


default search action
37th EUROCRYPT 2018: Tel Aviv, Israel - Part II
- Jesper Buus Nielsen, Vincent Rijmen:

Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. Lecture Notes in Computer Science 10822, Springer 2018, ISBN 978-3-319-78371-0
Zero-Knowledge
- Nils Fleischhacker

, Vipul Goyal, Abhishek Jain:
On the Existence of Three Round Zero-Knowledge Proofs. 3-33 - Yael Tauman Kalai, Dakshita Khurana

, Amit Sahai:
Statistical Witness Indistinguishability (and more) in Two Messages. 34-65 - Pavel Hubácek

, Alon Rosen, Margarita Vald:
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge. 66-87
Implementing Multiparty Computation
- Marcel Keller

, Avishay Yanai
:
Efficient Maliciously Secure Multiparty Computation for RAM. 91-124 - Benny Pinkas, Thomas Schneider

, Christian Weinert
, Udi Wieder:
Efficient Circuit-Based PSI via Cuckoo Hashing. 125-157 - Marcel Keller

, Valerio Pastro, Dragos Rotaru
:
Overdrive: Making SPDZ Great Again. 158-189
Non-interactive Zero-Knowledge
- Pyrros Chaidos, Geoffroy Couteau

:
Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge. 193-221 - Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:

Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. 222-255
Anonymous Communication
- Jean Paul Degabriele, Martijn Stam:

Untagging Tor: A Formal Treatment of Onion Encryption. 259-293 - Marshall Ball, Elette Boyle, Tal Malkin, Tal Moran:

Exploring the Boundaries of Topology-Hiding Computation. 294-325
Isogeny
- Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison

, Christophe Petit
:
Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions. 329-368
Leakage
- Yi-Hsiu Chen, Kai-Min Chung

, Jyun-Jie Liao:
On the Complexity of Simulating Auxiliary Input. 371-390
Key Exchange
- Pierre-Alain Dupont

, Julia Hesse, David Pointcheval
, Leonid Reyzin, Sophia Yakoubov
:
Fuzzy Password-Authenticated Key Exchange. 393-424 - David Derler

, Tibor Jager, Daniel Slamanig
, Christoph Striecks
:
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. 425-455 - Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:

OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. 456-486
Quantum
- Gorjan Alagic, Tommaso Gagliardoni, Christian Majenz

:
Unforgeable Quantum Encryption. 489-519 - Tsunekazu Saito, Keita Xagawa

, Takashi Yamakawa:
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model. 520-551 - Eike Kiltz

, Vadim Lyubashevsky, Christian Schaffner
:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. 552-586
Non-maleable Codes
- Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu

, Sruthi Sekar:
Non-malleable Randomness Encoders and Their Applications. 589-617 - Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:

Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering. 618-650
Provable Symmetric Cryptography
- Pratik Soni, Stefano Tessaro:

Naor-Reingold Goes Public: The Complexity of Known-Key Security. 653-684 - Anja Lehmann, Björn Tackmann:

Updatable Encryption with Post-Compromise Security. 685-716

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














