1 COMMENT{IACR BibTeX file created by Kevin McCurley. This work is
2 licensed under a Creative Commons Attribution 3.0 Unported License.
6 @inproceedings{ches-2013-24750,
7 title = {Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults},
8 author = {Ronan Lashermes and Jacques Fournier and Louis Goubin},
11 doi = {10.1007/978-3-642-40349-1_21},
12 publisher = {Springer},
16 @inproceedings{ches-2013-24751,
17 title = {Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware},
18 author = {Begül Bilgin and Andrey Bogdanov and Miroslav Knezevic and Florian Mendel and Qingju Wang},
21 doi = {10.1007/978-3-642-40349-1_9},
22 publisher = {Springer},
26 @inproceedings{ches-2013-24752,
27 title = {On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs},
28 author = {Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann},
31 doi = {10.1007/978-3-642-40349-1_7},
32 publisher = {Springer},
36 @inproceedings{ches-2013-24753,
37 title = {A New Model for Error-Tolerant Side-Channel Cube Attacks},
38 author = {Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede},
41 doi = {10.1007/978-3-642-40349-1_26},
42 publisher = {Springer},
46 @inproceedings{ches-2013-24754,
47 title = {Block Ciphers That Are Easier to Mask: How Far Can We Go?},
48 author = {Benoît Gérard and Vincent Grosso and María Naya-Plasencia and François-Xavier Standaert},
51 doi = {10.1007/978-3-642-40349-1_22},
52 publisher = {Springer},
56 @inproceedings{ches-2013-24755,
57 title = {Leakage-Resilient Symmetric Encryption via Re-keying},
58 author = {Michel Abdalla and Sonia Belaïd and Pierre-Alain Fouque},
61 doi = {10.1007/978-3-642-40349-1_27},
62 publisher = {Springer},
66 @inproceedings{ches-2013-24756,
67 title = {On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)},
68 author = {Amir Moradi and Oliver Mischke},
71 doi = {10.1007/978-3-642-40349-1_1},
72 publisher = {Springer},
76 @inproceedings{ches-2013-24757,
77 title = {An Accurate Probabilistic Reliability Model for Silicon PUFs},
81 doi = {10.1007/978-3-642-40349-1_5},
82 publisher = {Springer},
86 @inproceedings{ches-2013-24758,
87 title = {Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012},
88 author = {Arnab Roy and Srinivas Vivek},
91 doi = {10.1007/978-3-642-40349-1_24},
92 publisher = {Springer},
96 @inproceedings{ches-2013-24759,
97 title = {A Very High Speed True Random Number Generator with Entropy Assessment},
98 author = {Abdelkarim Cherkaoui and Viktor Fischer and Laurent Fesquet and Alain Aubert},
101 doi = {10.1007/978-3-642-40349-1_11},
102 publisher = {Springer},
106 @inproceedings{ches-2013-24760,
107 title = {On the Implementation of Unified Arithmetic on Binary Huff Curves},
108 author = {Santosh Ghosh and Amit Kumar and Amitabh Das and Ingrid Verbauwhede},
111 doi = {10.1007/978-3-642-40349-1_20},
112 publisher = {Springer},
116 @inproceedings{ches-2013-24761,
117 title = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?},
118 author = {Vincent Grosso and François-Xavier Standaert and Sebastian Faust},
121 doi = {10.1007/978-3-642-40349-1_23},
122 publisher = {Springer},
126 @inproceedings{ches-2013-24762,
127 title = {McBits: Fast Constant-Time Code-Based Cryptography},
128 author = {Daniel J. Bernstein and Tung Chou and Peter Schwabe},
131 doi = {10.1007/978-3-642-40349-1_15},
132 publisher = {Springer},
136 @inproceedings{ches-2013-24763,
137 title = {Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack},
138 author = {Adrian Thillard and Emmanuel Prouff and Thomas Roche},
141 doi = {10.1007/978-3-642-40349-1_2},
142 publisher = {Springer},
146 @inproceedings{ches-2013-24764,
147 title = {Stealthy Dopant-Level Hardware Trojans},
148 author = {Georg T. Becker and Francesco Regazzoni and Christof Paar and Wayne P. Burleson},
151 doi = {10.1007/978-3-642-40349-1_12},
152 publisher = {Springer},
156 @inproceedings{ches-2013-24765,
157 title = {Sleuth: Automated Verification of Software Power Analysis Countermeasures},
158 author = {Ali Galip Bayrak and Francesco Regazzoni and David Novo and Paolo Ienne},
161 doi = {10.1007/978-3-642-40349-1_17},
162 publisher = {Springer},
166 @proceedings{ches-2013-24766,
167 title = {Cryptographic Hardware and Embedded Systems - CHES 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
170 doi = {10.1007/978-3-642-40349-1},
171 publisher = {Springer},
175 @inproceedings{ches-2013-24767,
176 title = {A Differential Fault Attack on MICKEY 2.0},
177 author = {Subhadeep Banik and Subhamoy Maitra},
180 doi = {10.1007/978-3-642-40349-1_13},
181 publisher = {Springer},
185 @inproceedings{ches-2013-24768,
186 title = {Lambda Coordinates for Binary Elliptic Curves},
187 author = {Thomaz Oliveira and Julio López and Diego F. Aranha and Francisco Rodríguez-Henríquez},
190 doi = {10.1007/978-3-642-40349-1_18},
191 publisher = {Springer},
195 @inproceedings{ches-2013-24769,
196 title = {A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement},
197 author = {Mudit Bhargava and Ken Mai},
200 doi = {10.1007/978-3-642-40349-1_6},
201 publisher = {Springer},
205 @inproceedings{ches-2013-24770,
206 title = {Profiling DPA: Efficacy and Efficiency Trade-Offs},
207 author = {Carolyn Whitnall and Elisabeth Oswald},
210 doi = {10.1007/978-3-642-40349-1_3},
211 publisher = {Springer},
215 @inproceedings{ches-2013-24771,
216 title = {Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID},
217 author = {Peter Pessl and Michael Hutter},
220 doi = {10.1007/978-3-642-40349-1_8},
221 publisher = {Springer},
225 @inproceedings{ches-2013-24772,
226 title = {Improving Modular Inversion in RNS Using the Plus-Minus Method},
227 author = {Karim Bigou and Arnaud Tisserand},
230 doi = {10.1007/978-3-642-40349-1_14},
231 publisher = {Springer},
235 @inproceedings{ches-2013-24773,
236 title = {On Measurable Side-Channel Leaks Inside ASIC Design Primitives},
237 author = {Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino},
240 doi = {10.1007/978-3-642-40349-1_10},
241 publisher = {Springer},
245 @inproceedings{ches-2013-24774,
246 title = {High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition},
247 author = {Joppe W. Bos and Craig Costello and Hüseyin Hisil and Kristin Lauter},
250 doi = {10.1007/978-3-642-40349-1_19},
251 publisher = {Springer},
255 @inproceedings{ches-2013-24775,
256 title = {Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA},
257 author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson},
260 doi = {10.1007/978-3-642-40349-1_25},
261 publisher = {Springer},
265 @inproceedings{ches-2013-24776,
266 title = {Non-invasive Spoofing Attacks for Anti-lock Braking Systems},
267 author = {Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava},
270 doi = {10.1007/978-3-642-40349-1_4},
271 publisher = {Springer},
275 @inproceedings{ches-2013-24777,
276 title = {Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices},
277 author = {Stefan Heyse and Ingo von Maurich and Tim Güneysu},
280 doi = {10.1007/978-3-642-40349-1_16},
281 publisher = {Springer},
285 @inproceedings{crypto-2013-24598,
286 title = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries},
287 author = {David Cash and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel-Catalin Rosu and Michael Steiner},
288 booktitle = {CRYPTO},
290 doi = {10.1007/978-3-642-40041-4_20},
291 publisher = {Springer},
295 @inproceedings{crypto-2013-24599,
296 title = {Time-Optimal Interactive Proofs for Circuit Evaluation},
297 author = {Justin Thaler},
298 booktitle = {CRYPTO},
300 doi = {10.1007/978-3-642-40084-1_5},
301 publisher = {Springer},
305 @inproceedings{crypto-2013-24600,
306 title = {Attribute-Based Encryption for Circuits from Multilinear Maps},
307 author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters},
308 booktitle = {CRYPTO},
310 doi = {10.1007/978-3-642-40084-1_27},
311 publisher = {Springer},
315 @inproceedings{crypto-2013-24601,
316 title = {New Techniques for SPHFs and Efficient One-Round PAKE Protocols},
317 author = {Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud},
318 booktitle = {CRYPTO},
320 doi = {10.1007/978-3-642-40041-4_25},
321 publisher = {Springer},
325 @inproceedings{crypto-2013-24602,
326 title = {On the Function Field Sieve and the Impact of Higher Splitting Probabilities - Application to Discrete Logarithms in and},
327 author = {Faruk Göloglu and Robert Granger and Gary McGuire and Jens Zumbrägel},
328 booktitle = {CRYPTO},
330 doi = {10.1007/978-3-642-40084-1_7},
331 publisher = {Springer},
335 @inproceedings{crypto-2013-24603,
336 title = {Improved OT Extension for Transferring Short Secrets},
337 author = {Vladimir Kolesnikov and Ranjit Kumaresan},
338 booktitle = {CRYPTO},
340 doi = {10.1007/978-3-642-40084-1_4},
341 publisher = {Springer},
345 @inproceedings{crypto-2013-24604,
346 title = {On Fair Exchange, Fair Coins and Fair Sampling},
347 author = {Shashank Agrawal and Manoj Prabhakaran},
348 booktitle = {CRYPTO},
350 doi = {10.1007/978-3-642-40041-4_15},
351 publisher = {Springer},
355 @inproceedings{crypto-2013-24605,
356 title = {Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose},
357 author = {Yan Huang and Jonathan Katz and David Evans},
358 booktitle = {CRYPTO},
360 doi = {10.1007/978-3-642-40084-1_2},
361 publisher = {Springer},
365 @inproceedings{crypto-2013-24606,
366 title = {Instantiating Random Oracles via UCEs},
367 author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi},
368 booktitle = {CRYPTO},
370 doi = {10.1007/978-3-642-40084-1_23},
371 publisher = {Springer},
375 @inproceedings{crypto-2013-24607,
376 title = {Limits of Provable Security for Homomorphic Encryption},
377 author = {Andrej Bogdanov and Chin Ho Lee},
378 booktitle = {CRYPTO},
380 doi = {10.1007/978-3-642-40041-4_7},
381 publisher = {Springer},
385 @inproceedings{crypto-2013-24608,
386 title = {Hardness of SIS and LWE with Small Parameters},
387 author = {Daniele Micciancio and Chris Peikert},
388 booktitle = {CRYPTO},
390 doi = {10.1007/978-3-642-40041-4_2},
391 publisher = {Springer},
395 @inproceedings{crypto-2013-24609,
396 title = {Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols},
397 author = {Vipul Goyal and Ilya Mironov and Omkant Pandey and Amit Sahai},
398 booktitle = {CRYPTO},
400 doi = {10.1007/978-3-642-40041-4_17},
401 publisher = {Springer},
405 @inproceedings{crypto-2013-24610,
406 title = {Fully, (Almost) Tightly Secure IBE and Dual System Groups},
407 author = {Jie Chen and Hoeteck Wee},
408 booktitle = {CRYPTO},
410 doi = {10.1007/978-3-642-40084-1_25},
411 publisher = {Springer},
415 @inproceedings{crypto-2013-24611,
416 title = {Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption},
417 author = {Dan Boneh and Ananth Raghunathan and Gil Segev},
418 booktitle = {CRYPTO},
420 doi = {10.1007/978-3-642-40084-1_26},
421 publisher = {Springer},
425 @inproceedings{crypto-2013-24612,
426 title = {Non-malleable Codes from Two-Source Extractors},
427 author = {Stefan Dziembowski and Tomasz Kazana and Maciej Obremski},
428 booktitle = {CRYPTO},
430 doi = {10.1007/978-3-642-40084-1_14},
431 publisher = {Springer},
435 @inproceedings{crypto-2013-24613,
436 title = {Bounds in Shallows and in Miseries},
437 author = {Céline Blondeau and Andrey Bogdanov and Gregor Leander},
438 booktitle = {CRYPTO},
440 doi = {10.1007/978-3-642-40041-4_12},
441 publisher = {Springer},
445 @inproceedings{crypto-2013-24614,
446 title = {Message-Locked Encryption for Lock-Dependent Messages},
447 author = {Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev},
448 booktitle = {CRYPTO},
450 doi = {10.1007/978-3-642-40041-4_21},
451 publisher = {Springer},
455 @inproceedings{crypto-2013-24615,
456 title = {Lattice Signatures and Bimodal Gaussians},
