


default search action
38th CRYPTO 2018: Santa Barbara, CA, USA - Part I
- Hovav Shacham, Alexandra Boldyreva:

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I. Lecture Notes in Computer Science 10991, Springer 2018, ISBN 978-3-319-96883-4
Secure Messaging
- Bertram Poettering

, Paul Rösler
:
Towards Bidirectional Ratcheted Key Exchange. 3-32 - Joseph Jaeger

, Igors Stepanovs:
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging. 33-62 - Lior Rotem, Gil Segev:

Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal. 63-89
Implementations and Physical Attacks Prevention
- Shai Halevi, Victor Shoup:

Faster Homomorphic Linear Transformations in HElib. 93-120 - Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova

, Ventzislav Nikov, Nigel P. Smart:
CAPA: The Spirit of Beaver Against Physical Attacks. 121-151
Authenticated and Format-Preserving Encryption
- Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart

, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. 155-186 - Manuel Barbosa

, Pooya Farshim:
Indifferentiable Authenticated Encryption. 187-220 - Viet Tung Hoang, Stefano Tessaro, Ni Trieu:

The Curse of Small Domains: New Attacks on Format-Preserving Encryption. 221-251
Cryptoanalysis
- Adi Ben-Zvi, Arkadius G. Kalka, Boaz Tsaban:

Cryptanalysis via Algebraic Spans. 255-274 - Qingju Wang

, Yonglin Hao, Yosuke Todo
, Chaoyun Li
, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. 275-305 - Gaëtan Leurent

, Mridul Nandi
, Ferdinand Sibleyras:
Generic Attacks Against Beyond-Birthday-Bound MACs. 306-336
Searchable Encryption and Differential Privacy
- Seny Kamara, Tarik Moataz, Olga Ohrimenko:

Structured Encryption and Leakage Suppression. 339-370 - Ioannis Demertzis

, Dimitrios Papadopoulos, Charalampos Papamanthou:
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency. 371-406 - Gilad Asharov

, Gil Segev, Ido Shahaf:
Tight Tradeoffs in Searchable Symmetric Encryption. 407-436 - Lucas Kowalczyk, Tal Malkin, Jonathan R. Ullman, Daniel Wichs:

Hardness of Non-interactive Differential Privacy from One-Way Functions. 437-466 - Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters:

Risky Traitor Tracing and New Differential Privacy Negative Results. 467-497
Secret Sharing
- Vipul Goyal, Ashutosh Kumar:

Non-malleable Secret Sharing for General Access Structures. 501-530 - Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin:

On the Local Leakage Resilience of Linear Secret Sharing Schemes. 531-561
Encryption
- Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen

, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. 565-596 - Michel Abdalla

, Dario Catalano, Dario Fiore
, Romain Gay
, Bogdan Ursu
:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings. 597-627
Symmetric Cryptography
- Nilanjan Datta, Avijit Dutta

, Mridul Nandi
, Kan Yasuda:
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. 631-661 - Christoph Dobraunig

, Maria Eichlseder
, Lorenzo Grassi
, Virginie Lallemand, Gregor Leander
, Eik List, Florian Mendel
, Christian Rechberger
:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. 662-692 - Sandro Coretti, Yevgeniy Dodis, Siyao Guo:

Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. 693-721 - Benoît Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:

Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks. 722-753
Proofs of Work and Proofs of Stake
- Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:

Verifiable Delay Functions. 757-788 - Marshall Ball, Alon Rosen, Manuel Sabin, Prashant Nalini Vasudevan:

Proofs of Work From Worst-Case Assumptions. 789-819

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














