


default search action
21st PKC 2018: Rio de Janeiro, Brazil
- Michel Abdalla

, Ricardo Dahab:
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I. Lecture Notes in Computer Science 10769, Springer 2018, ISBN 978-3-319-76577-8
Key-Dependent-Message and Selective-Opening Security
- Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny:

New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes. 3-31 - Fuyuki Kitagawa, Keisuke Tanaka:

Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption. 32-61 - Lin Lyu

, Shengli Liu
, Shuai Han
, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. 62-92
Searchable and Fully Homomorphic Encryption
- Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs:

Multi-Key Searchable Encryption, Revisited. 95-124 - Yarkin Doröz, Jeffrey Hoffstein

, Jill Pipher, Joseph H. Silverman
, Berk Sunar, William Whyte, Zhenfei Zhang:
Fully Homomorphic Encryption from the Finite Field Isomorphism Problem. 125-155
Public-Key Encryption
- Federico Giacon, Eike Kiltz

, Bertram Poettering
:
Hybrid Encryption in a Multi-user Setting, Revisited. 159-189 - Federico Giacon, Felix Heuer, Bertram Poettering

:
KEM Combiners. 190-218 - David Derler

, Stephan Krenn, Thomas Lorünser
, Sebastian Ramacher
, Daniel Slamanig
, Christoph Striecks:
Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications. 219-250
Encryption with Bad Randomness
- Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:

Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. 253-279 - Takahiro Matsuda, Jacob C. N. Schuldt:

Related Randomness Security for Public Key Encryption, Revisited. 280-311
Subversion Resistance
- Georg Fuchsbauer:

Subversion-Zero-Knowledge SNARKs. 315-347 - Benedikt Auerbach

, Mihir Bellare, Eike Kiltz
:
Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. 348-377
Cryptanalysis
- Daniel Hart, Dohoon Kim

, Giacomo Micheli, Guillermo Pascual-Perez
, Christophe Petit
, Yuxuan Quek:
A Practical Cryptanalysis of WalnutDSA TM. 381-406 - Gottfried Herold, Elena Kirshanova, Thijs Laarhoven:

Speed-Ups and Time-Memory Trade-Offs for Tuple Lattice Sieving. 407-436 - Tadanori Teruya

, Kenji Kashiwabara, Goichiro Hanaoka:
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem. 437-460
Composable Security
- Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges:

Reusing Tamper-Proof Hardware in UC-Secure Protocols. 463-493 - Christian Badertscher

, Ueli Maurer, Björn Tackmann:
On Composable Security for Digital Signatures. 494-523
Oblivious Transfer
- Baiyu Li, Daniele Micciancio

:
Equational Security Proofs of Oblivious Transfer Protocols. 527-553 - Peter Scholl

:
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. 554-583
Multiparty Computation
- Tore Kasper Frederiksen, Benny Pinkas, Avishay Yanai

:
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments. 587-619 - Yehuda Lindell, Avishay Yanai

:
Fast Garbling of Circuits over 3-Valued Logic. 620-643 - Stanislaw Jarecki:

Efficient Covert Two-Party Computation. 644-674 - Deepesh Data, Manoj Prabhakaran:

Towards Characterizing Securely Computable Two-Party Randomized Functions. 675-697 - Yuval Ishai, Manika Mittal, Rafail Ostrovsky:

On the Message Complexity of Secure Multiparty Computation. 698-711

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














