Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi |
|
1991
|
Efficient signature generation by smart cards. Zbl 0743.68058
Schnorr, C. P. |
|
1991
|
Security arguments for digital signatures and blind signatures. Zbl 1025.94015
Pointcheval, David; Stern, Jacques |
|
2000
|
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran |
|
2000
|
Bit commitment using pseudorandomness. Zbl 0731.68033
Naor, Moni |
|
1991
|
Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Zbl 0912.11056
Coppersmith, Don |
|
1997
|
Experimental quantum cryptography. Zbl 1114.94005
Bennett, Charles H.; Bessette, François; Brassard, Gilles; Salvail, Louis; Smolin, John |
|
1992
|
The dining cryptographers problem: Unconditional sender and recipient untraceability. Zbl 0654.94012
Chaum, David |
|
1988
|
Short signatures from the Weil pairing. Zbl 1070.94010
Boneh, Dan; Lynn, Ben; Shacham, Hovav |
|
2004
|
Definitions and properties of zero-knowledge proof systems. Zbl 0791.94010
Goldreich, Oded; Oren, Yair |
|
1994
|
Parallel collision search with cryptanalytic applications. Zbl 0992.94028
van Oorschot, Paul C.; Wiener, Michael J. |
|
1999
|
Cryptographic hash functions from expander graphs. Zbl 1166.94006
Charles, Denis X.; Lauter, Kristin E.; Goren, Eyal Z. |
|
2009
|
A taxonomy of pairing-friendly elliptic curves. Zbl 1181.94094
Freeman, David; Scott, Michael; Teske, Edlyn |
|
2010
|
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny |
|
2009
|
The Weil pairing, and its efficient calculation. Zbl 1078.14043
Miller, Victor S. |
|
2004
|
How to construct constant-round zero-knowledge proof systems for NP. Zbl 0855.68085
Goldreich, Oded; Kahan, Ariel |
|
1996
|
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi |
|
1988
|
Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373
Boneh, Dan; Boyen, Xavier |
|
2008
|
A construction of a cipher from a single pseudorandom permutation. Zbl 1053.94552
Even, Shimon; Mansour, Yishay |
|
1997
|
Fast correlation attacks on certain stream ciphers. Zbl 0673.94010
Meier, Willi; Staffelbach, Othmar |
|
1989
|
Secure integration of asymmetric and symmetric encryption schemes. Zbl 1291.94085
Fujisaki, Eiichiro; Okamoto, Tatsuaki |
|
2013
|
On the classification of ideal secret sharing schemes. Zbl 0747.94010
Brickell, Ernest F.; Davenport, Daniel M. |
|
1991
|
Hyperelliptic cryptosystems. Zbl 0674.94010
Koblitz, Neal |
|
1989
|
On the size of shares for secret sharing schemes. Zbl 0786.68030
Capocelli, Renato M.; De Santis, Alfredo; Gargano, Luisa; Vaccaro, Ugo |
|
1993
|
Efficient quantum key distribution scheme and a proof of its unconditional security. Zbl 1084.68047
Lo, Hoi-Kwong; Chau, H. F.; Ardehali, M. |
|
2005
|
New types of cryptanalytic attacks using related keys. Zbl 0812.94012
Biham, Eli |
|
1994
|
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M. |
|
2003
|
On probability of success in linear and differential cryptanalysis. Zbl 1147.68510
Selçuk, Ali Aydın |
|
2008
|
On the construction of pseudorandom permutations: Luby-Rackoff revisited. Zbl 0936.94010
Naor, Moni; Reingold, Omer |
|
1999
|
Feedback shift registers, 2-adic span, and combiners with memory. Zbl 0874.94029
Klapper, Andrew; Goresky, Mark |
|
1997
|
The size of a share must be large. Zbl 0897.94012
Csirmaz, László |
|
1997
|
Player simulation and general adversary structures in perfect multiparty computation. Zbl 0988.94019
Hirt, Martin; Maurer, Ueli |
|
2000
|
Secure distributed key generation for discrete-log based cryptosystems. Zbl 1115.68075
Gennaro, Rosario; Jarecki, Stanislaw; Krawczyk, Hugo; Rabin, Tal |
|
2007
|
Constructive and destructive facets of Weil descent on elliptic curves. Zbl 0996.94036
