


default search action
ASIACRYPT 2018: Brisbane, QLD, Australia
- Thomas Peyrin, Steven D. Galbraith:

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. Lecture Notes in Computer Science 11274, Springer 2018, ISBN 978-3-030-03331-6
Multi-Party Computation
- Aner Ben-Efraim:

On Multiparty Garbling of Arithmetic Circuits. 3-33 - Vladimir Kolesnikov:

$$\mathsf {Free\ }{} \mathtt{IF} $$ : How to Omit Inactive Branches and Implement S -Universal Garbled Circuit (Almost) for Free. 34-58 - S. Dov Gordon, Samuel Ranellucci, Xiao Wang

:
Secure Computation with Low Communication from Cross-Checking. 59-85 - Carmit Hazay, Emmanuela Orsini

, Peter Scholl, Eduardo Soria-Vazquez
:
Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT). 86-117 - Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti:

Non-interactive Secure Computation from One-Way Functions. 118-138
ORAM
- S. Dov Gordon, Jonathan Katz, Xiao Wang

:
Simple and Efficient Two-Server ORAM. 141-157 - T.-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi:

More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting. 158-188
Real World Protocols
- Pyrros Chaidos, Olga Fourtounelli, Aggelos Kiayias, Thomas Zacharias

:
A Universally Composable Framework for the Privacy of Email Ecosystems. 191-221 - Chris Brzuska, Antoine Delignat-Lavaud, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss

:
State Separation for Code-Based Game-Playing Proofs. 222-249 - Puwen Wei, Quan Yuan

, Yuliang Zheng
:
Security of the Blockchain Against Long Delay Attack. 250-275
Secret Sharing
- Russell W. F. Lai

, Giulio Malavolta
, Dominique Schröder
:
Homomorphic Secret Sharing for Low Degree Polynomials. 279-309 - Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang:

Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem. 310-331 - Amos Beimel

, Naty Peter:
Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols. 332-362
Isogeny-Based Cryptography
- Luca De Feo

, Jean Kieffer
, Benjamin Smith:
Towards Practical Key Exchange from Ordinary Isogeny Graphs. 365-394 - Wouter Castryck

, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes:
CSIDH: An Efficient Post-Quantum Commutative Group Action. 395-427 - Craig Costello

:
Computing Supersingular Isogenies on Kummer Surfaces. 428-456
Foundations
- Yunhua Wen, Shengli Liu:

Robustly Reusable Fuzzy Extractor from Standard Assumptions. 459-489 - Tibor Jager, Rafael Kurek, Jiaxin Pan

:
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. 490-518 - Jean Paul Degabriele, Marc Fischlin:

Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove. 519-550

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