457 author = {Léo Ducas and Alain Durmus and Tancrède Lepoint and Vadim Lyubashevsky},
458 booktitle = {CRYPTO},
460 doi = {10.1007/978-3-642-40041-4_3},
461 publisher = {Springer},
465 @inproceedings{crypto-2013-24616,
466 title = {Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields},
467 author = {Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Skeith III},
468 booktitle = {CRYPTO},
470 doi = {10.1007/978-3-642-40084-1_9},
471 publisher = {Springer},
475 @inproceedings{crypto-2013-24617,
476 title = {Secure Computation against Adaptive Auxiliary Information},
477 author = {Elette Boyle and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Amit Sahai},
478 booktitle = {CRYPTO},
480 doi = {10.1007/978-3-642-40041-4_18},
481 publisher = {Springer},
485 @inproceedings{crypto-2013-24618,
486 title = {Secret Sharing, Rank Inequalities and Information Inequalities},
487 author = {Sebastià Martín Molleví and Carles Padró and An Yang},
488 booktitle = {CRYPTO},
490 doi = {10.1007/978-3-642-40084-1_16},
491 publisher = {Springer},
495 @inproceedings{crypto-2013-24619,
496 title = {Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128},
497 author = {Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin},
498 booktitle = {CRYPTO},
500 doi = {10.1007/978-3-642-40041-4_11},
501 publisher = {Springer},
505 @inproceedings{crypto-2013-24620,
506 title = {Limits on the Power of Cryptographic Cheap Talk},
507 author = {Pavel Hubácek and Jesper Buus Nielsen and Alon Rosen},
508 booktitle = {CRYPTO},
510 doi = {10.1007/978-3-642-40041-4_16},
511 publisher = {Springer},
515 @inproceedings{crypto-2013-24621,
516 title = {Obfuscating Conjunctions},
517 author = {Zvika Brakerski and Guy N. Rothblum},
518 booktitle = {CRYPTO},
520 doi = {10.1007/978-3-642-40084-1_24},
521 publisher = {Springer},
525 @inproceedings{crypto-2013-24622,
526 title = {Everlasting Multi-party Computation},
527 author = {Dominique Unruh},
528 booktitle = {CRYPTO},
530 doi = {10.1007/978-3-642-40084-1_22},
531 publisher = {Springer},
535 @inproceedings{crypto-2013-24623,
536 title = {On the Security of the TLS Protocol: A Systematic Analysis},
537 author = {Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee},
538 booktitle = {CRYPTO},
540 doi = {10.1007/978-3-642-40041-4_24},
541 publisher = {Springer},
545 @inproceedings{crypto-2013-24624,
546 title = {Programmable Hash Functions in the Multilinear Setting},
547 author = {Eduarda S. V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks},
548 booktitle = {CRYPTO},
550 doi = {10.1007/978-3-642-40041-4_28},
551 publisher = {Springer},
555 @inproceedings{crypto-2013-24625,
556 title = {Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling},
557 author = {Frédéric Dupuis and Omar Fawzi and Stephanie Wehner},
558 booktitle = {CRYPTO},
560 doi = {10.1007/978-3-642-40084-1_19},
561 publisher = {Springer},
565 @inproceedings{crypto-2013-24626,
566 title = {An Algebraic Framework for Diffie-Hellman Assumptions},
567 author = {Alex Escala and Gottfried Herold and Eike Kiltz and Carla Ràfols and Jorge Villar},
568 booktitle = {CRYPTO},
570 doi = {10.1007/978-3-642-40084-1_8},
571 publisher = {Springer},
575 @inproceedings{crypto-2013-24627,
576 title = {What Information Is Leaked under Concurrent Composition?},
577 author = {Vipul Goyal and Divya Gupta and Abhishek Jain},
578 booktitle = {CRYPTO},
580 doi = {10.1007/978-3-642-40084-1_13},
581 publisher = {Springer},
585 @inproceedings{crypto-2013-24628,
586 title = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures},
587 author = {Susan Hohenberger and Amit Sahai and Brent Waters},
588 booktitle = {CRYPTO},
590 doi = {10.1007/978-3-642-40041-4_27},
591 publisher = {Springer},
595 @inproceedings{crypto-2013-24629,
596 title = {Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions},
597 author = {François-Xavier Standaert and Olivier Pereira and Yu Yu},
598 booktitle = {CRYPTO},
600 doi = {10.1007/978-3-642-40041-4_19},
601 publisher = {Springer},
605 @proceedings{crypto-2013-24630,
606 title = {Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I},
607 booktitle = {CRYPTO},
609 doi = {10.1007/978-3-642-40041-4},
610 publisher = {Springer},
614 @inproceedings{crypto-2013-24631,
615 title = {The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries},
616 author = {Thomas Ristenpart and Scott Yilek},
617 booktitle = {CRYPTO},
619 doi = {10.1007/978-3-642-40041-4_22},
620 publisher = {Springer},
624 @inproceedings{crypto-2013-24632,
625 title = {Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation},
626 author = {Payman Mohassel and Ben Riva},
627 booktitle = {CRYPTO},
629 doi = {10.1007/978-3-642-40084-1_3},
630 publisher = {Springer},
634 @inproceedings{crypto-2013-24633,
635 title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based},
636 author = {Craig Gentry and Amit Sahai and Brent Waters},
637 booktitle = {CRYPTO},
639 doi = {10.1007/978-3-642-40041-4_5},
640 publisher = {Springer},
644 @inproceedings{crypto-2013-24634,
645 title = {Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs},
646 author = {Vadim Lyubashevsky and Daniel Masny},
647 booktitle = {CRYPTO},
649 doi = {10.1007/978-3-642-40084-1_18},
650 publisher = {Springer},
654 @inproceedings{crypto-2013-24635,
655 title = {Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys},
656 author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters},
657 booktitle = {CRYPTO},
659 doi = {10.1007/978-3-642-40084-1_10},
660 publisher = {Springer},
664 @inproceedings{crypto-2013-24636,
665 title = {A Uniform Min-Max Theorem with Applications in Cryptography},
666 author = {Salil P. Vadhan and Colin Jia Zheng},
667 booktitle = {CRYPTO},
669 doi = {10.1007/978-3-642-40041-4_6},
670 publisher = {Springer},
674 @inproceedings{crypto-2013-24637,
675 title = {Key Homomorphic PRFs and Their Applications},
676 author = {Dan Boneh and Kevin Lewi and Hart William Montgomery and Ananth Raghunathan},
677 booktitle = {CRYPTO},
679 doi = {10.1007/978-3-642-40041-4_23},
680 publisher = {Springer},
684 @inproceedings{crypto-2013-24638,
685 title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications},
686 author = {Benoît Libert and Thomas Peters and Marc Joye and Moti Yung},
687 booktitle = {CRYPTO},
689 doi = {10.1007/978-3-642-40084-1_17},
690 publisher = {Springer},
694 @inproceedings{crypto-2013-24639,
695 title = {Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions},
696 author = {Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy},
697 booktitle = {CRYPTO},
699 doi = {10.1007/978-3-642-40041-4_31},
700 publisher = {Springer},
704 @inproceedings{crypto-2013-24640,
705 title = {Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking - (Extended Abstract)},
706 author = {Bin Zhang 0003 and Chao Xu and Dengguo Feng},
707 booktitle = {CRYPTO},
709 doi = {10.1007/978-3-642-40041-4_10},
710 publisher = {Springer},
714 @inproceedings{crypto-2013-24641,
715 title = {On the Achievability of Simulation-Based Security for Functional Encryption},
716 author = {Angelo De Caro and Vincenzo Iovino and Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano},
717 booktitle = {CRYPTO},
719 doi = {10.1007/978-3-642-40084-1_29},
720 publisher = {Springer},
724 @inproceedings{crypto-2013-24642,
725 title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract)},
726 author = {Gil Cohen and Ivan Damgård and Yuval Ishai and Jonas Kölker and Peter Bro Miltersen and Ran Raz and Ron D. Rothblum},
727 booktitle = {CRYPTO},
729 doi = {10.1007/978-3-642-40084-1_11},
730 publisher = {Springer},
734 @inproceedings{crypto-2013-24643,
735 title = {Counter-Cryptanalysis},
736 author = {Marc Stevens},
737 booktitle = {CRYPTO},
739 doi = {10.1007/978-3-642-40041-4_8},
740 publisher = {Springer},
744 @inproceedings{crypto-2013-24644,
745 title = {SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge},
746 author = {Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza},
747 booktitle = {CRYPTO},
749 doi = {10.1007/978-3-642-40084-1_6},
750 publisher = {Springer},
754 @inproceedings{crypto-2013-24645,
755 title = {Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries},
756 author = {Yehuda Lindell},
757 booktitle = {CRYPTO},
759 doi = {10.1007/978-3-642-40084-1_1},
760 publisher = {Springer},
764 @inproceedings{crypto-2013-24646,
765 title = {Optimal Coding for Streaming Authentication and Interactive Communication},
766 author = {Matthew K. Franklin and Ran Gelles and Rafail Ostrovsky and Leonard J. Schulman},
767 booktitle = {CRYPTO},
769 doi = {10.1007/978-3-642-40084-1_15},
770 publisher = {Springer},
774 @inproceedings{crypto-2013-24647,
775 title = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System},
776 author = {Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David Oswald and Falk Schellenberg and Christof Paar},
777 booktitle = {CRYPTO},
779 doi = {10.1007/978-3-642-40041-4_9},
780 publisher = {Springer},
784 @inproceedings{crypto-2013-24648,
785 title = {Functional Encryption: New Perspectives and Lower Bounds},
786 author = {Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee},
787 booktitle = {CRYPTO},
789 doi = {10.1007/978-3-642-40084-1_28},
790 publisher = {Springer},
794 @inproceedings{crypto-2013-24649,
795 title = {On the Indifferentiability of Key-Alternating Ciphers},
796 author = {Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger},
797 booktitle = {CRYPTO},
799 doi = {10.1007/978-3-642-40041-4_29},
800 publisher = {Springer},
804 @inproceedings{crypto-2013-24650,
805 title = {Construction of Differential Characteristics in ARX Designs Application to Skein},
806 author = {Gaëtan Leurent},
807 booktitle = {CRYPTO},
809 doi = {10.1007/978-3-642-40041-4_14},
810 publisher = {Springer},
814 @inproceedings{crypto-2013-24651,
815 title = {Practical Bootstrapping in Quasilinear Time},
816 author = {Jacob Alperin-Sheriff and Chris Peikert},
817 booktitle = {CRYPTO},
819 doi = {10.1007/978-3-642-40041-4_1},
820 publisher = {Springer},
824 @inproceedings{crypto-2013-24652,
825 title = {Quantum One-Time Programs - (Extended Abstract)},
826 author = {Anne Broadbent and Gus Gutoski and Douglas Stebila},
827 booktitle = {CRYPTO},
829 doi = {10.1007/978-3-642-40084-1_20},
830 publisher = {Springer},
834 @inproceedings{crypto-2013-24653,
835 title = {A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation},
836 author = {Martin Hirt and Christoph Lucas and Ueli M. Maurer},
837 booktitle = {CRYPTO},
839 doi = {10.1007/978-3-642-40084-1_12},
840 publisher = {Springer},
844 @inproceedings{crypto-2013-24654,
845 title = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World},
846 author = {Dan Boneh and Mark Zhandry},
847 booktitle = {CRYPTO},
849 doi = {10.1007/978-3-642-40084-1_21},
850 publisher = {Springer},
854 @inproceedings{crypto-2013-24655,
855 title = {Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers},
856 author = {Peter Gazi},
857 booktitle = {CRYPTO},
859 doi = {10.1007/978-3-642-40041-4_30},
860 publisher = {Springer},
864 @inproceedings{crypto-2013-24656,
865 title = {Sieve-in-the-Middle: Improved MITM Attacks},
866 author = {Anne Canteaut and María Naya-Plasencia and Bastien Vayssière},
867 booktitle = {CRYPTO},
869 doi = {10.1007/978-3-642-40041-4_13},
870 publisher = {Springer},
874 @inproceedings{crypto-2013-24657,
875 title = {Practical Multilinear Maps over the Integers},
876 author = {Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi},
877 booktitle = {CRYPTO},
879 doi = {10.1007/978-3-642-40041-4_26},
880 publisher = {Springer},
884 @inproceedings{crypto-2013-24658,
885 title = {Learning with Rounding, Revisited - New Reduction, Properties and Applications},