Gaudry, P.; Hess, F.; Smart, N. P. |
|
2001
|
Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris |
|
2012
|
On-line/off-line digital signatures. Zbl 0844.94011
Even, Shimon; Goldreich, Oded; Micali, Silvio |
|
1996
|
How to share a secret with cheaters. Zbl 0659.94008
Tompa, Martin; Woll, Heather |
|
1988
|
A one round protocol for tripartite Diffie-Hellman. Zbl 1070.94007
Joux, Antoine |
|
2004
|
TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141
Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika |
|
2020
|
Secure hardware implementation of nonlinear functions in the presence of glitches. Zbl 1239.94060
Nikova, Svetla; Rijmen, Vincent; Schläffer, Martin |
|
2011
|
Smooth projective hashing and two-message oblivious transfer. Zbl 1272.94033
Halevi, Shai; Kalai, Yael Tauman |
|
2012
|
Efficient cryptographic schemes provably as secure as subset sum. Zbl 0862.94015
Impagliazzo, Russell; Naor, Moni |
|
1996
|
Tweakable block ciphers. Zbl 1258.94040
Liskov, Moses; Rivest, Ronald L.; Wagner, David |
|
2011
|
Graph decompositions and secret sharing schemes. Zbl 0816.94013
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R.; Vaccaro, Ugo |
|
1995
|
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran |
|
2017
|
Some improved bounds on the information rate of perfect secret sharing schemes. Zbl 0763.94008
Brickell, E. F.; Stinson, D. R. |
|
1992
|
Structural attacks for public key cryptosystems based on Gabidulin codes. Zbl 1159.94009
Overbeck, R. |
|
2008
|
Conditionally-perfect secrecy and a provably-secure randomized cipher. Zbl 0746.94013
Maurer, Ueli M. |
|
1992
|
Multiple assignment scheme for sharing secret. Zbl 0795.68070
Ito, Mitsuru; Saito, Akira; Nishizeki, Takao |
|
1993
|
Hierarchical threshold secret sharing. Zbl 1113.68048
Tassa, Tamir |
|
2007
|
Selecting cryptographic key sizes. Zbl 1006.94020
Lenstra, Arjen K.; Verheul, Eric R. |
|
2001
|
Secure multi-party computation without agreement. Zbl 1102.68472
Goldwasser, Shafi; Lindell, Yehuda |
|
2005
|
Provable security against a differential attack. Zbl 0817.94016
Nyberg, Kaisa; Knudsen, Lars Ramkilde |
|
1995
|
The discrete logarithm problem on elliptic curves of trace one. Zbl 0963.11068
Smart, N. P. |
|
1999
|
An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510
Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge |
|
2017
|
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia |
|
2008
|
The combinatorics of authentication and secrecy codes. Zbl 0701.94006
Stinson, D. R. |
|
1990
|
New approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups. Zbl 1020.94010
Magliveras, S. S.; Stinson, D. R.; van Trung, Tran |
|
2002
|
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip |
|
2008
|
Secure proxy signature schemes for delegation of signing rights. Zbl 1272.94016
Boldyreva, Alexandra; Palacio, Adriana; Warinschi, Bogdan |
|
2012
|
On the importance of eliminating errors in cryptographic computations. Zbl 1018.94014
Boneh, Dan; DeMillo, Richard A.; Lipton, Richard J. |
|
2001
|
Random oracles in Constantinople: Practical asynchronous Byzantine agreement using cryptography. Zbl 1097.68559
Cachin, Christian; Kursawe, Klaus; Shoup, Victor |
|
2005
|
Perfect zero-knowledge arguments for NP using any one-way permutation. Zbl 0960.94016
Naor, Moni; Ostrovsky, Rafail; Venkatesan, Ramarathnam; Yung, Moti |
|
1998
|
Lattice reduction: a toolbox for the cryptoanalyst. Zbl 0919.94011
Joux, Antoine; Stern, Jacques |
|
1998
|
Decorrelation: a theory for block cipher security. Zbl 1070.94009
Vaudenay, Serge |
|
2003
|
The insecurity of the digital signature algorithm with partially known nonces. Zbl 1009.94011
