriele Spini}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {313--336}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_11}, doi = {10.1007/978-3-662-46803-6\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dachman-SoledLZ15, author = {Dana Dachman{-}Soled and Feng{-}Hao Liu and Hong{-}Sheng Zhou}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {131--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_5}, doi = {10.1007/978-3-662-46803-6\_5}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dachman-SoledLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dinur15, author = {Itai Dinur}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to {PRINCE} and {PRIDE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {231--253}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_10}, doi = {10.1007/978-3-662-46800-5\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dinur15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DinurMPSS15, author = {Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {733--761}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_28}, doi = {10.1007/978-3-662-46800-5\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DinurMPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisGGJR15, author = {Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {A Formal Treatment of Backdoored Pseudorandom Generators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {101--126}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_5}, doi = {10.1007/978-3-662-46800-5\_5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisGGJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucFS15, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Making Masking Security Proofs Concrete - Or How to Evaluate the Security of Any Leaking Device}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {401--429}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_16}, doi = {10.1007/978-3-662-46800-5\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucTV15, author = {Alexandre Duc and Florian Tram{\`{e}}r and Serge Vaudenay}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Better Algorithms for {LWE} and {LWR}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {173--202}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_8}, doi = {10.1007/978-3-662-46800-5\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucasM15, author = {L{\'{e}}o Ducas and Daniele Micciancio}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {{FHEW:} Bootstrapping Homomorphic Encryption in Less Than a Second}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {617--640}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_24}, doi = {10.1007/978-3-662-46800-5\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucasM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DziembowskiFS15, author = {Stefan Dziembowski and Sebastian Faust and Maciej Skorski}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Noisy Leakage Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {159--188}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_6}, doi = {10.1007/978-3-662-46803-6\_6}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DziembowskiFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FrederiksenNO15, author = {Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {191--219}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_7}, doi = {10.1007/978-3-662-46803-6\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FrederiksenNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayKL15, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {The Bitcoin Backbone Protocol: Analysis and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {281--310}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_10}, doi = {10.1007/978-3-662-46803-6\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrothK15, author = {Jens Groth and Markulf Kohlweiss}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {253--280}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_9}, doi = {10.1007/978-3-662-46803-6\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrothK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HaleviS15, author = {Shai Halevi and Victor Shoup}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Bootstrapping for HElib}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {641--670}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_25}, doi = {10.1007/978-3-662-46800-5\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HaleviS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HoangKR15, author = {Viet Tung Hoang and Ted Krovetz and Phillip Rogaway}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Robust Authenticated-Encryption {AEZ} and the Problem That It Solves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {15--44}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_2}, doi = {10.1007/978-3-662-46800-5\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HoangKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerKW15, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Universal Signature Aggregators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {3--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_1}, doi = {10.1007/978-3-662-46803-6\_1}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiayiasZZ15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {End-to-End Verifiable Elections in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {468--498}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_16}, doi = {10.1007/978-3-662-46803-6\_16}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiayiasZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzW15, author = {Eike Kiltz and Hoeteck Wee}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Quasi-Adaptive {NIZK} for Linear Subspaces Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {101--128}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_4}, doi = {10.1007/978-3-662-46803-6\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeanderMR15, author = {Gregor Leander and Brice Minaud and Sondre R{\o}njom}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {254--283}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_11}, doi = {10.1007/978-3-662-46800-5\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeanderMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LeurentW15, author = {Ga{\"{e}}tan Leurent and Lei Wang}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {The Sum Can Be Weaker Than Each Part}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {345--367}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_14}, doi = {10.1007/978-3-662-46800-5\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LeurentW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Liu15, author = {Yi{-}Kai Liu}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Privacy Amplification in the Isolated Qubits Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {785--814}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_26}, doi = {10.1007/978-3-662-46803-6\_26}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Liu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuLJ15, author = {Xianhui Lu and Bao Li and Dingding Jia}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {{KDM-CCA} Security from {RKA} Secure Authenticated Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {559--583}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_22}, doi = {10.1007/978-3-662-46800-5\_22}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LyubashevskyP15, author = {Vadim Lyubashevsky and Thomas Prest}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {789--815}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_30}, doi = {10.1007/978-3-662-46800-5\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LyubashevskyP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MironovS15, author = {Ilya Mironov and Noah Stephens{-}Davidowitz}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cryptographic Reverse Firewalls}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {657--686}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_22}, doi = {10.1007/978-3-662-46803-6\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MironovS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NuidaK15, author = {Koji Nuida and Kaoru Kurosawa}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {537--555}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_21}, doi = {10.1007/978-3-662-46800-5\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NuidaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Pierrot15, author = {C{\'{e}}cile Pierrot}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {The Multiple Number Field Sieve with Conjugation and Generalized Joux-Lercier Methods}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {156--170}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_7}, doi = {10.1007/978-3-662-46800-5\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Pierrot15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShrimptonT15, author = {Thomas Shrimpton and R. Seth Terashima}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {A Provable-Security Analysis of Intel's Secure Key {RNG}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {77--100}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_4}, doi = {10.1007/978-3-662-46800-5\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShrimptonT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Todo15, author = {Yosuke Todo}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Structural Evaluation by Generalized Integral Property}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {287--314}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_12}, doi = {10.1007/978-3-662-46800-5\_12}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Todo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Unruh15, author = {Dominique Unruh}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {755--784}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_25}, doi = {10.1007/978-3-662-46803-6\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Unruh15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Yun15, author = {Aaram Yun}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Generic Hardness of the Multiple Discrete Logarithm Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {817--836}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_27}, doi = {10.1007/978-3-662-46803-6\_27}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Yun15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZahurRE15, author = {Samee Zahur and Mike Rosulek and David Evans}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {220--250}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_8}, doi = {10.1007/978-3-662-46803-6\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZahurRE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZhangZDSD15, author = {Jiang Zhang and Zhenfeng Zhang and Jintai Ding and Michael Snook and {\"{O}}zg{\"{u}}r Dagdelen}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Authenticated Key Exchange from Ideal Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {719--751}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_24}, doi = {10.1007/978-3-662-46803-6\_24}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZhangZDSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Zimmerman15, author = {Joe Zimmerman}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {How to Obfuscate Programs Directly}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {439--467}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_15}, doi = {10.1007/978-3-662-46803-6\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Zimmerman15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2015-1, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5}, doi = {10.1007/978-3-662-46800-5}, isbn = {978-3-662-46799-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2015-2, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6}, doi = {10.1007/978-3-662-46803-6}, isbn = {978-3-662-46802-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AfsharMPR14, author = {Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Non-Interactive Secure Computation Based on Cut-and-Choose}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {387--404}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_22}, doi = {10.1007/978-3-642-55220-5\_22}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AfsharMPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Attrapadung14, author = {Nuttapong Attrapadung}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {557--577}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_31}, doi = {10.1007/978-3-642-55220-5\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Attrapadung14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarakGKPS14, author = {Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Protecting Obfuscation against Algebraic Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {221--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_13}, doi = {10.1007/978-3-642-55220-5\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarakGKPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarbulescuGJT14, author = {Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thom{\'{e}}}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_1}, doi = {10.1007/978-3-642-55220-5\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarbulescuGJT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareM014, author = {Mihir Bellare and Sarah Meiklejohn and Susan Thomson}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Key-Versatile Signatures and Applications: RKA, {KDM} and Joint Enc/Sig}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {496--513}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_28}, doi = {10.1007/978-3-642-55220-5\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareM014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlondeauN14, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {165--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_10}, doi = {10.1007/978-3-642-55220-5\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlondeauN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehGGHNSVV14, author = {Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit {ABE} and Compact Garbled Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {533--556}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_30}, doi = {10.1007/978-3-642-55220-5\_30}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehGGHNSVV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CashT14, author = {David Cash and Stefano Tessaro}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {The Locality of Searchable Symmetric Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {351--368}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_20}, doi = {10.1007/978-3-642-55220-5\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CashT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaseM14, author = {Melissa Chase and Sarah Meiklejohn}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {D{\'{e}}j{\`{a}} {Q:} Using Dual Systems to Revisit q-Type Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {622--639}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_34}, doi = {10.1007/978-3-642-55220-5\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaseM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenS14, author = {Shan Chen and John P. Steinberger}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Tight Security Bounds for Key-Alternating Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {327--350}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_19}, doi = {10.1007/978-3-642-55220-5\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Coron14, author = {Jean{-}S{\'{e}}bastien Coron}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Higher Order Masking of Look-Up Tables}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {441--458}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_25}, doi = {10.1007/978-3-642-55220-5\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Coron14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CostelloHS14, author = {Craig Costello and H{\"{u}}seyin Hisil and Benjamin Smith}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Faster Compact Diffie-Hellman: Endomorphisms on the x-line}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {183--200}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_11}, doi = {10.1007/978-3-642-55220-5\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CostelloHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CouvreurOT14, author = {Alain Couvreur and Ayoub Otmani and Jean{-}Pierre Tillich}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Polynomial Time Attack on Wild McEliece over Quadratic Extensions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {17--39}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_2}, doi = {10.1007/978-3-642-55220-5\_2}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CouvreurOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DahlD14, author = {Morten Dahl and Ivan Damg{\aa}rd}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {695--712}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_38}, doi = {10.1007/978-3-642-55220-5\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DahlD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisPW14, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Key Derivation without Entropy Waste}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {93--110}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_6}, doi = {10.1007/978-3-642-55220-5\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucDF14, author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {423--440}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_24}, doi = {10.1007/978-3-642-55220-5\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucDF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DurvauxSV14, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {How to Certify the Leakage of a Chip?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {459--476}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_26}, doi = {10.1007/978-3-642-55220-5\_26}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DurvauxSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaugereHJRV14, author = {Jean{-}Charles Faug{\`{e}}re and Louise Huot and Antoine Joux and Gu{\'{e}}na{\"{e}}l Renault and Vanessa Vitse}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {40--57}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_3}, doi = {10.1007/978-3-642-55220-5\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaugereHJRV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustMVW14, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {111--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_7}, doi = {10.1007/978-3-642-55220-5\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustMVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GarayIKW14, author = {Juan A. Garay and Yuval Ishai and Ranjit Kumaresan and Hoeteck Wee}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {On the Complexity of {UC} Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {677--694}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_37}, doi = {10.1007/978-3-642-55220-5\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GarayIKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargG14, author = {Sanjam Garg and Divya Gupta}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Efficient Round Optimal Blind Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {477--495}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_27}, doi = {10.1007/978-3-642-55220-5\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryHLO0W14, author = {Craig Gentry and Shai Halevi and Steve Lu and Rafail Ostrovsky and Mariana Raykova and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Garbled {RAM} Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {405--422}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_23}, doi = {10.1007/978-3-642-55220-5\_23}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryHLO0W14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GilboaI14, author = {Niv Gilboa and Yuval Ishai}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Distributed Point Functions and Their Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {640--658}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_35}, doi = {10.1007/978-3-642-55220-5\_35}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GilboaI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoldwasserGG0KLSSZ14, author = {Shafi Goldwasser and S. Dov Gordon and Vipul Goyal and Abhishek Jain and Jonathan Katz and Feng{-}Hao Liu and Amit Sahai and Elaine Shi and Hong{-}Sheng Zhou}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Multi-input Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {578--602}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_32}, doi = {10.1007/978-3-642-55220-5\_32}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoldwasserGG0KLSSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerSW14, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {201--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_12}, doi = {10.1007/978-3-642-55220-5\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JuelsR14, author = {Ari Juels and Thomas Ristenpart}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Honey Encryption: Security Beyond the Brute-Force Bound}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {293--310}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_17}, doi = {10.1007/978-3-642-55220-5\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JuelsR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KraschewskiMPS14, author = {Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {A Full Characterization of Completeness for Two-Party Randomized Function Evaluation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {659--676}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_36}, doi = {10.1007/978-3-642-55220-5\_36}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KraschewskiMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiDLWZ14, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {77--92}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_5}, doi = {10.1007/978-3-642-55220-5\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiDLWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LangloisSS14, author = {Adeline Langlois and Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {GGHLite: More Efficient Multilinear Maps from Ideal Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {239--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_14}, doi = {10.1007/978-3-642-55220-5\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LangloisSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW14, author = {Allison B. Lewko and Brent Waters}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Why Proving {HIBE} Systems Secure Is Difficult}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {58--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_4}, doi = {10.1007/978-3-642-55220-5\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertPJY14, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive {NIZK} Proofs and CCA2-Secure Encryption from Homomorphic Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {514--532}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_29}, doi = {10.1007/978-3-642-55220-5\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertPJY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Minematsu14, author = {Kazuhiko Minematsu}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {275--292}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_16}, doi = {10.1007/978-3-642-55220-5\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Minematsu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Mittelbach14, author = {Arno Mittelbach}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Salvaging Indifferentiability in a Multi-stage Setting}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {603--621}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_33}, doi = {10.1007/978-3-642-55220-5\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Mittelbach14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MorrisR14, author = {Ben Morris and Phillip Rogaway}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {311--326}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_18}, doi = {10.1007/978-3-642-55220-5\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MorrisR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NamprempreRS14, author = {Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Reconsidering Generic Composition}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {257--274}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_15}, doi = {10.1007/978-3-642-55220-5\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NamprempreRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PeyrinW14, author = {Thomas Peyrin and Lei Wang}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Generic Universal Forgery Attack on Iterative Hash-Based MACs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {147--164}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_9}, doi = {10.1007/978-3-642-55220-5\_9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/PeyrinW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TyagiW14, author = {Himanshu Tyagi and Shun Watanabe}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {369--386}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_21}, doi = {10.1007/978-3-642-55220-5\_21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TyagiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Unruh14, author = {Dominique Unruh}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Revocable Quantum Timed-Release Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {129--146}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_8}, doi = {10.1007/978-3-642-55220-5\_8}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Unruh14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2014, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5}, doi = {10.1007/978-3-642-55220-5}, isbn = {978-3-642-55219-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ApplebaumM13, author = {Benny Applebaum and Yoni Moses}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Locally Computable {UOWHF} with Linear Shrinkage}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {486--502}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_29}, doi = {10.1007/978-3-642-38348-9\_29}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ApplebaumM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaecherFFS13, author = {Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {426--443}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_26}, doi = {10.1007/978-3-642-38348-9\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaecherFFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BayerG13, author = {Stephanie Bayer and Jens Groth}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {646--663}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_38}, doi = {10.1007/978-3-642-38348-9\_38}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BayerG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareKR13, author = {Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Message-Locked Encryption and Secure Deduplication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {296--312}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_18}, doi = {10.1007/978-3-642-38348-9\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA13, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Keccak}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {313--314}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_19}, doi = {10.1007/978-3-642-38348-9\_19}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlondeauN13, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {New Links between Differential and Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {388--404}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_24}, doi = {10.1007/978-3-642-38348-9\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlondeauN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BohlHJKSS13, author = {Florian B{\"{o}}hl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Jae Hong Seo and Christoph Striecks}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Practical Signatures from Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {461--485}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_28}, doi = {10.1007/978-3-642-38348-9\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BohlHJKSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehZ13, author = {Dan Boneh and Mark Zhandry}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Quantum-Secure Message Authentication Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {592--608}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_35}, doi = {10.1007/978-3-642-38348-9\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BosCHL13, author = {Joppe W. Bos and Craig Costello and H{\"{u}}seyin Hisil and Kristin E. Lauter}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Fast Cryptography in Genus 2}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {194--210}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_12}, doi = {10.1007/978-3-642-38348-9\_12}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BosCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BouillaguetFV13, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Amandine V{\'{e}}ber}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {211--227}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_13}, doi = {10.1007/978-3-642-38348-9\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BouillaguetFV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CashKW13, author = {David Cash and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Daniel