886 author = {Joël Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs},
887 booktitle = {CRYPTO},
889 doi = {10.1007/978-3-642-40041-4_4},
890 publisher = {Springer},
894 @proceedings{crypto-2013-24659,
895 title = {Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II},
896 booktitle = {CRYPTO},
898 doi = {10.1007/978-3-642-40084-1},
899 publisher = {Springer},
903 @inproceedings{crypto-2013-24660,
904 title = {How to Run Turing Machines on Encrypted Data},
905 author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich},
906 booktitle = {CRYPTO},
908 doi = {10.1007/978-3-642-40084-1_30},
909 publisher = {Springer},
913 @inproceedings{eurocrypt-2013-24576,
914 title = {Practical Homomorphic MACs for Arithmetic Circuits},
915 author = {Dario Catalano and Dario Fiore},
916 booktitle = {Advances in Cryptology - Eurocrypt 2013},
919 doi = {10.1007/978-3-642-38348-9_21},
923 @inproceedings{eurocrypt-2013-24577,
924 title = {Streaming Authenticated Data Structures},
925 author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia and Ke Yi},
926 booktitle = {Advances in Cryptology - Eurocrypt 2013},
929 doi = {10.1007/978-3-642-38348-9_22},
933 @inproceedings{eurocrypt-2013-24578,
934 title = {Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting},
935 author = {Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean},
936 booktitle = {Advances in Cryptology - Eurocrypt 2013},
939 doi = {10.1007/978-3-642-38348-9_23},
943 @inproceedings{eurocrypt-2013-24579,
944 title = {New Links Between Differential and Linear Cryptanalysis},
945 author = {Céline Blondeau and Kaisa Nyberg},
946 booktitle = {Advances in Cryptology - Eurocrypt 2013},
949 doi = {10.1007/978-3-642-38348-9_24},
953 @inproceedings{eurocrypt-2013-24580,
954 title = {Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption},
955 author = {Jooyoung Lee},
956 booktitle = {Advances in Cryptology - Eurocrypt 2013},
959 doi = {10.1007/978-3-642-38348-9_25},
963 @inproceedings{eurocrypt-2013-24581,
964 title = {Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions},
965 author = {Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam},
966 booktitle = {Advances in Cryptology - Eurocrypt 2013},
969 doi = {10.1007/978-3-642-38348-9_26},
973 @inproceedings{eurocrypt-2013-24582,
974 title = {Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures},
975 author = {Marc Fischlin and Nils Fleischhacker},
976 booktitle = {Advances in Cryptology - Eurocrypt 2013},
979 doi = {10.1007/978-3-642-38348-9_27},
983 @inproceedings{eurocrypt-2013-24583,
984 title = {Practical Signatures From Standard Assumptions},
985 author = {Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Jae Hong Seo and Christoph Striecks},
986 booktitle = {Advances in Cryptology - Eurocrypt 2013},
989 doi = {10.1007/978-3-642-38348-9_28},
993 @inproceedings{eurocrypt-2013-24584,
994 title = {Locally Computable UOWHF with Linear Shrinkage},
995 author = {Benny Applebaum and Yoni Moses},
996 booktitle = {Advances in Cryptology - Eurocrypt 2013},
999 doi = {10.1007/978-3-642-38348-9_29},
1003 @inproceedings{eurocrypt-2013-24585,
1004 title = {Amplification of Chosen-Ciphertext Security},
1005 author = {Huijia Lin and Stefano Tessaro},
1006 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1009 doi = {10.1007/978-3-642-38348-9_30},
1013 @inproceedings{eurocrypt-2013-24586,
1014 title = {Circular Chosen-Ciphertext Cecurity with Compact Ciphertexts},
1015 author = {Dennis Hofheinz},
1016 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1019 doi = {10.1007/978-3-642-38348-9_31},
1023 @inproceedings{eurocrypt-2013-24587,
1024 title = {MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions},
1025 author = {Tore Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi},
1026 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1029 doi = {10.1007/978-3-642-38348-9_32},
1033 @inproceedings{eurocrypt-2013-24588,
1034 title = {How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation},
1035 author = {Payman Mohassel and Saeed Sadeghian},
1036 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1039 doi = {10.1007/978-3-642-38348-9_33},
1043 @inproceedings{eurocrypt-2013-24589,
1044 title = {Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction},
1045 author = {Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee},
1046 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1049 doi = {10.1007/978-3-642-38348-9_34},
1053 @inproceedings{eurocrypt-2013-24590,
1054 title = {Quantum-Secure Message Authentication Codes},
1055 author = {Dan Boneh and Mark Zhandry},
1056 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1059 doi = {10.1007/978-3-642-38348-9_35},
1063 @inproceedings{eurocrypt-2013-24591,
1064 title = {One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games},
1065 author = {Marco Tomamichel and Serge Fehr and Jedrzej Kaniewski and Stephanie Wehner},
1066 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1069 doi = {10.1007/978-3-642-38348-9_36},
1073 @inproceedings{eurocrypt-2013-24592,
1074 title = {Quadratic Span Programs and Succinct NIZKs without PCPs},
1075 author = {Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova},
1076 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1079 doi = {10.1007/978-3-642-38348-9_37},
1083 @inproceedings{eurocrypt-2013-24593,
1084 title = {Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists},
1085 author = {Stephanie Bayer and Jens Groth},
1086 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1089 doi = {10.1007/978-3-642-38348-9_38},
1093 @inproceedings{eurocrypt-2013-24594,
1094 title = {Resource-Restricted Indifferentiability},
1095 author = {Gregory Demay and Peter Gazi and Martin Hirt and Ueli M. Maurer},
1096 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1099 doi = {10.1007/978-3-642-38348-9_39},
1103 @inproceedings{eurocrypt-2013-24595,
1104 title = {On Concurrently Secure Computation in the Multiple Ideal Query Model},
1105 author = {Vipul Goyal and Abhishek Jain},
1106 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1109 doi = {10.1007/978-3-642-38348-9_40},
1113 @inproceedings{eurocrypt-2013-24596,
1114 title = {Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions},
1115 author = {Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti and Akshay Wadia},
1116 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1119 doi = {10.1007/978-3-642-38348-9_41},
1123 @inproceedings{eurocrypt-2013-24597,
1124 title = {How to Garble RAM Programs},
1125 author = {Steve Lu and Rafail Ostrovsky},
1126 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1129 doi = {10.1007/978-3-642-38348-9_42},
1133 @proceedings{eurocrypt-2013-24782,
1134 title = {Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings},
1135 booktitle = {EUROCRYPT},
1137 doi = {10.1007/978-3-642-38348-9},
1138 publisher = {Springer},
1142 @inproceedings{eurocrypt-2013-24556,
1143 title = {Candidate Multilinear Maps from Ideal Lattices},
1144 author = {Sanjam Garg and Craig Gentry and Shai Halevi},
1145 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1148 doi = {10.1007/978-3-642-38348-9_1},
1152 @inproceedings{eurocrypt-2013-24557,
1153 title = {Lossy Codes and a New Variant of the Learning-With-Errors Problem},
1154 author = {Nico Döttling and Jörn Müller-Quade},
1155 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1158 doi = {10.1007/978-3-642-38348-9_2},
1162 @inproceedings{eurocrypt-2013-24558,
1163 title = {A Toolkit for Ring-LWE Cryptography},
1164 author = {Vadim Lyubashevsky and Chris Peikert and Oded Regev},
1165 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1168 doi = {10.1007/978-3-642-38348-9_3},
1172 @inproceedings{eurocrypt-2013-24559,
1173 title = {Regularity of Lossy RSA on Subdomains and its Applications},
1174 author = {Mark Lewko and Adam O'Neill and Adam Smith},
1175 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1178 doi = {10.1007/978-3-642-38348-9_4},
1182 @inproceedings{eurocrypt-2013-24560,
1183 title = {Efficient Cryptosystems from 2^k-th Power Residue Symbols},
1184 author = {Marc Joye and Benoît Libert},
1185 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1188 doi = {10.1007/978-3-642-38348-9_5},
1192 @inproceedings{eurocrypt-2013-24561,
1193 title = {Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions},
1194 author = {Ananth Raghunathan and Gil Segev and Salil P. Vadhan},
1195 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1198 doi = {10.1007/978-3-642-38348-9_6},
1202 @inproceedings{eurocrypt-2013-24562,
1203 title = {How to Watermark Cryptographic Functions},
1204 author = {Ryo Nishimaki},
1205 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1208 doi = {10.1007/978-3-642-38348-9_7},
1212 @inproceedings{eurocrypt-2013-24563,
1213 title = {Security Evaluations beyond Computing Power: How to Analyze Side-Channel Attacks You Cannot Mount?},
1214 author = {Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert},
1215 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1218 doi = {10.1007/978-3-642-38348-9_8},
1222 @inproceedings{eurocrypt-2013-24564,
1223 title = {Masking against Side-Channel Attacks: a Formal Security Proof},
1224 author = {Emmanuel Prouff and Matthieu Rivain},
1225 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1228 doi = {10.1007/978-3-642-38348-9_9},
1232 @inproceedings{eurocrypt-2013-24565,
1233 title = {Leakage-Resilient Cryptography from Minimal Assumptions},
1234 author = {Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs},
1235 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1238 doi = {10.1007/978-3-642-38348-9_10},
1242 @inproceedings{eurocrypt-2013-24566,
1243 title = {Faster Index Calculus for the Medium Prime Case. Application to 1175-bit and 1425-bit Finite Fields},
1244 author = {Antoine Joux},
1245 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1248 doi = {10.1007/978-3-642-38348-9_11},
1252 @inproceedings{eurocrypt-2013-24567,
1253 title = {Fast Cryptography in Genus 2},
1254 author = {Joppe W. Bos and Craig Costello and Hüseyin Hisil and Kristin Lauter},
1255 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1258 doi = {10.1007/978-3-642-38348-9_12},
1262 @inproceedings{eurocrypt-2013-24568,
1263 title = {Graph-Theoretic Algorithms for the 'Isomorphism of Polynomials' Problem},
1264 author = {Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber},
1265 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1268 doi = {10.1007/978-3-642-38348-9_13},
1272 @inproceedings{eurocrypt-2013-24569,
1273 title = {Cryptanalysis of Full RIPEMD-128},
1274 author = {Franck Landelle and Thomas Peyrin},
1275 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1278 doi = {10.1007/978-3-642-38348-9_14},
1282 @inproceedings{eurocrypt-2013-24570,
1283 title = {New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis},
1284 author = {Marc Stevens},
1285 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1288 doi = {10.1007/978-3-642-38348-9_15},
1292 @inproceedings{eurocrypt-2013-24571,
1293 title = {Improving Local Collisions: New Attacks on Reduced SHA-256},
1294 author = {Florian Mendel and Tomislav Nad and Martin Schläffer},
1295 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1298 doi = {10.1007/978-3-642-38348-9_16},
1302 @inproceedings{eurocrypt-2013-24572,
1303 title = {Dynamic Proofs of Retrievability via Oblivious RAM},
1304 author = {David Cash and Alptekin Kupcu and Daniel Wichs},
1305 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1308 doi = {10.1007/978-3-642-38348-9_17},
1312 @inproceedings{eurocrypt-2013-24573,
1313 title = {Message-Locked Encryption and Secure Deduplication},