Nguyen, Phong Q.; Shparlinski, Igor E. |
|
2002
|
The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm. Zbl 0978.94038
Balasubramanian, R.; Koblitz, Neal |
|
1998
|
Constructing locally computable extractors and cryptosystems in the bounded-storage model. Zbl 1071.94016
Vadhan, Salil P. |
|
2004
|
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny |
|
2002
|
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas |
|
2020
|
Side-channel resistant crypto for less than 2,300 GE. Zbl 1239.94063
Poschmann, Axel; Moradi, Amir; Khoo, Khoongming; Lim, Chu-Wee; Wang, Huaxiong; Ling, San |
|
2011
|
Kangaroos, monopoly and discrete logarithms. Zbl 0979.11057
Pollard, J. M. |
|
2000
|
Reconciling two views of cryptography (The computational soundness of formal encryption). Zbl 0994.68066
Abadi, Martín; Rogaway, Phillip |
|
2002
|
A proof of the security of quantum key distribution. Zbl 1109.68045
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani |
|
2006
|
Parallel coin-tossing and constant-round secure two-party computation. Zbl 1027.94011
Lindell, Yehuda |
|
2003
|
A full proof of the BGW protocol for perfectly secure multiparty computation. Zbl 1370.94480
Asharov, Gilad; Lindell, Yehuda |
|
2017
|
Ring signatures: Stronger definitions, and constructions without random oracles. Zbl 1163.94431
Bender, Adam; Katz, Jonathan; Morselli, Ruggero |
|
2009
|
Efficient selective identity-based encryption without random oracles. Zbl 1251.94022
Boneh, Dan; Boyen, Xavier |
|
2011
|
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan |
|
2007
|
Generic constructions of identity-based and certificateless kEMs. Zbl 1143.94340
Bentahar, K.; Farshim, P.; Malone-Lee, J.; Smart, N. P. |
|
2008
|
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. Zbl 1400.94132
Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud |
|
2018
|
A key-exchange system based on imaginary quadratic fields. Zbl 0659.94004
Buchmann, Johannes; Williams, H. C. |
|
1988
|
Updating key size estimations for pairings. Zbl 1435.94122
Barbulescu, Razvan; Duquesne, Sylvain |
|
2019
|
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas |
|
2021
|
Logic minimization techniques with applications to cryptology. Zbl 1279.94056
Boyar, Joan; Matthews, Philip; Peralta, René |
|
2013
|
Endomorphisms for faster elliptic curve cryptography on a large class of curves. Zbl 1258.94036
Galbraith, Steven D.; Lin, Xibin; Scott, Michael |
|
2011
|
Binary sequences derived from ML-sequences over rings. I: Periods and minimal polynomials. Zbl 0763.94007
Dai, Zong-Duo |
|
1992
|
How to protect DES against exhaustive key search (an analysis of DESX). Zbl 1068.94531
Kilian, Joe; Rogaway, Phillip |
|
2001
|
Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Zbl 1132.68027
Goh, Eu-Jin; Jarecki, Stanislaw; Katz, Jonathan; Wang, Nan |
|
2007
|
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation. Zbl 0861.94013
Bellare, Mihir; Yung, Moti |
|
1996
|
On the contrast in visual cryptography schemes. Zbl 0944.94010
Blundo, Carlo; De Santis, Alfredo; Stinson, Douglas R. |
|
1999
|
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091
Katz, Jonathan; Sahai, Amit; Waters, Brent |
|
2013
|
A uniform-complexity treatment of encryption and zero-knowledge. Zbl 0795.68069
Goldreich, Oded |
|
1993
|
Enumerating Boolean functions of cryptographic significance. Zbl 0705.94010
Mitchell, Chris |
|
1990
|
Secure communication in minimal connectivity models. Zbl 0957.68042
Franklin, Matthew; Wright, Rebecca N. |
|
2000
|
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Zbl 1434.94066
Fuchsbauer, Georg; Hanser, Christian; Slamanig, Daniel |
|
2019
|
Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. Zbl 1101.14309