Wichs}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Dynamic Proofs of Retrievability via Oblivious {RAM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {279--295}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_17}, doi = {10.1007/978-3-642-38348-9\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CashKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoF13, author = {Dario Catalano and Dario Fiore}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Practical Homomorphic MACs for Arithmetic Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {336--352}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_21}, doi = {10.1007/978-3-642-38348-9\_21}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheonCKLLTY13, author = {Jung Hee Cheon and Jean{-}S{\'{e}}bastien Coron and Jinsu Kim and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi and Aaram Yun}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Batch Fully Homomorphic Encryption over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {315--335}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_20}, doi = {10.1007/978-3-642-38348-9\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheonCKLLTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DemayGHM13, author = {Gr{\'{e}}gory Demay and Peter Gazi and Martin Hirt and Ueli Maurer}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Resource-Restricted Indifferentiability}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {664--683}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_39}, doi = {10.1007/978-3-642-38348-9\_39}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DemayGHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DerbezFJ13, author = {Patrick Derbez and Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} in the Single-Key Setting}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {371--387}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_23}, doi = {10.1007/978-3-642-38348-9\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DerbezFJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingM13, author = {Nico D{\"{o}}ttling and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Lossy Codes and a New Variant of the Learning-With-Errors Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {18--34}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_2}, doi = {10.1007/978-3-642-38348-9\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FischlinF13, author = {Marc Fischlin and Nils Fleischhacker}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {444--460}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_27}, doi = {10.1007/978-3-642-38348-9\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FischlinF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FrederiksenJNNO13, author = {Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {537--556}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_32}, doi = {10.1007/978-3-642-38348-9\_32}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FrederiksenJNNO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargGH13, author = {Sanjam Garg and Craig Gentry and Shai Halevi}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Candidate Multilinear Maps from Ideal Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {1--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_1}, doi = {10.1007/978-3-642-38348-9\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GennaroGP013, author = {Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Quadratic Span Programs and Succinct NIZKs without PCPs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {626--645}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_37}, doi = {10.1007/978-3-642-38348-9\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GennaroGP013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GordonMRW13, author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {575--591}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_34}, doi = {10.1007/978-3-642-38348-9\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GordonMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Goyal013, author = {Vipul Goyal and Abhishek Jain}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {On Concurrently Secure Computation in the Multiple Ideal Query Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {684--701}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_40}, doi = {10.1007/978-3-642-38348-9\_40}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Goyal013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HazayLWW13, author = {Carmit Hazay and Adriana L{\'{o}}pez{-}Alt and Hoeteck Wee and Daniel Wichs}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Leakage-Resilient Cryptography from Minimal Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {160--176}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_10}, doi = {10.1007/978-3-642-38348-9\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HazayLWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Hofheinz13, author = {Dennis Hofheinz}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Circular Chosen-Ciphertext Security with Compact Ciphertexts}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {520--536}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_31}, doi = {10.1007/978-3-642-38348-9\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Hofheinz13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Joux13, author = {Antoine Joux}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {177--193}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_11}, doi = {10.1007/978-3-642-38348-9\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Joux13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JoyeL13, author = {Marc Joye and Beno{\^{\i}}t Libert}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Efficient Cryptosystems from 2\({}^{\mbox{ \emph{k} }}\)-th Power Residue Symbols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {76--92}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_5}, doi = {10.1007/978-3-642-38348-9\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JoyeL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LandelleP13, author = {Franck Landelle and Thomas Peyrin}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Cryptanalysis of Full {RIPEMD-128}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {228--244}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_14}, doi = {10.1007/978-3-642-38348-9\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LandelleP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Lee13, author = {Jooyoung Lee}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {405--425}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_25}, doi = {10.1007/978-3-642-38348-9\_25}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Lee13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoOS13, author = {Mark Lewko and Adam O'Neill and Adam D. Smith}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Regularity of Lossy {RSA} on Subdomains and Its Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {55--75}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_4}, doi = {10.1007/978-3-642-38348-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LinT13, author = {Huijia Lin and Stefano Tessaro}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Amplification of Chosen-Ciphertext Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {503--519}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_30}, doi = {10.1007/978-3-642-38348-9\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LinT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuO13, author = {Steve Lu and Rafail Ostrovsky}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {How to Garble {RAM} Programs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {719--734}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_42}, doi = {10.1007/978-3-642-38348-9\_42}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LyubashevskyPR13, author = {Vadim Lyubashevsky and Chris Peikert and Oded Regev}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {A Toolkit for Ring-LWE Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {35--54}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_3}, doi = {10.1007/978-3-642-38348-9\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LyubashevskyPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MendelNS13, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Improving Local Collisions: New Attacks on Reduced {SHA-256}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {262--278}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_16}, doi = {10.1007/978-3-642-38348-9\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MendelNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MohasselS13, author = {Payman Mohassel and Seyed Saeed Sadeghian}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {How to Hide Circuits in {MPC} an Efficient Framework for Private Function Evaluation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {557--574}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_33}, doi = {10.1007/978-3-642-38348-9\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MohasselS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Nishimaki13, author = {Ryo Nishimaki}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {How to Watermark Cryptographic Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {111--125}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_7}, doi = {10.1007/978-3-642-38348-9\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Nishimaki13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OstrovskySVW13, author = {Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti and Akshay Wadia}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {702--718}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_41}, doi = {10.1007/978-3-642-38348-9\_41}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OstrovskySVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PapamanthouSTY13, author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia and Ke Yi}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Streaming Authenticated Data Structures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {353--370}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_22}, doi = {10.1007/978-3-642-38348-9\_22}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PapamanthouSTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ProuffR13, author = {Emmanuel Prouff and Matthieu Rivain}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Masking against Side-Channel Attacks: {A} Formal Security Proof}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {142--159}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_9}, doi = {10.1007/978-3-642-38348-9\_9}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ProuffR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RaghunathanSV13, author = {Ananth Raghunathan and Gil Segev and Salil P. Vadhan}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {93--110}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_6}, doi = {10.1007/978-3-642-38348-9\_6}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RaghunathanSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Stevens13, author = {Marc Stevens}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {New Collision Attacks on {SHA-1} Based on Optimal Joint Local-Collision Analysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {245--261}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_15}, doi = {10.1007/978-3-642-38348-9\_15}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Stevens13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/TomamichelFKW13, author = {Marco Tomamichel and Serge Fehr and Jedrzej Kaniewski and Stephanie Wehner}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {One-Sided Device-Independent {QKD} and Position-Based Cryptography from Monogamy Games}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {609--625}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_36}, doi = {10.1007/978-3-642-38348-9\_36}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/TomamichelFKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Veyrat-CharvillonGS13, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Security Evaluations beyond Computing Power}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {126--141}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_8}, doi = {10.1007/978-3-642-38348-9\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Veyrat-CharvillonGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2013, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9}, doi = {10.1007/978-3-642-38348-9}, isbn = {978-3-642-38347-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaFLT12, author = {Michel Abdalla and Pierre{-}Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi}, editor = {David Pointcheval and Thomas Johansson}, title = {Tightly-Secure Signatures from Lossy Identification Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {572--590}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_34}, doi = {10.1007/978-3-642-29011-4\_34}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaFLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbeHO12, author = {Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo}, editor = {David Pointcheval and Thomas Johansson}, title = {Group to Group Commitments Do Not Shrink}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {301--317}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_19}, doi = {10.1007/978-3-642-29011-4\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbeHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AsharovJLTVW12, author = {Gilad Asharov and Abhishek Jain and Adriana L{\'{o}}pez{-}Alt and Eran Tromer and Vinod Vaikuntanathan and Daniel Wichs}, editor = {David Pointcheval and Thomas Johansson}, title = {Multiparty Computation with Low Communication, Computation and Interaction via Threshold {FHE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {483--501}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_29}, doi = {10.1007/978-3-642-29011-4\_29}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AsharovJLTVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BanerjeePR12, author = {Abhishek Banerjee and Chris Peikert and Alon Rosen}, editor = {David Pointcheval and Thomas Johansson}, title = {Pseudorandom Functions and Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {719--737}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_42}, doi = {10.1007/978-3-642-29011-4\_42}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BanerjeePR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BayerG12, author = {Stephanie Bayer and Jens Groth}, editor = {David Pointcheval and Thomas Johansson}, title = {Efficient Zero-Knowledge Argument for Correctness of a Shuffle}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {263--280}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_17}, doi = {10.1007/978-3-642-29011-4\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BayerG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeckerJMM12, author = {Anja Becker and Antoine Joux and Alexander May and Alexander Meurer}, editor = {David Pointcheval and Thomas Johansson}, title = {Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {520--536}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_31}, doi = {10.1007/978-3-642-29011-4\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeckerJMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareDWY12, author = {Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek}, editor = {David Pointcheval and Thomas Johansson}, title = {Standard Security Does Not Imply Security against Selective-Opening}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {645--662}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_38}, doi = {10.1007/978-3-642-29011-4\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareDWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareKPW12, author = {Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters}, editor = {David Pointcheval and Thomas Johansson}, title = {Identity-Based (Lossy) Trapdoor Functions and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {228--245}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_15}, doi = {10.1007/978-3-642-29011-4\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BogdanovKLSST12, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Fran{\c{c}}ois{-}Xavier Standaert and John P. Steinberger and Elmar Tischhauser}, editor = {David Pointcheval and Thomas Johansson}, title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {45--62}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_5}, doi = {10.1007/978-3-642-29011-4\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BogdanovKLSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoldyrevaDPS12, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, editor = {David Pointcheval and Thomas Johansson}, title = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {682--699}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_40}, doi = {10.1007/978-3-642-29011-4\_40}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoldyrevaDPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CevallosFOR12, author = {Alfonso Cevallos and Serge Fehr and Rafail Ostrovsky and Yuval Rabani}, editor = {David Pointcheval and Thomas Johansson}, title = {Unconditionally-Secure Robust Secret Sharing with Compact Shares}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {195--208}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_13}, doi = {10.1007/978-3-642-29011-4\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CevallosFOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaseKLM12, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, editor = {David Pointcheval and Thomas Johansson}, title = {Malleable Proof Systems and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {281--300}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_18}, doi = {10.1007/978-3-642-29011-4\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaseKLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenN12, author = {Yuanmi Chen and Phong Q. Nguyen}, editor = {David Pointcheval and Thomas Johansson}, title = {Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {502--519}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_30}, doi = {10.1007/978-3-642-29011-4\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CoronNT12, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, editor = {David Pointcheval and Thomas Johansson}, title = {Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {446--464}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_27}, doi = {10.1007/978-3-642-29011-4\_27}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CoronNT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisKPW12, author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs}, editor = {David Pointcheval and Thomas Johansson}, title = {Message Authentication, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {355--374}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_22}, doi = {10.1007/978-3-642-29011-4\_22}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKS12, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {David Pointcheval and Thomas Johansson}, title = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {336--354}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_21}, doi = {10.1007/978-3-642-29011-4\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaugerePPR12, author = {Jean{-}Charles Faug{\`{e}}re and Ludovic Perret and Christophe Petit and Gu{\'{e}}na{\"{e}}l Renault}, editor = {David Pointcheval and Thomas Johansson}, title = {Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {27--44}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_4}, doi = {10.1007/978-3-642-29011-4\_4}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaugerePPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargG0S12, author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai}, editor = {David Pointcheval and Thomas Johansson}, title = {Concurrently Secure Computation in Constant Rounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {99--116}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_8}, doi = {10.1007/978-3-642-29011-4\_8}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargG0S12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GaziT12, author = {Peter Gazi and Stefano Tessaro}, editor = {David Pointcheval and Thomas Johansson}, title = {Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {63--80}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_6}, doi = {10.1007/978-3-642-29011-4\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GaziT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, editor = {David Pointcheval and Thomas Johansson}, title = {Fully Homomorphic Encryption with Polylog Overhead}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {465--482}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_28}, doi = {10.1007/978-3-642-29011-4\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GroceK12, author = {Adam Groce and Jonathan Katz}, editor = {David Pointcheval and Thomas Johansson}, title = {Fair Computation with Rational Players}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {81--98}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_7}, doi = {10.1007/978-3-642-29011-4\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GroceK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Hofheinz12, author = {Dennis Hofheinz}, editor = {David Pointcheval and Thomas Johansson}, title = {All-But-Many Lossy Trapdoor Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {209--227}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_14}, doi = {10.1007/978-3-642-29011-4\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Hofheinz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerLW12, author = {Susan Hohenberger and Allison B. Lewko and Brent Waters}, editor = {David Pointcheval and Thomas Johansson}, title = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {663--681}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_39}, doi = {10.1007/978-3-642-29011-4\_39}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Joux12, author = {Antoine Joux}, editor = {David Pointcheval and Thomas Johansson}, title = {A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {1--7}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_1}, doi = {10.1007/978-3-642-29011-4\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Joux12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JouxV12, author = {Antoine Joux and Vanessa Vitse}, editor = {David Pointcheval and Thomas Johansson}, title = {Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over {\textdollar}{\textbackslash}mathbb\{F\}{\_}\{p6\}{\textdollar}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {9--26}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_3}, doi = {10.1007/978-3-642-29011-4\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JouxV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KakviK12, author = {Saqib A. Kakvi and Eike Kiltz}, editor = {David Pointcheval and Thomas Johansson}, title = {Optimal Security Proofs for Full Domain Hash, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {537--553}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_32}, doi = {10.1007/978-3-642-29011-4\_32}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KakviK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhovratovichLR12, author = {Dmitry Khovratovich and Ga{\"{e}}tan Leurent and Christian Rechberger}, editor = {David Pointcheval and Thomas Johansson}, title = {Narrow-Bicliques: Cryptanalysis of Full {IDEA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {392--410}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_24}, doi = {10.1007/978-3-642-29011-4\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhovratovichLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KoppW12, author = {Gene S. Kopp and John D. Wiltshire{-}Gordon}, editor = {David Pointcheval and Thomas Johansson}, title = {Robust Coin Flipping}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {172--194}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_12}, doi = {10.1007/978-3-642-29011-4\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KoppW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Lewko12, author = {Allison B. Lewko}, editor = {David Pointcheval and Thomas Johansson}, title = {Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {318--335}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_20}, doi = {10.1007/978-3-642-29011-4\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Lewko12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, editor = {David Pointcheval and Thomas Johansson}, title = {Scalable Group Signatures with Revocation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {609--627}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_36}, doi = {10.1007/978-3-642-29011-4\_36}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Lyubashevsky12, author = {Vadim Lyubashevsky}, editor = {David Pointcheval and Thomas Johansson}, title = {Lattice Signatures without Trapdoors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {738--755}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_43}, doi = {10.1007/978-3-642-29011-4\_43}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Lyubashevsky12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Menezes12, author = {Alfred Menezes}, editor = {David Pointcheval and Thomas Johansson}, title = {Another Look at Provable Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {8}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_2}, doi = {10.1007/978-3-642-29011-4\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Menezes12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MicciancioP12, author = {Daniele Micciancio and Chris Peikert}, editor = {David Pointcheval and Thomas Johansson}, title = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {700--718}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_41}, doi = {10.1007/978-3-642-29011-4\_41}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/MicciancioP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MironovPRS12, author = {Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev}, editor = {David Pointcheval and Thomas Johansson}, title = {Incremental Deterministic Public-Key Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {628--644}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_37}, doi = {10.1007/978-3-642-29011-4\_37}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MironovPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Moradi12, author = {Amir Moradi}, editor = {David Pointcheval and Thomas Johansson}, title = {Statistical Tools Flavor Side-Channel Collision Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {428--445}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_26}, doi = {10.1007/978-3-642-29011-4\_26}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Moradi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoT12, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, editor = {David Pointcheval and Thomas Johansson}, title = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {591--608}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_35}, doi = {10.1007/978-3-642-29011-4\_35}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PandeyR12, author = {Omkant Pandey and Yannis Rouselakis}, editor = {David Pointcheval and Thomas Johansson}, title = {Property Preserving Symmetric Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {375--391}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_23}, doi = {10.1007/978-3-642-29011-4\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PandeyR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Sasaki12, author = {Yu Sasaki}, editor = {David Pointcheval and Thomas Johansson}, title = {Cryptanalyses on a Merkle-Damg{\aa}rd Based {MAC} - Almost Universal Forgery and Distinguishing-H Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {411--427}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_25}, doi = {10.1007/978-3-642-29011-4\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Sasaki12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ScafuroV12, author = {Alessandra Scafuro and Ivan Visconti}, editor = {David Pointcheval and Thomas Johansson}, title = {On Round-Optimal Zero Knowledge in the Bare Public-Key Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {153--171}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_11}, doi = {10.1007/978-3-642-29011-4\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ScafuroV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Seurin12, author = {Yannick Seurin}, editor = {David Pointcheval and Thomas Johansson}, title = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {554--571}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_33}, doi = {10.1007/978-3-642-29011-4\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Seurin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Unruh12, author = {Dominique Unruh}, editor = {David Pointcheval and Thomas Johansson}, title = {Quantum Proofs of Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {135--152}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_10}, doi = {10.1007/978-3-642-29011-4\_10}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Unruh12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wee12, author = {Hoeteck Wee}, editor = {David Pointcheval and Thomas Johansson}, title = {Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {246--262}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_16}, doi = {10.1007/978-3-642-29011-4\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wee12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/YuenCZY12, author = {Tsz Hon Yuen and Sherman S. M. Chow and Ye Zhang and Siu{-}Ming Yiu}, editor = {David Pointcheval and Thomas Johansson}, title = {Identity-Based Encryption Resilient to Continual Auxiliary