1314 author = {Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart},
1315 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1318 doi = {10.1007/978-3-642-38348-9_18},
1322 @inproceedings{eurocrypt-2013-24574,
1324 author = {Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche},
1325 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1328 doi = {10.1007/978-3-642-38348-9_19},
1332 @inproceedings{eurocrypt-2013-24575,
1333 title = {Batch Fully Homomorphic Encryption over the Integers},
1334 author = {Jung Hee Cheon and Jean-Sébastien Coron and Jinsu Kim and Moon Sung Lee and Tancrède Lepoint and Mehdi Tibouchi and Aaram Yun},
1335 booktitle = {Advances in Cryptology - Eurocrypt 2013},
1338 doi = {10.1007/978-3-642-38348-9_20},
1342 @inproceedings{PKC-2013-24486,
1343 title = {Packed Ciphertexts in LWE-based Homomorphic Encryption},
1344 author = {Zvika Brakerski and Craig Gentry and Shai Halevi},
1345 booktitle = {Public-Key Cryptography - PKC 2013},
1348 doi = {10.1007/978-3-642-36362-7_1},
1352 @inproceedings{PKC-2013-24487,
1353 title = {Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption},
1354 author = {Jonathan Katz and Aishwarya Thiruvengadam and Hong Sheng Zhou},
1355 booktitle = {Public-Key Cryptography - PKC 2013},
1358 doi = {10.1007/978-3-642-36362-7_2},
1362 @inproceedings{PKC-2013-24488,
1363 title = {Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption},
1364 author = {Keita Emura and Goichiro Hanaoka and Takahiro Matsuda and Go Ohtake and Shota Yamada},
1365 booktitle = {Public-Key Cryptography - PKC 2013},
1368 doi = {10.1007/978-3-642-36362-7_3},
1372 @inproceedings{PKC-2013-24489,
1373 title = {Functional Encryption: Origins and Recent Developments},
1374 author = {Brent Waters},
1375 booktitle = {Public-Key Cryptography - PKC 2013},
1378 doi = {10.1007/978-3-642-36362-7_4},
1382 @inproceedings{PKC-2013-24490,
1383 title = {Vector Commitments and their Applications},
1384 author = {Dario Catalano and Dario Fiore},
1385 booktitle = {Public-Key Cryptography - PKC 2013},
1388 doi = {10.1007/978-3-642-36362-7_5},
1392 @inproceedings{PKC-2013-24491,
1393 title = {Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS},
1394 author = {Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou},
1395 booktitle = {Public-Key Cryptography - PKC 2013},
1398 doi = {10.1007/978-3-642-36362-7_6},
1402 @inproceedings{PKC-2013-24492,
1403 title = {Cryptography Using CAPTCHA Puzzles},
1404 author = {Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia},
1405 booktitle = {Public-Key Cryptography - PKC 2013},
1408 doi = {10.1007/978-3-642-36362-7_7},
1412 @inproceedings{PKC-2013-24493,
1413 title = {Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications},
1414 author = {San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang},
1415 booktitle = {Public-Key Cryptography - PKC 2013},
1418 doi = {10.1007/978-3-642-36362-7_8},
1422 @inproceedings{PKC-2013-24494,
1423 title = {Decentralized Attribute-Based Signatures},
1424 author = {Tatsuaki Okamoto and Katsuyuki Takashima},
1425 booktitle = {Public-Key Cryptography - PKC 2013},
1428 doi = {10.1007/978-3-642-36362-7_9},
1432 @inproceedings{PKC-2013-24495,
1433 title = {On the semantic security of functional encryption schemes},
1434 author = {Manuel Barbosa and Pooya Farshim},
1435 booktitle = {Public-Key Cryptography - PKC 2013},
1438 doi = {10.1007/978-3-642-36362-7_10},
1442 @inproceedings{PKC-2013-24496,
1443 title = {Attribute-Based Encryption with Fast Decryption},
1444 author = {Susan Hohenberger and Brent Waters},
1445 booktitle = {Public-Key Cryptography - PKC 2013},
1448 doi = {10.1007/978-3-642-36362-7_11},
1452 @inproceedings{PKC-2013-24497,
1453 title = {Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors},
1454 author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu},
1455 booktitle = {Public-Key Cryptography - PKC 2013},
1458 doi = {10.1007/978-3-642-36362-7_12},
1462 @inproceedings{PKC-2013-24498,
1463 title = {Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public ?},
1464 author = {Guillaume Barbu and Alberto Battistello and Guillaume Dabosville and Christophe Giraud and Guénaël Renault and Soline Renner and Rina Zeitoun},
1465 booktitle = {Public-Key Cryptography - PKC 2013},
1468 doi = {10.1007/978-3-642-36362-7_13},
1472 @inproceedings{PKC-2013-24499,
1473 title = {Revocable Identity-Based Encryption Revisited: Security Model and Construction},
1474 author = {Jae Hong Seo and Keita Emura},
1475 booktitle = {Public-Key Cryptography - PKC 2013},
1478 doi = {10.1007/978-3-642-36362-7_14},
1482 @inproceedings{PKC-2013-24500,
1483 title = {Improved (Hierarchical) Inner-Product Encryption from Lattices},
1484 author = {Keita Xagawa},
1485 booktitle = {Public-Key Cryptography - PKC 2013},
1488 doi = {10.1007/978-3-642-36362-7_15},
1492 @inproceedings{PKC-2013-24501,
1493 title = {Non-Interactive Key Exchange},
1494 author = {Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson},
1495 booktitle = {Public-Key Cryptography - PKC 2013},
1498 doi = {10.1007/978-3-642-36362-7_17},
1502 @inproceedings{PKC-2013-24502,
1503 title = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages},
1504 author = "Fabrice {Ben Hamouda} and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud",
1505 booktitle = {Public-Key Cryptography - PKC 2013},
1508 doi = {10.1007/978-3-642-36362-7_18},
1512 @inproceedings{PKC-2013-24503,
1513 title = {Tighter Reductions for Forward-Secure Signature Schemes},
1514 author = {Michel Abdalla and Fabrice Ben Hamouda and David Pointcheval},
1515 booktitle = {Public-Key Cryptography - PKC 2013},
1518 doi = {10.1007/978-3-642-36362-7_19},
1522 @inproceedings{PKC-2013-24504,
1523 title = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size},
1524 author = {Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo},
1525 booktitle = {Public-Key Cryptography - PKC 2013},
1528 doi = {10.1007/978-3-642-36362-7_20},
1532 @inproceedings{PKC-2013-24505,
1533 title = {Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures},
1534 author = {Nuttapong Attrapadung and Benoît Libert and Thomas Peters},
1535 booktitle = {Public-Key Cryptography - PKC 2013},
1538 doi = {10.1007/978-3-642-36362-7_24},
1542 @inproceedings{PKC-2013-24506,
1543 title = {Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES},
1544 author = {Ryo Nishimaki and Keita Xagawa},
1545 booktitle = {Public-Key Cryptography - PKC 2013},
1548 doi = {10.1007/978-3-642-36362-7_25},
1552 @inproceedings{PKC-2013-24507,
1553 title = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies},
1554 author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung},
1555 booktitle = {Public-Key Cryptography - PKC 2013},
1558 doi = {10.1007/978-3-642-36362-7_26},
1562 @inproceedings{PKC-2013-24508,
1563 title = {New Constructions and Applications of Trapdoor DDH Groups},
1564 author = {Yannick Seurin},
1565 booktitle = {Public-Key Cryptography - PKC 2013},
1568 doi = {10.1007/978-3-642-36362-7_27},
1572 @inproceedings{PKC-2013-24509,
1573 title = {Techniques for Efficient Secure Computation Based on Yao's Protocol},
1574 author = {Yehuda Lindell},
1575 booktitle = {Public-Key Cryptography - PKC 2013},
1578 doi = {10.1007/978-3-642-36362-7_16},
1582 @inproceedings{PKC-2013-24510,
1583 title = {Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited},
1584 author = {Takahiro Matsuda and Goichiro Hanaoka},
1585 booktitle = {Public-Key Cryptography - PKC 2013},
1588 doi = {10.1007/978-3-642-36362-7_21},
1592 @inproceedings{PKC-2013-24511,
1593 title = {Robust Encryption, Revisited},
1594 author = {Pooya Farshim and Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia},
1595 booktitle = {Public-Key Cryptography - PKC 2013},
1598 doi = {10.1007/978-3-642-36362-7_22},
1602 @inproceedings{PKC-2013-24512,
1603 title = {Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited},
1604 author = {Zhengan Huang and Shengli Liu and Baodong Qin},
1605 booktitle = {Public-Key Cryptography - PKC 2013},
1608 doi = {10.1007/978-3-642-36362-7_23},
1612 @inproceedings{PKC-2013-24513,
1613 title = {Rate-Limited Secure Function Evaluation: De
\ffinitions and Constructions},
1614 author = {Özgür Dagdelen and Payman Mohassel and Daniele Venturi},
1615 booktitle = {Public-Key Cryptography - PKC 2013},
1618 doi = {10.1007/978-3-642-36362-7_28},
1622 @inproceedings{PKC-2013-24514,
1623 title = {Verifiable Elections That Scale for Free},
1624 author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn},
1625 booktitle = {Public-Key Cryptography - PKC 2013},
1628 doi = {10.1007/978-3-642-36362-7_29},
1632 @inproceedings{PKC-2013-24515,
1633 title = {On the Connection between Leakage Tolerance and Adaptive Security},
1634 author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel},
1635 booktitle = {Public-Key Cryptography - PKC 2013},
1638 doi = {10.1007/978-3-642-36362-7_30},
1642 @proceedings{pkc-2013-24779,
1643 title = {Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings},
1646 doi = {10.1007/978-3-642-36362-7},
1647 publisher = {Springer},
1651 @inproceedings{TCC-2013-24516,
1652 title = {Overcoming Weak Expectations},
1653 author = {Yevgeniy Dodis and Yu Yu},
1654 booktitle = {10th Theory of Cryptography Conference},
1657 doi = {10.1007/978-3-642-36594-2_1},
1661 @inproceedings{TCC-2013-24517,
1662 title = {A Counterexample to the Chain Rule for Conditional HILL Entropy, and what Deniable Encryption has to do with it},
1663 author = {Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia},
1664 booktitle = {10th Theory of Cryptography Conference},
1667 doi = {10.1007/978-3-642-36594-2_2},
1671 @inproceedings{TCC-2013-24518,
1672 title = {Hardness Preserving Reductions via Cuckoo Hashing},
1673 author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor},
1674 booktitle = {10th Theory of Cryptography Conference},
1677 doi = {10.1007/978-3-642-36594-2_3},
1681 @inproceedings{TCC-2013-24519,
1682 title = {Concurrent Zero Knowledge in the Bounded Player Model},
1683 author = {Vipul Goyal and Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti},
1684 booktitle = {10th Theory of Cryptography Conference},
1687 doi = {10.1007/978-3-642-36594-2_4},
1691 @inproceedings{TCC-2013-24520,
1692 title = {Public-Coin Concurrent Zero-Knowledge in the Global Hash Model},
1693 author = {Ran Canetti and Huijia Lin and Omer Paneth},
1694 booktitle = {10th Theory of Cryptography Conference},
1697 doi = {10.1007/978-3-642-36594-2_5},
1701 @inproceedings{TCC-2013-24521,
1702 title = {Succinct Malleable NIZKs and an Application to Compact Shuffles},
1703 author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn},
1704 booktitle = {10th Theory of Cryptography Conference},
1707 doi = {10.1007/978-3-642-36594-2_6},
1711 @inproceedings{TCC-2013-24522,
1712 title = {Encrypted Messages from the Heights of Cryptomania},
1713 author = {Craig Gentry},
1714 booktitle = {10th Theory of Cryptography Conference},
1717 doi = {10.1007/978-3-642-36594-2_7},
1721 @inproceedings{TCC-2013-24523,
1722 title = {Attribute-Based Functional Encryption on Lattices},
1723 author = {Xavier Boyen},
1724 booktitle = {10th Theory of Cryptography Conference},
1727 doi = {10.1007/978-3-642-36594-2_8},
1731 @inproceedings{TCC-2013-24524,
1732 title = {When Homomorphism Becomes a Liability},
1733 author = {Zvika Brakerski},
1734 booktitle = {10th Theory of Cryptography Conference},
1737 doi = {10.1007/978-3-642-36594-2_9},
1741 @inproceedings{TCC-2013-24525,
1742 title = {Garbling XOR Gates 'For Free' in the Standard Model},
1743 author = {Benny Applebaum},
1744 booktitle = {10th Theory of Cryptography Conference},
1747 doi = {10.1007/978-3-642-36594-2_10},