Joux, Antoine; Nguyen, Kim |
|
2003
|
On polynomial approximation of the discrete logarithm and the Diffie-Hellman mapping. Zbl 1038.94007
Coppersmith, Don; Shparlinski, Igor |
|
2000
|
A universal statistical test for random bit generators. Zbl 0790.94014
Maurer, Ueli M. |
|
1992
|
Algebraic properties of cryptosystem PGM. Zbl 0763.94014
Magliveras, Spyros S.; Memon, Nasir D. |
|
1992
|
Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH. Zbl 1511.94084
Datta, Pratish; Komargodski, Ilan; Waters, Brent |
|
2023
|
On the hardness of module learning with errors with short distributions. Zbl 1509.94069
Boudgoust, Katharina; Jeudy, Corentin; Roux-Langlois, Adeline; Wen, Weiqiang |
|
2023
|
Fiat-Shamir transformation of multi-round interactive proofs (Extended version). Zbl 1519.94040
Attema, Thomas; Fehr, Serge; Klooß, Michael |
|
2023
|
On the communication efficiency of statistically secure asynchronous MPC with optimal resilience. Zbl 1511.94078
Choudhury, Ashish; Patra, Arpita |
|
2023
|
High-throughput secure three-party computation with an honest majority. Zbl 07707563
Furukawa, Jun; Lindell, Yehuda; Nof, Ariel; Weinstein, Or |
|
2023
|
Bootstrapping for BGV and BFV revisited. Zbl 1511.94102
Geelen, Robin; Vercauteren, Frederik |
|
2023
|
Revisiting the efficiency of asynchronous MPC with optimal resilience against general adversaries. Zbl 1517.94053
Appan, Ananya; Chandramouli, Anirudh; Choudhury, Ashish |
|
2023
|
Oblivious RAM with worst-case logarithmic overhead. Zbl 1511.94045
Asharov, Gilad; Komargodski, Ilan; Lin, Wei-Kai; Shi, Elaine |
|
2023
|
Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró. Zbl 1517.94087
Coutinho, Murilo; Passos, Iago; Grados Vásquez, Juan C.; Sarkar, Santanu; de Mendonça, Fábio L. L.; de Sousa, Rafael T. jun.; Borges, Fábio |
|
2023
|
Learn from your faults: leakage assessment in fault attacks using deep learning. Zbl 1517.94150
Saha, Sayandeep; Alam, Manaar; Bag, Arnab; Mukhopadhyay, Debdeep; Dasgupta, Pallab |
|
2023
|
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. Zbl 1517.94123
Libert, Benoît; Ling, San; Khoa Nguyen; Wang, Huaxiong |
|
2023
|
Rinocchio: SNARKs for ring arithmetic. Zbl 1527.94039
Ganesh, Chaya; Nitulescu, Anca; Soria-Vazquez, Eduardo |
|
2023
|
Manticore: a framework for efficient multiparty computation supporting real number and Boolean arithmetic. Zbl 07730739
Belorgey, Mariya Georgieva; Carpov, Sergiu; Deforth, Kevin; Jetchev, Dimitar; Sae-Tang, Abson; Vuille, Marius; Gama, Nicolas; Katz, Jon; Leontiadis, Iraklis; Mohammadi, Mohsen |
|
2023
|
Cover attacks for elliptic curves over cubic extension fields. Zbl 1519.94189
Tian, Song |
|
2023
|
Unbounded predicate inner product functional encryption from pairings. Zbl 1518.94056
Dowerah, Uddipana; Dutta, Subhranil; Mitrokotsa, Aikaterini; Mukherjee, Sayantan; Pal, Tapas |
|
2023
|
Actively secure garbled circuits with constant communication overhead in the plain model. Zbl 1518.94066
Hazay, Carmit; Ishai, Yuval; Venkitasubramaniam, Muthuramakrishnan |
|
2023
|
Parameter optimization and larger precision for (T)FHE. Zbl 1518.94045
Bergerat, Loris; Boudi, Anas; Bourgerie, Quentin; Chillotti, Ilaria; Ligier, Damien; Orfila, Jean-Baptiste; Tap, Samuel |
|
2023
|
Semi-quantum money. Zbl 1491.81016
Radian, Roy; Sattath, Or |
|
2022
|
Actively secure setup for SPDZ. Zbl 1481.94122
Rotaru, Dragos; Smart, Nigel P.; Tanguy, Titouan; Vercauteren, Frederik; Wood, Tim |
|
2022
|
Limits on the efficiency of (ring) LWE-based non-interactive key exchange. Zbl 1479.94183
Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina |
|
2022
|
Non-commutative ring learning with errors from cyclic algebras. Zbl 1497.94096