Leakage}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {117--134}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_9}, doi = {10.1007/978-3-642-29011-4\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/YuenCZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2012, editor = {David Pointcheval and Thomas Johansson}, title = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4}, doi = {10.1007/978-3-642-29011-4}, isbn = {978-3-642-29010-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AhmadiS11, author = {Hadi Ahmadi and Reihaneh Safavi{-}Naini}, editor = {Kenneth G. Paterson}, title = {Secret Keys from Channel Noise}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {266--283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_16}, doi = {10.1007/978-3-642-20465-4\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AhmadiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Applebaum11, author = {Benny Applebaum}, editor = {Kenneth G. Paterson}, title = {Key-Dependent Message Security: Generic Amplification and Completeness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {527--546}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_29}, doi = {10.1007/978-3-642-20465-4\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Applebaum11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AranhaKLGL11, author = {Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez}, editor = {Kenneth G. Paterson}, title = {Faster Explicit Formulas for Computing Pairings over Ordinary Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {48--68}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_5}, doi = {10.1007/978-3-642-20465-4\_5}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AranhaKLGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AsharovCH11, author = {Gilad Asharov and Ran Canetti and Carmit Hazay}, editor = {Kenneth G. Paterson}, title = {Towards a Game Theoretic View of Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {426--445}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_24}, doi = {10.1007/978-3-642-20465-4\_24}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AsharovCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeckerCJ11, author = {Anja Becker and Jean{-}S{\'{e}}bastien Coron and Antoine Joux}, editor = {Kenneth G. Paterson}, title = {Improved Generic Algorithms for Hard Knapsacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {364--385}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_21}, doi = {10.1007/978-3-642-20465-4\_21}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeckerCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BendlinDOZ11, author = {Rikke Bendlin and Ivan Damg{\aa}rd and Claudio Orlandi and Sarah Zakarias}, editor = {Kenneth G. Paterson}, title = {Semi-homomorphic Encryption and Multiparty Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {169--188}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_11}, doi = {10.1007/978-3-642-20465-4\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BendlinDOZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehF11, author = {Dan Boneh and David Mandell Freeman}, editor = {Kenneth G. Paterson}, title = {Homomorphic Signatures for Polynomial Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {149--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_10}, doi = {10.1007/978-3-642-20465-4\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoumanF11, author = {Niek J. Bouman and Serge Fehr}, editor = {Kenneth G. Paterson}, title = {Secure Authentication from a Weak Key, without Leaking Information}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {246--265}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_15}, doi = {10.1007/978-3-642-20465-4\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoumanF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleSW11, author = {Elette Boyle and Gil Segev and Daniel Wichs}, editor = {Kenneth G. Paterson}, title = {Fully Leakage-Resilient Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {89--108}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_7}, doi = {10.1007/978-3-642-20465-4\_7}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoFW11, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Kenneth G. Paterson}, title = {Adaptive Pseudo-free Groups and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {207--223}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_13}, doi = {10.1007/978-3-642-20465-4\_13}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Cramer11, author = {Ronald Cramer}, editor = {Kenneth G. Paterson}, title = {The Arithmetic Codex: Theory and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {1}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_1}, doi = {10.1007/978-3-642-20465-4\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Cramer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisS11, author = {Yevgeniy Dodis and John P. Steinberger}, editor = {Kenneth G. Paterson}, title = {Domain Extension for MACs Beyond the Birthday Barrier}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {323--342}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_19}, doi = {10.1007/978-3-642-20465-4\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DurmuthF11, author = {Markus D{\"{u}}rmuth and David Mandell Freeman}, editor = {Kenneth G. Paterson}, title = {Deniable Encryption with Negligible Detection Probability: An Interactive Construction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {610--626}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_33}, doi = {10.1007/978-3-642-20465-4\_33}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DurmuthF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Fuchsbauer11, author = {Georg Fuchsbauer}, editor = {Kenneth G. Paterson}, title = {Commuting Signatures and Verifiable Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {224--245}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_14}, doi = {10.1007/978-3-642-20465-4\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Fuchsbauer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryH11, author = {Craig Gentry and Shai Halevi}, editor = {Kenneth G. Paterson}, title = {Implementing Gentry's Fully-Homomorphic Encryption Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {129--148}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_9}, doi = {10.1007/978-3-642-20465-4\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKOPS11, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai}, editor = {Kenneth G. Paterson}, title = {Efficient Non-interactive Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {406--425}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_23}, doi = {10.1007/978-3-642-20465-4\_23}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKOPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KiltzPCJV11, author = {Eike Kiltz and Krzysztof Pietrzak and David Cash and Abhishek Jain and Daniele Venturi}, editor = {Kenneth G. Paterson}, title = {Efficient Authentication from Hard Learning Problems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {7--26}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_3}, doi = {10.1007/978-3-642-20465-4\_3}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KiltzPCJV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Leander11, author = {Gregor Leander}, editor = {Kenneth G. Paterson}, title = {On Linear Hulls, Statistical Saturation Attacks, {PRESENT} and a Cryptanalysis of {PUFFIN}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {303--322}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_18}, doi = {10.1007/978-3-642-20465-4\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Leander11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW11, author = {Allison B. Lewko and Brent Waters}, editor = {Kenneth G. Paterson}, title = {Unbounded {HIBE} and Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {547--567}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_30}, doi = {10.1007/978-3-642-20465-4\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW11a, author = {Allison B. Lewko and Brent Waters}, editor = {Kenneth G. Paterson}, title = {Decentralizing Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {568--588}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_31}, doi = {10.1007/978-3-642-20465-4\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Lindell11, author = {Yehuda Lindell}, editor = {Kenneth G. Paterson}, title = {Highly-Efficient Universally-Composable Commitments Based on the {DDH} Assumption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {446--466}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_25}, doi = {10.1007/978-3-642-20465-4\_25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Lindell11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MalkinTY11, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, editor = {Kenneth G. Paterson}, title = {Efficient Circuit-Size Independent Public Key Encryption with {KDM} Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {507--526}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_28}, doi = {10.1007/978-3-642-20465-4\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MalkinTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MoradiPLPW11, author = {Amir Moradi and Axel Poschmann and San Ling and Christof Paar and Huaxiong Wang}, editor = {Kenneth G. Paterson}, title = {Pushing the Limits: {A} Very Compact and a Threshold Implementation of {AES}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {69--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_6}, doi = {10.1007/978-3-642-20465-4\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MoradiPLPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Nguyen11, author = {Phong Q. Nguyen}, editor = {Kenneth G. Paterson}, title = {Lattice Reduction Algorithms: Theory and Practice}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {2--6}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_2}, doi = {10.1007/978-3-642-20465-4\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Nguyen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Obana11, author = {Satoshi Obana}, editor = {Kenneth G. Paterson}, title = {Almost Optimum \emph{t}-Cheater Identifiable Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {284--302}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_17}, doi = {10.1007/978-3-642-20465-4\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Obana11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RenauldSVKF11, author = {Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Dina Kamel and Denis Flandre}, editor = {Kenneth G. Paterson}, title = {A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {109--128}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_8}, doi = {10.1007/978-3-642-20465-4\_8}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/RenauldSVKF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RistenpartSS11, author = {Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton}, editor = {Kenneth G. Paterson}, title = {Careful with Composition: Limitations of the Indifferentiability Framework}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {487--506}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_27}, doi = {10.1007/978-3-642-20465-4\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RistenpartSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Schage11, author = {Sven Sch{\"{a}}ge}, editor = {Kenneth G. Paterson}, title = {Tight Proofs for Signature Schemes without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {189--206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_12}, doi = {10.1007/978-3-642-20465-4\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Schage11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SepehrdadVV11, author = {Pouyan Sepehrdad and Serge Vaudenay and Martin Vuagnoux}, editor = {Kenneth G. Paterson}, title = {Statistical Attack on {RC4} - Distinguishing {WPA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {343--363}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_20}, doi = {10.1007/978-3-642-20465-4\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SepehrdadVV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShelatS11, author = {Abhi Shelat and Chih{-}Hao Shen}, editor = {Kenneth G. Paterson}, title = {Two-Output Secure Computation with Malicious Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {386--405}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_22}, doi = {10.1007/978-3-642-20465-4\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShelatS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/StehleS11, author = {Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Kenneth G. Paterson}, title = {Making {NTRU} as Secure as Worst-Case Problems over Ideal Lattices}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {27--47}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_4}, doi = {10.1007/978-3-642-20465-4\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/StehleS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Unruh11, author = {Dominique Unruh}, editor = {Kenneth G. Paterson}, title = {Concurrent Composition in the Bounded Quantum Storage Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {467--486}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_26}, doi = {10.1007/978-3-642-20465-4\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Unruh11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wee11, author = {Hoeteck Wee}, editor = {Kenneth G. Paterson}, title = {Threshold and Revocation Cryptosystems via Extractable Hash Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {589--609}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_32}, doi = {10.1007/978-3-642-20465-4\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wee11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2011, editor = {Kenneth G. Paterson}, title = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4}, doi = {10.1007/978-3-642-20465-4}, isbn = {978-3-642-20464-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AcarBBC10, author = {Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash}, editor = {Henri Gilbert}, title = {Cryptographic Agility and Its Relation to Circular Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {403--422}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_21}, doi = {10.1007/978-3-642-13190-5\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AcarBBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalBB10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, editor = {Henri Gilbert}, title = {Efficient Lattice {(H)IBE} in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {553--572}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_28}, doi = {10.1007/978-3-642-13190-5\_28}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenDNSWW10, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs}, editor = {Henri Gilbert}, title = {Public-Key Encryption in the Bounded-Retrieval Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {113--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_6}, doi = {10.1007/978-3-642-13190-5\_6}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenDNSWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarakHHI10, author = {Boaz Barak and Iftach Haitner and Dennis Hofheinz and Yuval Ishai}, editor = {Henri Gilbert}, title = {Bounded Key-Dependent Message Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {423--444}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_22}, doi = {10.1007/978-3-642-13190-5\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarakHHI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BiryukovDKKS10, author = {Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir}, editor = {Henri Gilbert}, title = {Key Recovery Attacks of Practical Complexity on {AES-256} Variants with up to 10 Rounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {299--319}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_15}, doi = {10.1007/978-3-642-13190-5\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BiryukovDKKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BiryukovN10, author = {Alex Biryukov and Ivica Nikolic}, editor = {Henri Gilbert}, title = {Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {322--344}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_17}, doi = {10.1007/978-3-642-13190-5\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BiryukovN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CashHKP10, author = {David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert}, editor = {Henri Gilbert}, title = {Bonsai Trees, or How to Delegate a Lattice Basis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {523--552}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_27}, doi = {10.1007/978-3-642-13190-5\_27}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CashHKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardIK10, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard}, editor = {Henri Gilbert}, title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {445--465}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_23}, doi = {10.1007/978-3-642-13190-5\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardIK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DijkGHV10, author = {Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, editor = {Henri Gilbert}, title = {Fully Homomorphic Encryption over the Integers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {24--43}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_2}, doi = {10.1007/978-3-642-13190-5\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DijkGHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaugereOPT10, author = {Jean{-}Charles Faug{\`{e}}re and Ayoub Otmani and Ludovic Perret and Jean{-}Pierre Tillich}, editor = {Henri Gilbert}, title = {Algebraic Cryptanalysis of McEliece Variants with Compact Keys}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {279--298}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_14}, doi = {10.1007/978-3-642-13190-5\_14}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaugereOPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustRRTV10, author = {Sebastian Faust and Tal Rabin and Leonid Reyzin and Eran Tromer and Vinod Vaikuntanathan}, editor = {Henri Gilbert}, title = {Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {135--156}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_7}, doi = {10.1007/978-3-642-13190-5\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustRRTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FehrHKW10, author = {Serge Fehr and Dennis Hofheinz and Eike Kiltz and Hoeteck Wee}, editor = {Henri Gilbert}, title = {Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {381--402}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_20}, doi = {10.1007/978-3-642-13190-5\_20}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FehrHKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FischlinS10, author = {Marc Fischlin and Dominique Schr{\"{o}}der}, editor = {Henri Gilbert}, title = {On the Impossibility of Three-Move Blind Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {197--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_10}, doi = {10.1007/978-3-642-13190-5\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/FischlinS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Freeman10, author = {David Mandell Freeman}, editor = {Henri Gilbert}, title = {Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {44--61}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_3}, doi = {10.1007/978-3-642-13190-5\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Freeman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GamaNR10, author = {Nicolas Gama and Phong Q. Nguyen and Oded Regev}, editor = {Henri Gilbert}, title = {Lattice Enumeration Using Extreme Pruning}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {257--278}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_13}, doi = {10.1007/978-3-642-13190-5\_13}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GamaNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.