1751 @inproceedings{TCC-2013-24526,
1752 title = {Why ``Fiat-Shamir for Proofs' Lacks a Proof},
1753 author = {Nir Bitansky and Dana Dachman-Soled and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt and Daniel Wichs},
1754 booktitle = {10th Theory of Cryptography Conference},
1757 doi = {10.1007/978-3-642-36594-2_11},
1761 @inproceedings{TCC-2013-24527,
1762 title = {On the (In)security of Fischlin's Paradigm},
1763 author = {Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao},
1764 booktitle = {10th Theory of Cryptography Conference},
1767 doi = {10.1007/978-3-642-36594-2_12},
1771 @proceedings{tcc-2013-24783,
1772 title = {Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
1775 doi = {10.1007/978-3-642-36594-2},
1776 publisher = {Springer},
1780 @inproceedings{TCC-2013-24528,
1781 title = {Signatures of Correct Computation},
1782 author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia},
1783 booktitle = {10th Theory of Cryptography Conference},
1786 doi = {10.1007/978-3-642-36594-2_13},
1790 @inproceedings{TCC-2013-24529,
1791 title = {A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness},
1792 author = {Gilad Asharov and Yehuda Lindell and Tal Rabin},
1793 booktitle = {10th Theory of Cryptography Conference},
1796 doi = {10.1007/978-3-642-36594-2_14},
1800 @inproceedings{TCC-2013-24530,
1801 title = {Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities},
1802 author = {R. Amzi Jeffs and Mike Rosulek},
1803 booktitle = {10th Theory of Cryptography Conference},
1806 doi = {10.1007/978-3-642-36594-2_15},
1810 @inproceedings{TCC-2013-24531,
1811 title = {Feasibility and Completeness of Cryptographic Tasks in the Quantum World},
1812 author = {Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas},
1813 booktitle = {10th Theory of Cryptography Conference},
1816 doi = {10.1007/978-3-642-36594-2_16},
1820 @inproceedings{TCC-2013-24532,
1821 title = {Languages with Efficient Zero-Knowledge PCPs are in SZK},
1822 author = {Mohammad Mahmoody and David Xiao},
1823 booktitle = {10th Theory of Cryptography Conference},
1826 doi = {10.1007/978-3-642-36594-2_17},
1830 @inproceedings{TCC-2013-24533,
1831 title = {Succinct Non-Interactive Arguments via Linear Interactive Proofs},
1832 author = {Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth},
1833 booktitle = {10th Theory of Cryptography Conference},
1836 doi = {10.1007/978-3-642-36594-2_18},
1840 @inproceedings{TCC-2013-24534,
1841 title = {Barriers to Provably-Secure Perfect NIZK and Non-interactive Non-malleable Commitments},
1842 author = {Rafael Pass},
1843 booktitle = {10th Theory of Cryptography Conference},
1846 doi = {10.1007/978-3-642-36594-2_19},
1850 @inproceedings{TCC-2013-24535,
1851 title = {Secure Computation for Big Data},
1852 author = {Tal Malkin},
1853 booktitle = {10th Theory of Cryptography Conference},
1856 doi = {10.1007/978-3-642-36594-2_20},
1860 @inproceedings{TCC-2013-24536,
1861 title = {Communication Locality in Secure Multi-Party Computation: How to Run Sublinear Algorithms in a Distributed Setting},
1862 author = {Elette Boyle and Shafi Goldwasser and Stefano Tessaro},
1863 booktitle = {10th Theory of Cryptography Conference},
1866 doi = {10.1007/978-3-642-36594-2_21},
1870 @inproceedings{TCC-2013-24537,
1871 title = {Distributed Oblivious RAM for Secure Two-Party Computation},
1872 author = {Steve Lu and Rafail Ostrovsky},
1873 booktitle = {10th Theory of Cryptography Conference},
1876 doi = {10.1007/978-3-642-36594-2_22},
1880 @inproceedings{TCC-2013-24538,
1881 title = {Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead},
1882 author = {Steven Myers and Mona Sergi and abhi shelat},
1883 booktitle = {10th Theory of Cryptography Conference},
1886 doi = {10.1007/978-3-642-36594-2_23},
1890 @inproceedings{TCC-2013-24539,
1891 title = {Testing the Lipschitz Property over Product Distributions with Applications to Data Privacy},
1892 author = {Kashyap Dixit and Madhav Jha and Sofya Raskhodnikova and Abhradeep Thakurta},
1893 booktitle = {10th Theory of Cryptography Conference},
1896 doi = {10.1007/978-3-642-36594-2_24},
1900 @inproceedings{TCC-2013-24540,
1901 title = {Limits on the Usefulness of Random Oracles},
1902 author = {Iftach Haitner and Eran Omri and Hila Zarosim},
1903 booktitle = {10th Theory of Cryptography Conference},
1906 doi = {10.1007/978-3-642-36594-2_25},
1910 @inproceedings{TCC-2013-24541,
1911 title = {Analyzing Graphs with Node Differential Privacy},
1912 author = {Shiva Kasiviswanathan and Kobbi Nissim and Sofya Raskhodnikova and Adam Smith},
1913 booktitle = {10th Theory of Cryptography Conference},
1916 doi = {10.1007/978-3-642-36594-2_26},
1920 @inproceedings{TCC-2013-24542,
1921 title = {Universally Composable Synchronous Computation},
1922 author = {Jonathan Katz and Ueli M. Maurer and Bjorn Tackmann and Vassilis Zikas},
1923 booktitle = {10th Theory of Cryptography Conference},
1926 doi = {10.1007/978-3-642-36594-2_27},
1930 @inproceedings{TCC-2013-24543,
1931 title = {Multi-Client Non-Interactive Verifiable Computation},
1932 author = {Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid},
1933 booktitle = {10th Theory of Cryptography Conference},
1936 doi = {10.1007/978-3-642-36594-2_28},
1940 @inproceedings{TCC-2013-24544,
1941 title = {On the Feasibility of Extending Oblivious Transfer},
1942 author = {Yehuda Lindell and Hila Zarosim},
1943 booktitle = {10th Theory of Cryptography Conference},
1946 doi = {10.1007/978-3-642-36594-2_29},
1950 @inproceedings{TCC-2013-24545,
1951 title = {Computational Soundness of Coinductive Symbolic Security under Active Attacks},
1952 author = {Mohammad Hajiabadi and Bruce M. Kapron},
1953 booktitle = {10th Theory of Cryptography Conference},
1956 doi = {10.1007/978-3-642-36594-2_30},
1960 @inproceedings{TCC-2013-24546,
1961 title = {Revisiting Lower and Upper Bounds for Selective Decommitments},
1962 author = {Rafail Ostrovsky and Vanishree Rao and Alessandra Scafuro and Ivan Visconti},
1963 booktitle = {10th Theory of Cryptography Conference},
1966 doi = {10.1007/978-3-642-36594-2_31},
1970 @inproceedings{TCC-2013-24547,
1971 title = {On the Circular Security of Bit-Encryption},
1972 author = {Ron D. Rothblum},
1973 booktitle = {10th Theory of Cryptography Conference},
1976 doi = {10.1007/978-3-642-36594-2_32},
1980 @inproceedings{TCC-2013-24548,
1981 title = {Cryptographic Hardness of Random Local Functions -- Survey},
1982 author = {Benny Applebaum},
1983 booktitle = {10th Theory of Cryptography Conference},
1986 doi = {10.1007/978-3-642-36594-2_33},
1990 @inproceedings{TCC-2013-24549,
1991 title = {On the Power of Correlated Randomness in Secure Computation},
1992 author = {Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Claudio Orlandi and Anat Paskin-Cherniavsky},
1993 booktitle = {10th Theory of Cryptography Conference},
1996 doi = {10.1007/978-3-642-36594-2_34},
2000 @inproceedings{TCC-2013-24550,
2001 title = {Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing},
2002 author = {Ivan Damgård and Sarah Zakarias},
2003 booktitle = {10th Theory of Cryptography Conference},
2006 doi = {10.1007/978-3-642-36594-2_35},
2010 @inproceedings{TCC-2013-24551,
2011 title = {Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens},
2012 author = {Nico Döttling and Thilo Mie and Jörn Müller-Quade and Tobias Nilges},
2013 booktitle = {10th Theory of Cryptography Conference},
2016 doi = {10.1007/978-3-642-36594-2_36},
2020 @inproceedings{TCC-2013-24552,
2021 title = {A Cookbook for Black-Box Separations and a Recipe for UOWHFs},
2022 author = {Kfir Barhum and Thomas Holenstein},
2023 booktitle = {10th Theory of Cryptography Conference},
2026 doi = {10.1007/978-3-642-36594-2_37},
2030 @inproceedings{TCC-2013-24553,
2031 title = {Algebraic (Trapdoor) One Way Functions and their Applications},
2032 author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Konstantinos Vamvourellis},
2033 booktitle = {10th Theory of Cryptography Conference},
2036 doi = {10.1007/978-3-642-36594-2_38},
2040 @inproceedings{TCC-2013-24554,
2041 title = {Randomness-Dependent Message Security},
2042 author = {Eleanor Birrell and Kai-Min Chung and Rafael Pass and Sidharth Telang},
2043 booktitle = {10th Theory of Cryptography Conference},
2046 doi = {10.1007/978-3-642-36594-2_39},
2050 @inproceedings{TCC-2013-24555,
2051 title = {ERRATA: (Nearly) round-optimal black-box constructions of commitments secure against selective opening attacks},
2052 author = {David Xiao},
2053 booktitle = {10th Theory of Cryptography Conference},
2056 doi = {10.1007/978-3-642-36594-2_40},
2060 @proceedings{asiacrypt-2012-24412,
2061 title = {Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings},
2062 booktitle = {ASIACRYPT},
2064 url = {http://link.springer.com/book/10.1007/978-3-642-34961-4},
2065 doi = {10.1007/978-3-642-34961-4},
2066 publisher = {Springer},
2070 @inproceedings{asiacrypt-2012-24413,
2071 title = {Optimal Collision Security in Double Block Length Hashing with Single Length Key},
2072 author = {Bart Mennink},
2073 booktitle = {ASIACRYPT},
2076 doi = {10.1007/978-3-642-34961-4_32},
2077 publisher = {Springer},
2081 @inproceedings{asiacrypt-2012-24414,
2082 title = {A Coding-Theoretic Approach to Recovering Noisy RSA Keys},
2083 author = {Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn},
2084 booktitle = {ASIACRYPT},
2087 doi = {10.1007/978-3-642-34961-4_24},
2088 publisher = {Springer},
2092 @inproceedings{asiacrypt-2012-24415,
2093 title = {Theory and Practice of a Leakage Resilient Masking Scheme},
2094 author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Ingrid Verbauwhede},
2095 booktitle = {ASIACRYPT},
2098 doi = {10.1007/978-3-642-34961-4_45},
2099 publisher = {Springer},
2103 @inproceedings{asiacrypt-2012-24416,
2104 title = {Completeness for Symmetric Two-Party Functionalities - Revisited},
2105 author = {Yehuda Lindell and Eran Omri and Hila Zarosim},
2106 booktitle = {ASIACRYPT},
2109 doi = {10.1007/978-3-642-34961-4_9},
2110 publisher = {Springer},
2114 @inproceedings{asiacrypt-2012-24417,
2115 title = {3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound},
2116 author = {Liting Zhang and Wenling Wu and Han Sui and Peng Wang},
2117 booktitle = {ASIACRYPT},
2120 doi = {10.1007/978-3-642-34961-4_19},
2121 publisher = {Springer},
2125 @inproceedings{asiacrypt-2012-24418,
2126 title = {Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing},
2127 author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway},
2128 booktitle = {ASIACRYPT},
2131 doi = {10.1007/978-3-642-34961-4_10},
2132 publisher = {Springer},
2136 @inproceedings{asiacrypt-2012-24419,
2137 title = {Perfect Algebraic Immune Functions},
2138 author = {Meicheng Liu and Yin Zhang and Dongdai Lin},
2139 booktitle = {ASIACRYPT},
2142 doi = {10.1007/978-3-642-34961-4_12},
2143 publisher = {Springer},
2147 @inproceedings{asiacrypt-2012-24420,
2148 title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions},
2149 author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo},
2150 booktitle = {ASIACRYPT},
2153 doi = {10.1007/978-3-642-34961-4_3},
2154 publisher = {Springer},
2158 @inproceedings{asiacrypt-2012-24421,
2159 title = {Analysis of Differential Attacks in ARX Constructions},
2160 author = {Gaëtan Leurent},
2161 booktitle = {ASIACRYPT},
2164 doi = {10.1007/978-3-642-34961-4_15},
2165 publisher = {Springer},
2169 @inproceedings{asiacrypt-2012-24422,
2170 title = {The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions},
2171 author = {Scott Ames and Rosario Gennaro and Muthuramakrishnan Venkitasubramaniam},
2172 booktitle = {ASIACRYPT},
2175 doi = {10.1007/978-3-642-34961-4_11},