Grover, Charles; Mendelsohn, Andrew; Ling, Cong; Vehkalahti, Roope |
|
2022
|
The inverse of \(\chi\) and its applications to Rasta-like ciphers. Zbl 1498.94071
Liu, Fukang; Sarkar, Santanu; Meier, Willi; Isobe, Takanori |
|
2022
|
Improved differential-linear attacks with applications to ARX ciphers. Zbl 1504.94103
Beierle, Christof; Broll, Marek; Canale, Federico; David, Nicolas; Flórez-Gutiérrez, Antonio; Leander, Gregor; Naya-Plasencia, María; Todo, Yosuke |
|
2022
|
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices. Zbl 1489.94119
Damgård, Ivan; Orlandi, Claudio; Takahashi, Akira; Tibouchi, Mehdi |
|
2022
|
On the round complexity of randomized Byzantine agreement. Zbl 1489.94092
Cohen, Ran; Haitner, Iftach; Makriyannis, Nikolaos; Orland, Matan; Samorodnitsky, Alex |
|
2022
|
From fairness to full security in multiparty computation. Zbl 1486.94091
Cohen, Ran; Haitner, Iftach; Omri, Eran; Rotem, Lior |
|
2022
|
CCA security and trapdoor functions via key-dependent-message security. Zbl 1486.94119
Kitagawa, Fuyuki; Matsuda, Takahiro; Tanaka, Keisuke |
|
2022
|
Non-malleable functions and their applications. Zbl 1486.94086
Chen, Yu; Qin, Baodong; Zhang, Jiang; Deng, Yi; Chow, Sherman S. M. |
|
2022
|
Everlasting UC commitments from fully malicious PUFs. Zbl 1492.94146
Magri, Bernardo; Malavolta, Giulio; Schröder, Dominique; Unruh, Dominique |
|
2022
|
ZK-PCPs from leakage-resilient secret sharing. Zbl 1494.94046
Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan; Weiss, Mor |
|
2022
|
Signed (group) Diffie-Hellman key exchange with tight security. Zbl 1498.94079
Pan, Jiaxin; Qian, Chen; Ringerud, Magnus |
|
2022
|
Efficient perfectly secure computation with optimal resilience. Zbl 1499.94033
Abraham, Ittai; Asharov, Gilad; Yanai, Avishay |
|
2022
|
On the (in)security of ROS. Zbl 1497.94076
Benhamouda, Fabrice; Lepoint, Tancrède; Loss, Julian; Orrù, Michele; Raykova, Mariana |
|
2022
|
A cryptographic analysis of the TLS 1.3 handshake protocol. Zbl 1472.94049
Dowling, Benjamin; Fischlin, Marc; Günther, Felix; Stebila, Douglas |
|
2021
|
Ascon v1.2: lightweight authenticated encryption and hashing. Zbl 1470.94084
Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian; Schläffer, Martin |
|
2021
|
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. Zbl 1470.94082
Diemert, Denis; Jager, Tibor |
|
2021
|
Bootstrapping for helib. Zbl 1460.94046
Halevi, Shai; Shoup, Victor |
|
2021
|
The number of almost perfect nonlinear functions grows exponentially. Zbl 1483.94081
Kaspers, Christian; Zhou, Yue |
|
2021
|
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions. Zbl 1478.94114
Zhandry, Mark |
|
2021
|
On subversion-resistant SNARKs. Zbl 1467.94021
Abdolmaleki, Behzad; Lipmaa, Helger; Siim, Janno; Zając, Michał |
|
2021
|
On the local leakage resilience of linear secret sharing schemes. Zbl 1467.94030
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal |
|
2021
|
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. Zbl 1475.94111
Derler, David; Gellert, Kai; Jager, Tibor; Slamanig, Daniel; Striecks, Christoph |
|
2021
|
Fine-grained cryptography revisited. Zbl 1469.94094
Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke |
|
2021
|
High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P. |
|
2021
|
Modeling for three-subset division property without unknown subset. Zbl 1470.94087
Hao, Yonglin; Leander, Gregor; Meier, Willi; Todo, Yosuke; Wang, Qingju |
|
2021
|
The Deoxys AEAD family. Zbl 1470.94091
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick |
|
2021
|
Match me if you can: matchmaking encryption and its applications. Zbl 1467.94027
Ateniese, Giuseppe; Francati, Danilo; Nuñez, David; Venturi, Daniele |
|
2021
|
Round-optimal secure multi-party computation. Zbl 1469.94101
Halevi, Shai; Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan |
|
2021
|
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT. Zbl 1469.94088
Aviram, Nimrod; Gellert, Kai; Jager, Tibor |
|
2021
|
The design and evolution of OCB. Zbl 1472.94056
Krovetz, Ted; Rogaway, Phillip |
|
2021
|
Tight tradeoffs in searchable symmetric encryption. Zbl 1460.94035
Asharov, Gilad; Segev, Gil; Shahaf, Ido |
|
2021
|
Reusable fuzzy extractors for low-entropy distributions. Zbl 1466.94021
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam |
|
2021
|
Round-preserving parallel composition of probabilistic-termination cryptographic protocols. Zbl 1515.68139
Cohen, Ran; Coretti, Sandro; Garay, Juan; Zikas, Vassilis |
|
2021
|
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC. Zbl 1469.94090
Chen, Shan; Jero, Samuel; Jagielski, Matthew; Boldyreva, Alexandra; Nita-Rotaru, Cristina |
|
2021
|
Watermarking cryptographic functionalities from standard lattice assumptions. Zbl 1518.68088
Kim, Sam; Wu, David J. |
|
2021
|
Translating the discrete logarithm problem on Jacobians of genus 3 hyperelliptic curves with \((\ell ,\ell ,\ell)\)-isogenies. Zbl 1467.14107
Tian, Song |
|
2021
|
Is there an oblivious RAM lower bound for online reads? Zbl 1518.68091
Weiss, Mor; Wichs, Daniel |
|
2021
|
Placing conditional disclosure of secrets in the communication complexity universe. Zbl 1467.94026
Applebaum, Benny; Vasudevan, Prashant Nalini |
|
2021
|
Simple and generic constructions of succinct functional encryption. Zbl 1469.94103
Kitagawa, Fuyuki; Nishimaki, Ryo; Tanaka, Keisuke |
|
2021
|
Compact designated verifier NIZKs from the CDH assumption without pairings. Zbl 1479.94198
Katsumata, Shuichi; Nishimaki, Ryo; Yamada, Shota; Yamakawa, Takashi |
|
2021
|
Fast secure two-party ECDSA signing. Zbl 1479.94332
Lindell, Yehuda |
|
2021
|
Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on Gimli. Zbl 1479.94171
Flórez-Gutiérrez, Antonio; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Schrottenloher, André; Sibleyras, Ferdinand |
|
2021
|
Can PPAD hardness be based on standard cryptographic assumptions? Zbl 1460.94064
Rosen, Alon; Segev, Gil; Shahaf, Ido |
|
2021
|
Obfuscating circuits via composite-order graded encoding. Zbl 1467.94025
Applebaum, Benny; Brakerski, Zvika |
|
2021
|
Learning strikes again: the case of the DRS signature scheme. Zbl 1466.94045
Ducas, Léo; Yu, Yang |
|
2021
|
Tighter security proofs for GPV-IBE in the quantum random oracle model. Zbl 1465.94073
Katsumata, Shuichi; Yamada, Shota; Yamakawa, Takashi |
|
2021
|
TFHE: fast fully homomorphic encryption over the torus. Zbl 1455.94141
Chillotti, Ilaria; Gama, Nicolas; Georgieva, Mariya; Izabachène, Malika |
|
2020
|
A formal security analysis of the Signal messaging protocol. Zbl 1453.94133
Cohn-Gordon, Katriel; Cremers, Cas; Dowling, Benjamin; Garratt, Luke; Stebila, Douglas |
|
2020
|
Identification protocols and signature schemes based on supersingular isogeny problems. Zbl 1455.94155
Galbraith, Steven D.; Petit, Christophe; Silva, Javier |
|
2020
|
Efficient verifiable delay functions. Zbl 1453.94125
Wesolowski, Benjamin |
|
2020
|
Solving LPN using covering codes. Zbl 1455.94161
Guo, Qian; Johansson, Thomas; Löndahl, Carl |
|
2020
|
The IITM model: a simple and expressive model for universal composability. Zbl 1490.68094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel |
|
2020
|
Efficient and scalable universal circuits. Zbl 1462.94027
Alhassan, Masaud Y.; Günther, Daniel; Kiss, Ágnes; Schneider, Thomas |
|
2020
|