2176 publisher = {Springer},
2180 @inproceedings{asiacrypt-2012-24423,
2181 title = {Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks},
2182 author = {Yu Sasaki and Lei Wang 0007 and Shuang Wu and Wenling Wu},
2183 booktitle = {ASIACRYPT},
2186 doi = {10.1007/978-3-642-34961-4_34},
2187 publisher = {Springer},
2191 @inproceedings{asiacrypt-2012-24424,
2192 title = {Dual Form Signatures: An Approach for Proving Security from Static Assumptions},
2193 author = {Michael Gerbush and Allison B. Lewko and Adam O'Neill and Brent Waters},
2194 booktitle = {ASIACRYPT},
2197 doi = {10.1007/978-3-642-34961-4_4},
2198 publisher = {Springer},
2202 @inproceedings{asiacrypt-2012-24425,
2203 title = {On the (Im)possibility of Projecting Property in Prime-Order Setting},
2204 author = {Jae Hong Seo},
2205 booktitle = {ASIACRYPT},
2208 doi = {10.1007/978-3-642-34961-4_6},
2209 publisher = {Springer},
2213 @inproceedings{asiacrypt-2012-24426,
2214 title = {Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations - (Extended Abstract)},
2215 author = {Kyle Brogle and Sharon Goldberg and Leonid Reyzin},
2216 booktitle = {ASIACRYPT},
2219 doi = {10.1007/978-3-642-34961-4_39},
2220 publisher = {Springer},
2224 @inproceedings{asiacrypt-2012-24427,
2225 title = {RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures},
2226 author = {Mihir Bellare and Kenneth G. Paterson and Susan Thomson},
2227 booktitle = {ASIACRYPT},
2230 doi = {10.1007/978-3-642-34961-4_21},
2231 publisher = {Springer},
2235 @inproceedings{asiacrypt-2012-24428,
2236 title = {Differential Attacks against Stream Cipher ZUC},
2237 author = {Hongjun Wu and Tao Huang and Phuong Ha Nguyen and Huaxiong Wang and San Ling},
2238 booktitle = {ASIACRYPT},
2241 doi = {10.1007/978-3-642-34961-4_17},
2242 publisher = {Springer},
2246 @inproceedings{asiacrypt-2012-24429,
2247 title = {ECM at Work},
2248 author = {Joppe W. Bos and Thorsten Kleinjung},
2249 booktitle = {ASIACRYPT},
2252 doi = {10.1007/978-3-642-34961-4_29},
2253 publisher = {Springer},
2257 @inproceedings{asiacrypt-2012-24430,
2258 title = {Certifying RSA},
2259 author = {Saqib A. Kakvi and Eike Kiltz and Alexander May},
2260 booktitle = {ASIACRYPT},
2263 doi = {10.1007/978-3-642-34961-4_25},
2264 publisher = {Springer},
2268 @inproceedings{asiacrypt-2012-24431,
2269 title = {A Mix-Net from Any CCA2 Secure Cryptosystem},
2270 author = {Shahram Khazaei and Tal Moran and Douglas Wikström},
2271 booktitle = {ASIACRYPT},
2274 doi = {10.1007/978-3-642-34961-4_37},
2275 publisher = {Springer},
2279 @inproceedings{asiacrypt-2012-24432,
2280 title = {Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise},
2281 author = {Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes},
2282 booktitle = {ASIACRYPT},
2285 doi = {10.1007/978-3-642-34961-4_40},
2286 publisher = {Springer},
2290 @inproceedings{asiacrypt-2012-24433,
2291 title = {Signature Schemes Secure against Hard-to-Invert Leakage},
2292 author = {Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel},
2293 booktitle = {ASIACRYPT},
2296 doi = {10.1007/978-3-642-34961-4_8},
2297 publisher = {Springer},
2301 @inproceedings{asiacrypt-2012-24434,
2302 title = {How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios},
2303 author = {David Bernhard and Olivier Pereira and Bogdan Warinschi},
2304 booktitle = {ASIACRYPT},
2307 doi = {10.1007/978-3-642-34961-4_38},
2308 publisher = {Springer},
2312 @inproceedings{asiacrypt-2012-24435,
2313 title = {On Polynomial Systems Arising from a Weil Descent},
2314 author = {Christophe Petit and Jean-Jacques Quisquater},
2315 booktitle = {ASIACRYPT},
2318 doi = {10.1007/978-3-642-34961-4_28},
2319 publisher = {Springer},
2323 @inproceedings{asiacrypt-2012-24436,
2324 title = {Integral and Multidimensional Linear Distinguishers with Correlation Zero},
2325 author = {Andrey Bogdanov and Gregor Leander and Kaisa Nyberg and Meiqin Wang},
2326 booktitle = {ASIACRYPT},
2329 doi = {10.1007/978-3-642-34961-4_16},
2330 publisher = {Springer},
2334 @inproceedings{asiacrypt-2012-24437,
2335 title = {Differential Analysis of the LED Block Cipher},
2336 author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici},
2337 booktitle = {ASIACRYPT},
2340 doi = {10.1007/978-3-642-34961-4_13},
2341 publisher = {Springer},
2345 @inproceedings{asiacrypt-2012-24438,
2346 title = {The Five-Card Trick Can Be Done with Four Cards},
2347 author = {Takaaki Mizuki and Michihito Kumamoto and Hideaki Sone},
2348 booktitle = {ASIACRYPT},
2351 doi = {10.1007/978-3-642-34961-4_36},
2352 publisher = {Springer},
2356 @inproceedings{asiacrypt-2012-24439,
2357 title = {Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings},
2358 author = {Dmitry Khovratovich},
2359 booktitle = {ASIACRYPT},
2362 doi = {10.1007/978-3-642-34961-4_33},
2363 publisher = {Springer},
2367 @inproceedings{asiacrypt-2012-24440,
2368 title = {A Unified Framework for UC from Only OT},
2369 author = {Rafael Pass and Huijia Lin and Muthuramakrishnan Venkitasubramaniam},
2370 booktitle = {ASIACRYPT},
2373 doi = {10.1007/978-3-642-34961-4_42},
2374 publisher = {Springer},
2378 @inproceedings{asiacrypt-2012-24441,
2379 title = {PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract},
2380 author = {Julia Borghoff and Anne Canteaut and Tim Güneysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and Søren S. Thomsen and Tolga Yalçin},
2381 booktitle = {ASIACRYPT},
2384 doi = {10.1007/978-3-642-34961-4_14},
2385 publisher = {Springer},
2389 @inproceedings{asiacrypt-2012-24442,
2390 title = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption},
2391 author = {Tatsuaki Okamoto and Katsuyuki Takashima},
2392 booktitle = {ASIACRYPT},
2395 doi = {10.1007/978-3-642-34961-4_22},
2396 publisher = {Springer},
2400 @inproceedings{asiacrypt-2012-24443,
2401 title = {Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note},
2402 author = {Nicolas Veyrat-Charvillon and Marcel Medwed and Stéphanie Kerckhof and François-Xavier Standaert},
2403 booktitle = {ASIACRYPT},
2406 doi = {10.1007/978-3-642-34961-4_44},
2407 publisher = {Springer},
2411 @inproceedings{asiacrypt-2012-24444,
2412 title = {Understanding Adaptivity: Random Systems Revisited},
2413 author = {Dimitar Jetchev and Onur Özen and Martijn Stam},
2414 booktitle = {ASIACRYPT},
2417 doi = {10.1007/978-3-642-34961-4_20},
2418 publisher = {Springer},
2422 @inproceedings{asiacrypt-2012-24445,
2423 title = {Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication},
2424 author = {Patrick Longa and Francesco Sica},
2425 booktitle = {ASIACRYPT},
2428 doi = {10.1007/978-3-642-34961-4_43},
2429 publisher = {Springer},
2433 @inproceedings{asiacrypt-2012-24446,
2434 title = {Breaking Pairing-Based Cryptosystems Using \&\#951; T Pairing over GF(397)},
2435 author = {Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi},
2436 booktitle = {ASIACRYPT},
2439 doi = {10.1007/978-3-642-34961-4_5},
2440 publisher = {Springer},
2444 @inproceedings{asiacrypt-2012-24447,
2445 title = {Some Mathematical Mysteries in Lattices},
2446 author = {Chuanming Zong},
2447 booktitle = {ASIACRYPT},
2450 doi = {10.1007/978-3-642-34961-4_2},
2451 publisher = {Springer},
2455 @inproceedings{asiacrypt-2012-24448,
2456 title = {Pairing-Based Cryptography: Past, Present, and Future},
2457 author = {Dan Boneh},
2458 booktitle = {ASIACRYPT},
2461 doi = {10.1007/978-3-642-34961-4_1},
2462 publisher = {Springer},
2466 @inproceedings{asiacrypt-2012-24449,
2467 title = {Optimal Reductions of Some Decisional Problems to the Rank Problem},
2468 author = {Jorge Luis Villar},
2469 booktitle = {ASIACRYPT},
2472 doi = {10.1007/978-3-642-34961-4_7},
2473 publisher = {Springer},
2477 @inproceedings{asiacrypt-2012-24450,
2478 title = {Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic},
2479 author = {Léo Ducas and Phong Q. Nguyen},
2480 booktitle = {ASIACRYPT},
2483 doi = {10.1007/978-3-642-34961-4_26},
2484 publisher = {Springer},
2488 @inproceedings{asiacrypt-2012-24451,
2489 title = {Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures},
2490 author = {Léo Ducas and Phong Q. Nguyen},
2491 booktitle = {ASIACRYPT},
2494 doi = {10.1007/978-3-642-34961-4_27},
2495 publisher = {Springer},
2499 @inproceedings{asiacrypt-2012-24452,
2500 title = {Generic Related-Key Attacks for HMAC},
2501 author = {Thomas Peyrin and Yu Sasaki and Lei Wang 0007},
2502 booktitle = {ASIACRYPT},
2505 doi = {10.1007/978-3-642-34961-4_35},
2506 publisher = {Springer},
2510 @inproceedings{asiacrypt-2012-24453,
2511 title = {Calling Out Cheaters: Covert Security with Public Verifiability},
2512 author = {Gilad Asharov and Claudio Orlandi},
2513 booktitle = {ASIACRYPT},
2516 doi = {10.1007/978-3-642-34961-4_41},
2517 publisher = {Springer},
2521 @inproceedings{asiacrypt-2012-24454,
2522 title = {Computing on Authenticated Data: New Privacy Definitions and Constructions},
2523 author = {Nuttapong Attrapadung and Benoît Libert and Thomas Peters},
2524 booktitle = {ASIACRYPT},
2527 doi = {10.1007/978-3-642-34961-4_23},
2528 publisher = {Springer},
2532 @inproceedings{asiacrypt-2012-24455,
2533 title = {IND-CCA Secure Cryptography Based on a Variant of the LPN Problem},
2534 author = {Nico Döttling and Jörn Müller-Quade and Anderson C. A. Nascimento},
2535 booktitle = {ASIACRYPT},
2538 doi = {10.1007/978-3-642-34961-4_30},
2539 publisher = {Springer},
2543 @inproceedings{asiacrypt-2012-24456,
2544 title = {Provable Security of the Knudsen-Preneel Compression Functions},
2545 author = {Jooyoung Lee},
2546 booktitle = {ASIACRYPT},
2549 doi = {10.1007/978-3-642-34961-4_31},
2550 publisher = {Springer},
2554 @inproceedings{asiacrypt-2012-24457,
2555 title = {An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher},
2556 author = {Rodolphe Lampe and Jacques Patarin and Yannick Seurin},
2557 booktitle = {ASIACRYPT},
2560 doi = {10.1007/978-3-642-34961-4_18},
2561 publisher = {Springer},
2565 @proceedings{ches-2012-24379,
2566 title = {Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
2569 doi = {10.1007/978-3-642-33027-8},
2570 publisher = {Springer},
2574 @inproceedings{ches-2012-24380,
2575 title = {Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware},
2576 author = {Stefan Heyse and Tim Güneysu},
2580 doi = {10.1007/978-3-642-33027-8_20},
2581 publisher = {Springer},
2585 @inproceedings{ches-2012-24381,
2586 title = {Practical Security Analysis of PUF-Based Two-Player Protocols},
2587 author = {Ulrich Rührmair and Marten van Dijk},
2591 doi = {10.1007/978-3-642-33027-8_15},
2592 publisher = {Springer},
2596 @inproceedings{ches-2012-24382,
2597 title = {A Statistical Model for DPA with Novel Algorithmic Confusion Analysis},
2598 author = {Yunsi Fei and Qiasi Luo and A. Adam Ding},
2602 doi = {10.1007/978-3-642-33027-8_14},
2603 publisher = {Springer},
2607 @inproceedings{ches-2012-24383,
2608 title = {Selecting Time Samples for Multivariate DPA Attacks},
2609 author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede},
2613 doi = {10.1007/978-3-642-33027-8_10},
2614 publisher = {Springer},
2618 @inproceedings{ches-2012-24384,
2619 title = {Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us},
2620 author = {Alexander Schlösser and Dmitry Nedospasov and Juliane Krämer and Susanna Orlic and Jean-Pierre Seifert},
2624 doi = {10.1007/978-3-642-33027-8_3},
2625 publisher = {Springer},
2629 @inproceedings{ches-2012-24385,
2630 title = {Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint},
2631 author = {Stéphanie Kerckhof and François Durvaux and Cédric Hocquet and David Bol and François-Xavier Standaert},
2635 doi = {10.1007/978-3-642-33027-8_23},
2636 publisher = {Springer},
2640 @inproceedings{ches-2012-24386,