Tight security of cascaded LRW2. Zbl 1457.94141
Jha, Ashwin; Nandi, Mridul |
|
2020
|
Practical collision attacks against round-reduced SHA-3. Zbl 1455.94160
Guo, Jian; Liao, Guohong; Liu, Guozhen; Liu, Meicheng; Qiao, Kexin; Song, Ling |
|
2020
|
From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175
Komargodski, Ilan; Segev, Gil |
|
2020
|
Blockcipher-based authenticated encryption: how small can we go? Zbl 1457.94107
Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul |
|
2020
|
Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin. Zbl 1457.94153
Kowalczyk, Lucas; Wee, Hoeteck |
|
2020
|
Block cipher invariants as eigenvectors of correlation matrices. Zbl 1457.94099
Beyne, Tim |
|
2020
|
From cryptomania to obfustopia through secret-key functional encryption. Zbl 1435.94123
Bitansky, Nir; Nishimaki, Ryo; Passelègue, Alain; Wichs, Daniel |
|
2020
|
CryptHOL: game-based proofs in higher-order logic. Zbl 1455.94121
Basin, David A.; Lochbihler, Andreas; Sefidgar, S. Reza |
|
2020
|
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1457.94097
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi |
|
2020
|
Foundations of fully dynamic group signatures. Zbl 1453.94063
Bootle, Jonathan; Cerulli, Andrea; Chaidos, Pyrros; Ghadafi, Essam; Groth, Jens |
|
2020
|
Kummer for genus one over prime-order fields. Zbl 1455.94169
Karati, Sabyasachi; Sarkar, Palash |
|
2020
|
Topology-hiding computation on all graphs. Zbl 1455.94103
Akavia, Adi; LaVigne, Rio; Moran, Tal |
|
2020
|
Locally decodable and updatable non-malleable codes and their applications. Zbl 1456.94067
Dachman-Soled, Dana; Liu, Feng-Hao; Shi, Elaine; Zhou, Hong-Sheng |
|
2020
|
The communication complexity of private simultaneous messages, revisited. Zbl 1457.94003
Applebaum, Benny; Holenstein, Thomas; Mishra, Manoj; Shayevitz, Ofer |
|
2020
|
Verifiable random functions from non-interactive witness-indistinguishable proofs. Zbl 1455.94127
Bitansky, Nir |
|
2020
|
Tightly secure hierarchical identity-based encryption. Zbl 1453.94095
Langrehr, Roman; Pan, Jiaxin |
|
2020
|
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu |
|
2020
|
Oblivious sampling with applications to two-party \(k\)-means clustering. Zbl 1457.94104
Bunn, Paul; Ostrovsky, Rafail |
|
2020
|
Revisiting the wrong-key-randomization hypothesis. Zbl 1455.94113
Ashur, Tomer; Beyne, Tim; Rijmen, Vincent |
|
2020
|
Low cost constant round MPC combining BMR and oblivious transfer. Zbl 1453.94085
Hazay, Carmit; Scholl, Peter; Soria-Vazquez, Eduardo |
|
2020
|
Cryptanalysis of OCB2: attacks on authenticity and confidentiality. Zbl 1453.94089
Inoue, Akiko; Iwata, Tetsu; Minematsu, Kazuhiko; Poettering, Bertram |
|
2020
|
Joint state composition theorems for public-key encryption and digital signature functionalities with local computation. Zbl 1453.94094
Küsters, Ralf; Tuengerthal, Max; Rausch, Daniel |
|
2020
|
\(1/p\)-secure multiparty computation without an honest majority and the best of both worlds. Zbl 1453.94131
Beimel, Amos; Lindell, Yehuda; Omri, Eran; Orlov, Ilan |
|
2020
|
Generic attacks on hash combiners. Zbl 1457.94095
Bao, Zhenzhen; Dinur, Itai; Guo, Jian; Leurent, Gaëtan; Wang, Lei |
|
2020
|
Four-state non-malleable codes with explicit constant rate. Zbl 1457.94145
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi |
|
2020
|
Multilinear maps from obfuscation. Zbl 1457.94090
Albrecht, Martin R.; Farshim, Pooya; Han, Shuai; Hofheinz, Dennis; Larraia, Enrique; Paterson, Kenneth G. |
|
2020
|
Spin me right round rotational symmetry for FPGA-specific AES: extended version. Zbl 1457.94192
Wegener, Felix; De Meyer, Lauren; Moradi, Amir |
|
2020
|
...and 547 more Documents |