2641 title = {An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for DF-ECC Processor},
2642 author = {Jen-Wei Lee and Szu-Chi Chung and Hsie-Chia Chang and Chen-Yi Lee},
2646 doi = {10.1007/978-3-642-33027-8_32},
2647 publisher = {Springer},
2651 @inproceedings{ches-2012-24387,
2652 title = {On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes},
2653 author = {Norman Göttert and Thomas Feller and Michael Schneider 0002 and Johannes Buchmann and Sorin A. Huss},
2657 doi = {10.1007/978-3-642-33027-8_30},
2658 publisher = {Springer},
2662 @inproceedings{ches-2012-24388,
2663 title = {Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking},
2664 author = {Blandine Debraize},
2668 doi = {10.1007/978-3-642-33027-8_7},
2669 publisher = {Springer},
2673 @inproceedings{ches-2012-24389,
2674 title = {Pushing the Limits of High-Speed GF(2 m ) Elliptic Curve Scalar Multiplication on FPGAs},
2675 author = {Chester Rebeiro and Sujoy Sinha Roy and Debdeep Mukhopadhyay},
2679 doi = {10.1007/978-3-642-33027-8_29},
2680 publisher = {Springer},
2684 @inproceedings{ches-2012-24390,
2685 title = {Solving Quadratic Equations with XL on Parallel Architectures},
2686 author = {Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang},
2690 doi = {10.1007/978-3-642-33027-8_21},
2691 publisher = {Springer},
2695 @inproceedings{ches-2012-24391,
2696 title = {Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents},
2697 author = {Santanu Sarkar and Subhamoy Maitra},
2701 doi = {10.1007/978-3-642-33027-8_28},
2702 publisher = {Springer},
2706 @inproceedings{ches-2012-24392,
2707 title = {NEON Crypto},
2708 author = {Daniel J. Bernstein and Peter Schwabe},
2712 doi = {10.1007/978-3-642-33027-8_19},
2713 publisher = {Springer},
2717 @inproceedings{ches-2012-24393,
2718 title = {Efficient Implementations of MQPKS on Constrained Devices},
2719 author = {Peter Czypek and Stefan Heyse and Enrico Thomae},
2723 doi = {10.1007/978-3-642-33027-8_22},
2724 publisher = {Springer},
2728 @inproceedings{ches-2012-24394,
2729 title = {Practical Leakage-Resilient Symmetric Cryptography},
2730 author = {Sebastian Faust and Krzysztof Pietrzak and Joachim Schipper},
2734 doi = {10.1007/978-3-642-33027-8_13},
2735 publisher = {Springer},
2739 @inproceedings{ches-2012-24395,
2740 title = {Threshold Implementations of All 3 \×3 and 4 \×4 S-Boxes},
2741 author = {Begül Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg Stütz},
2745 doi = {10.1007/978-3-642-33027-8_5},
2746 publisher = {Springer},
2750 @inproceedings{ches-2012-24396,
2751 title = {Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems},
2752 author = {Tim Güneysu and Vadim Lyubashevsky and Thomas Pöppelmann},
2756 doi = {10.1007/978-3-642-33027-8_31},
2757 publisher = {Springer},
2761 @inproceedings{ches-2012-24397,
2762 title = {Low-Latency Encryption - Is 'Lightweight = Light + Wait'?},
2763 author = {Miroslav Knezevic and Ventzislav Nikov and Peter Rombouts},
2767 doi = {10.1007/978-3-642-33027-8_25},
2768 publisher = {Springer},
2772 @inproceedings{ches-2012-24398,
2773 title = {Breakthrough Silicon Scanning Discovers Backdoor in Military Chip},
2774 author = {Sergei Skorobogatov and Christopher Woods},
2778 doi = {10.1007/978-3-642-33027-8_2},
2779 publisher = {Springer},
2783 @inproceedings{ches-2012-24399,
2784 title = {Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication},
2785 author = {Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz},
2789 doi = {10.1007/978-3-642-33027-8_26},
2790 publisher = {Springer},
2794 @inproceedings{ches-2012-24400,
2795 title = {3D Hardware Canaries},
2796 author = {Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf},
2800 doi = {10.1007/978-3-642-33027-8_1},
2801 publisher = {Springer},
2805 @inproceedings{ches-2012-24401,
2806 title = {How Far Should Theory Be from Practice? - Evaluation of a Countermeasure},
2807 author = {Amir Moradi and Oliver Mischke},
2811 doi = {10.1007/978-3-642-33027-8_6},
2812 publisher = {Springer},
2816 @inproceedings{ches-2012-24402,
2817 title = {Compiler Assisted Masking},
2818 author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall},
2822 doi = {10.1007/978-3-642-33027-8_4},
2823 publisher = {Springer},
2827 @inproceedings{ches-2012-24403,
2828 title = {Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment},
2829 author = {Vincent van der Leest and Bart Preneel and Erik van der Sluis},
2833 doi = {10.1007/978-3-642-33027-8_16},
2834 publisher = {Springer},
2838 @inproceedings{ches-2012-24404,
2839 title = {Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break RSA by DPA},
2840 author = {Michael Vielhaber},
2844 doi = {10.1007/978-3-642-33027-8_27},
2845 publisher = {Springer},
2849 @inproceedings{ches-2012-24405,
2850 title = {Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting},
2851 author = {Benoît Gérard and François-Xavier Standaert},
2855 doi = {10.1007/978-3-642-33027-8_11},
2856 publisher = {Springer},
2860 @inproceedings{ches-2012-24406,
2861 title = {PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator},
2862 author = {Roel Maes and Anthony Van Herrewege and Ingrid Verbauwhede},
2866 doi = {10.1007/978-3-642-33027-8_18},
2867 publisher = {Springer},
2871 @inproceedings{ches-2012-24407,
2872 title = {A Differential Fault Attack on the Grain Family of Stream Ciphers},
2873 author = {Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar},
2877 doi = {10.1007/978-3-642-33027-8_8},
2878 publisher = {Springer},
2882 @inproceedings{ches-2012-24408,
2883 title = {Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs},
2884 author = {Marcel Medwed and François-Xavier Standaert and Antoine Joux},
2888 doi = {10.1007/978-3-642-33027-8_12},
2889 publisher = {Springer},
2893 @inproceedings{ches-2012-24409,
2894 title = {PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon},
2895 author = {Stefan Katzenbeisser and Ünal Koçabas and Vladimir Rozic and Ahmad-Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann},
2899 doi = {10.1007/978-3-642-33027-8_17},
2900 publisher = {Springer},
2904 @inproceedings{ches-2012-24410,
2905 title = {Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation},
2906 author = {Seiichi Matsuda and Shiho Moriai},
2910 doi = {10.1007/978-3-642-33027-8_24},
2911 publisher = {Springer},
2915 @inproceedings{ches-2012-24411,
2916 title = {Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model},
2917 author = {Yossef Oren and Mathieu Renauld and François-Xavier Standaert and Avishai Wool},
2921 doi = {10.1007/978-3-642-33027-8_9},
2922 publisher = {Springer},
2926 @inproceedings{crypto-2012-24320,
2927 title = {Homomorphic Evaluation of the AES Circuit},
2928 author = {Craig Gentry and Shai Halevi and Nigel P. Smart},
2929 booktitle = {Advances in Cryptology - Crypto 2012},
2932 doi = {10.1007/978-3-642-32009-5_49},
2933 publisher = {Springer},
2934 series = {Lecture Notes in Computer Science},
2938 @inproceedings{crypto-2012-24321,
2939 title = {Differential Privacy with Imperfect Randomness},
2940 author = {Yevgeniy Dodis and Adriana López-Alt and Ilya Mironov and Salil P. Vadhan},
2941 booktitle = {Advances in Cryptology - Crypto 2012},
2944 doi = {10.1007/978-3-642-32009-5_29},
2945 publisher = {Springer},
2946 series = {Lecture Notes in Computer Science},
2950 @inproceedings{crypto-2012-24322,
2951 title = {Securing Circuits against Constant-Rate Tampering},
2952 author = {Dana Dachman-Soled and Yael Tauman Kalai},
2953 booktitle = {Advances in Cryptology - Crypto 2012},
2956 doi = {10.1007/978-3-642-32009-5_31},
2957 publisher = {Springer},
2958 series = {Lecture Notes in Computer Science},
2962 @inproceedings{crypto-2012-24323,
2963 title = {New Preimage Attacks against Reduced SHA-1},
2964 author = {Simon Knellwolf and Dmitry Khovratovich},
2965 booktitle = {Advances in Cryptology - Crypto 2012},
2968 doi = {10.1007/978-3-642-32009-5_22},
2969 publisher = {Springer},
2970 series = {Lecture Notes in Computer Science},
2974 @inproceedings{crypto-2012-24324,
2975 title = {Must You Know the Code of f to Securely Compute f?},
2976 author = {Mike Rosulek},
2977 booktitle = {Advances in Cryptology - Crypto 2012},
2980 doi = {10.1007/978-3-642-32009-5_7},
2981 publisher = {Springer},
2982 series = {Lecture Notes in Computer Science},
2986 @inproceedings{crypto-2012-24325,
2987 title = {On the Distribution of Linear Biases: Three Instructive Examples},
2988 author = {Mohamed Ahmed Abdelraheem and Martin Ågren and Peter Beelen and Gregor Leander},
2989 booktitle = {Advances in Cryptology - Crypto 2012},
2992 doi = {10.1007/978-3-642-32009-5_4},
2993 publisher = {Springer},
2994 series = {Lecture Notes in Computer Science},
2998 @inproceedings{crypto-2012-24326,
2999 title = {Tweakable Blockciphers with Beyond Birthday-Bound Security},
3000 author = {Will Landecker and Thomas Shrimpton and R. Seth Terashima},
3001 booktitle = {Advances in Cryptology - Crypto 2012},
3004 doi = {10.1007/978-3-642-32009-5_2},
3005 publisher = {Springer},
3006 series = {Lecture Notes in Computer Science},
3010 @inproceedings{crypto-2012-24327,
3011 title = {Secret Sharing Schemes for Very Dense Graphs},
3012 author = {Amos Beimel and Oriol Farràs and Yuval Mintz},
3013 booktitle = {Advances in Cryptology - Crypto 2012},
3016 doi = {10.1007/978-3-642-32009-5_10},
3017 publisher = {Springer},
3018 series = {Lecture Notes in Computer Science},
3022 @inproceedings{crypto-2012-24328,
3023 title = {Black-Box Constructions of Composable Protocols without Set-Up},
3024 author = {Huijia Lin and Rafael Pass},
3025 booktitle = {Advances in Cryptology - Crypto 2012},
3028 doi = {10.1007/978-3-642-32009-5_27},
3029 publisher = {Springer},
3030 series = {Lecture Notes in Computer Science},
3034 @inproceedings{crypto-2012-24329,
3035 title = {The End of Crypto},
3036 author = {Jonathan Zittrain},
3037 booktitle = {Advances in Cryptology - Crypto 2012},
3040 doi = {10.1007/978-3-642-32009-5_6},
3041 publisher = {Springer},
3042 series = {Lecture Notes in Computer Science},
3046 @inproceedings{crypto-2012-24330,
3047 title = {Group Signatures with Almost-for-Free Revocation},
3048 author = {Benoît Libert and Thomas Peters and Moti Yung},
3049 booktitle = {Advances in Cryptology - Crypto 2012},
3052 doi = {10.1007/978-3-642-32009-5_34},
3053 publisher = {Springer},
3054 series = {Lecture Notes in Computer Science},
3058 @inproceedings{crypto-2012-24331,
3059 title = {Crowd-Blending Privacy},
3060 author = {Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass},
3061 booktitle = {Advances in Cryptology - Crypto 2012},
3064 doi = {10.1007/978-3-642-32009-5_28},
3065 publisher = {Springer},
3066 series = {Lecture Notes in Computer Science},
3070 @inproceedings{crypto-2012-24332,
3071 title = "How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware",
3072 author = {Guy N. Rothblum},
3073 booktitle = {Advances in Cryptology - Crypto 2012},
3076 doi = {10.1007/978-3-642-32009-5_32},
3077 publisher = {Springer},
3078 series = {Lecture Notes in Computer Science},
3082 @inproceedings{crypto-2012-24333,
3083 title = {Tamper and Leakage Resilience in the Split-State Model},
3084 author = {Feng-Hao Liu and Anna Lysyanskaya},
3085 booktitle = {Advances in Cryptology - Crypto 2012},
3088 doi = {10.1007/978-3-642-32009-5_30},
3089 publisher = {Springer},
3090 series = {Lecture Notes in Computer Science},
3094 @inproceedings{crypto-2012-24334,
3095 title = {Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority},
3096 author = {Eli Ben-Sasson and Serge Fehr and Rafail Ostrovsky},
3097 booktitle = {Advances in Cryptology - Crypto 2012},
3100 doi = {10.1007/978-3-642-32009-5_39},
3101 publisher = {Springer},
3102 series = {Lecture Notes in Computer Science},
3106 @inproceedings{crypto-2012-24335,
3107 title = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems},
3108 author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir},
3109 booktitle = {Advances in Cryptology - Crypto 2012},
3112 doi = {10.1007/978-3-642-32009-5_42},
3113 publisher = {Springer},
3114 series = {Lecture Notes in Computer Science},
3118 @inproceedings{crypto-2012-24336,
3119 title = {New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation},
3120 author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai},
3121 booktitle = {Advances in Cryptology - Crypto 2012},
3124 doi = {10.1007/978-3-642-32009-5_26},
3125 publisher = {Springer},
3126 series = {Lecture Notes in Computer Science},
3130 @proceedings{crypto-2012-24286,
3131 title = {Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
3132 booktitle = {Advances in Cryptology - Crypto 2012},
3134 url = {http://link.springer.com/book/10.1007/978-3-642-32009-5},
3135 doi = {10.1007/978-3-642-32009-5},
3136 publisher = {Springer},
3137 series = {Lecture Notes in Computer Science},
3141 @inproceedings{crypto-2012-24287,
3142 title = {Public Keys},
3143 author = {Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter},
3144 booktitle = {Advances in Cryptology - Crypto 2012},
3147 doi = {10.1007/978-3-642-32009-5_37},
3148 publisher = {Springer},
3149 series = {Lecture Notes in Computer Science},
3153 @inproceedings{crypto-2012-24288,
3154 title = {Hash Functions Based on Three Permutations: A Generic Security Analysis},
3155 author = {Bart Mennink and Bart Preneel},
3156 booktitle = {Advances in Cryptology - Crypto 2012},
3159 doi = {10.1007/978-3-642-32009-5_20},
3160 publisher = {Springer},
3161 series = {Lecture Notes in Computer Science},
3165 @inproceedings{crypto-2012-24289,
3166 title = {Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs},
3167 author = {Eric Miles and Emanuele Viola},
3168 booktitle = {Advances in Cryptology - Crypto 2012},
3171 doi = {10.1007/978-3-642-32009-5_5},
3172 publisher = {Springer},
3173 series = {Lecture Notes in Computer Science},
3177 @inproceedings{crypto-2012-24290,
3178 title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption},
3179 author = {Amit Sahai and Hakan Seyalioglu and Brent Waters},
3180 booktitle = {Advances in Cryptology - Crypto 2012},
3183 doi = {10.1007/978-3-642-32009-5_13},
3184 publisher = {Springer},
3185 series = {Lecture Notes in Computer Science},
3189 @inproceedings{crypto-2012-24291,
3190 title = {A New Approach to Practical Active-Secure Two-Party Computation},
3191 author = {Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Sai Sheshank Burra},
3192 booktitle = {Advances in Cryptology - Crypto 2012},
3195 doi = {10.1007/978-3-642-32009-5_40},
3196 publisher = {Springer},
3197 series = {Lecture Notes in Computer Science},
3201 @inproceedings{crypto-2012-24292,
3202 title = {Semantic Security for the Wiretap Channel},
3203 author = {Mihir Bellare and Stefano Tessaro and Alexander Vardy},
3204 booktitle = {Advances in Cryptology - Crypto 2012},
3207 doi = {10.1007/978-3-642-32009-5_18},
3208 publisher = {Springer},
3209 series = {Lecture Notes in Computer Science},
3213 @inproceedings{crypto-2012-24293,
3214 title = {On the Security of TLS-DHE in the Standard Model},
3215 author = {Tibor Jager and Florian Kohlar and Sven Schäge and Jörg Schwenk},
3216 booktitle = {Advances in Cryptology - Crypto 2012},
3219 doi = {10.1007/978-3-642-32009-5_17},
3220 publisher = {Springer},
3221 series = {Lecture Notes in Computer Science},
3225 @inproceedings{crypto-2012-24294,
3226 title = {Universal Composability from Essentially Any Trusted Setup},
3227 author = {Mike Rosulek},
3228 booktitle = {Advances in Cryptology - Crypto 2012},
3231 doi = {10.1007/978-3-642-32009-5_24},
3232 publisher = {Springer},
3233 series = {Lecture Notes in Computer Science},
3237 @inproceedings{crypto-2012-24295,
3238 title = {Quantum to Classical Randomness Extractors},
3239 author = {Mario Berta and Omar Fawzi and Stephanie Wehner},
3240 booktitle = {Advances in Cryptology - Crypto 2012},
3243 doi = {10.1007/978-3-642-32009-5_45},
3244 publisher = {Springer},
3245 series = {Lecture Notes in Computer Science},
3249 @inproceedings{crypto-2012-24296,
3250 title = {Breaking and Repairing GCM Security Proofs},
3251 author = {Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu},
3252 booktitle = {Advances in Cryptology - Crypto 2012},
3255 doi = {10.1007/978-3-642-32009-5_3},
3256 publisher = {Springer},
3257 series = {Lecture Notes in Computer Science},
3261 @inproceedings{crypto-2012-24297,
3262 title = {To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC},
3263 author = {Yevgeniy Dodis and Thomas Ristenpart and John P. Steinberger and Stefano Tessaro},
3264 booktitle = {Advances in Cryptology - Crypto 2012},
3267 doi = {10.1007/978-3-642-32009-5_21},
3268 publisher = {Springer},
3269 series = {Lecture Notes in Computer Science},
3273 @inproceedings{crypto-2012-24298,
3274 title = {Secure Identity-Based Encryption in the Quantum Random Oracle Model},
3275 author = {Mark Zhandry},
3276 booktitle = {Advances in Cryptology - Crypto 2012},
3279 doi = {10.1007/978-3-642-32009-5_44},
3280 publisher = {Springer},
3281 series = {Lecture Notes in Computer Science},
3285 @inproceedings{crypto-2012-24299,
3286 title = {Functional Encryption for Regular Languages},
3287 author = {Brent Waters},
3288 booktitle = {Advances in Cryptology - Crypto 2012},
3291 doi = {10.1007/978-3-642-32009-5_14},
3292 publisher = {Springer},
3293 series = {Lecture Notes in Computer Science},
3297 @inproceedings{crypto-2012-24300,
3298 title = {An Enciphering Scheme Based on a Card Shuffle},
3299 author = {Viet Tung Hoang and Ben Morris and Phillip Rogaway},
3300 booktitle = {Advances in Cryptology - Crypto 2012},
3303 doi = {10.1007/978-3-642-32009-5_1},
3304 publisher = {Springer},
3305 series = {Lecture Notes in Computer Science},
3309 @inproceedings{crypto-2012-24301,
3310 title = {Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits},
3311 author = {Nir Bitansky and Alessandro Chiesa},
3312 booktitle = {Advances in Cryptology - Crypto 2012},
3315 doi = {10.1007/978-3-642-32009-5_16},
3316 publisher = {Springer},
3317 series = {Lecture Notes in Computer Science},
3321 @inproceedings{crypto-2012-24302,
3322 title = {Actively Secure Two-Party Evaluation of Any Quantum Operation},
3323 author = {Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail},
3324 booktitle = {Advances in Cryptology - Crypto 2012},
3327 doi = {10.1007/978-3-642-32009-5_46},
3328 publisher = {Springer},
3329 series = {Lecture Notes in Computer Science},
3333 @inproceedings{crypto-2012-24303,
3334 title = {Functional Encryption with Bounded Collusions via Multi-party Computation},
3335 author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee},
3336 booktitle = {Advances in Cryptology - Crypto 2012},
3339 doi = {10.1007/978-3-642-32009-5_11},
3340 publisher = {Springer},
3341 series = {Lecture Notes in Computer Science},
3345 @inproceedings{crypto-2012-24304,
3346 title = {Secure Database Commitments and Universal Arguments of Quasi Knowledge},
3347 author = {Melissa Chase and Ivan Visconti},
3348 booktitle = {Advances in Cryptology - Crypto 2012},
3351 doi = {10.1007/978-3-642-32009-5_15},
3352 publisher = {Springer},
3353 series = {Lecture Notes in Computer Science},
3357 @inproceedings{crypto-2012-24305,
3358 title = {Resistance against Iterated Attacks by Decorrelation Revisited, },
3359 author = {Asli Bay and Atefeh Mashatan and Serge Vaudenay},
3360 booktitle = {Advances in Cryptology - Crypto 2012},
3363 doi = {10.1007/978-3-642-32009-5_43},
3364 publisher = {Springer},
3365 series = {Lecture Notes in Computer Science},
3369 @inproceedings{crypto-2012-24306,
3370 title = {Adaptively Secure Multi-Party Computation with Dishonest Majority},
3371 author = {Sanjam Garg and Amit Sahai},
3372 booktitle = {Advances in Cryptology - Crypto 2012},
3375 doi = {10.1007/978-3-642-32009-5_8},
3376 publisher = {Springer},
3377 series = {Lecture Notes in Computer Science},
3381 @inproceedings{crypto-2012-24307,
3382 title = {On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups},
3383 author = {Goichiro Hanaoka and Takahiro Matsuda 0002 and Jacob C. N. Schuldt},
3384 booktitle = {Advances in Cryptology - Crypto 2012},
3387 doi = {10.1007/978-3-642-32009-5_47},
3388 publisher = {Springer},
3389 series = {Lecture Notes in Computer Science},
3393 @inproceedings{crypto-2012-24308,
3394 title = {Impossibility Results for Static Input Secure Computation},
3395 author = {Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti},
3396 booktitle = {Advances in Cryptology - Crypto 2012},
3399 doi = {10.1007/978-3-642-32009-5_25},
3400 publisher = {Springer},
3401 series = {Lecture Notes in Computer Science},
3405 @inproceedings{crypto-2012-24309,
3406 title = {Collusion-Preserving Computation},
3407 author = {Joël Alwen and Jonathan Katz and Ueli M. Maurer and Vassilis Zikas},
3408 booktitle = {Advances in Cryptology - Crypto 2012},
3411 doi = {10.1007/978-3-642-32009-5_9},
3412 publisher = {Springer},
3413 series = {Lecture Notes in Computer Science},
3417 @inproceedings{crypto-2012-24310,
3418 title = {Multiparty Computation from Somewhat Homomorphic Encryption},
3419 author = {Ivan Damgård and Valerio Pastro and Nigel P. Smart and Sarah Zakarias},
3420 booktitle = {Advances in Cryptology - Crypto 2012},
3423 doi = {10.1007/978-3-642-32009-5_38},
3424 publisher = {Springer},
3425 series = {Lecture Notes in Computer Science},
3429 @inproceedings{crypto-2012-24311,
3430 title = {Efficient Padding Oracle Attacks on Cryptographic Hardware},
3431 author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay},
3432 booktitle = {Advances in Cryptology - Crypto 2012},
3435 doi = {10.1007/978-3-642-32009-5_36},
3436 publisher = {Springer},
3437 series = {Lecture Notes in Computer Science},
3441 @inproceedings{crypto-2012-24312,
3442 title = {Tightly Secure Signatures and Public-Key Encryption},
3443 author = {Dennis Hofheinz and Tibor Jager},
3444 booktitle = {Advances in Cryptology - Crypto 2012},
3447 doi = {10.1007/978-3-642-32009-5_35},
3448 publisher = {Springer},
3449 series = {Lecture Notes in Computer Science},
3453 @inproceedings{crypto-2012-24313,
3454 title = {The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives},
3455 author = {Mohammad Mahmoody and Rafael Pass},
3456 booktitle = {Advances in Cryptology - Crypto 2012},
3459 doi = {10.1007/978-3-642-32009-5_41},
3460 publisher = {Springer},
3461 series = {Lecture Notes in Computer Science},
3465 @inproceedings{crypto-2012-24314,
3466 title = {Hardness of Computing Individual Bits for One-Way Functions on Elliptic Curves},
3467 author = {Alexandre Duc and Dimitar Jetchev},
3468 booktitle = {Advances in Cryptology - Crypto 2012},
3471 doi = {10.1007/978-3-642-32009-5_48},
3472 publisher = {Springer},
3473 series = {Lecture Notes in Computer Science},
3477 @inproceedings{crypto-2012-24315,
3478 title = {Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP},
3479 author = {Zvika Brakerski},
3480 booktitle = {Advances in Cryptology - Crypto 2012},
3483 doi = {10.1007/978-3-642-32009-5_50},
3484 publisher = {Springer},
3485 series = {Lecture Notes in Computer Science},
3489 @inproceedings{crypto-2012-24316,
3490 title = {Multi-instance Security and Its Application to Password-Based Cryptography},
3491 author = {Mihir Bellare and Thomas Ristenpart and Stefano Tessaro},
3492 booktitle = {Advances in Cryptology - Crypto 2012},
3495 doi = {10.1007/978-3-642-32009-5_19},
3496 publisher = {Springer},
3497 series = {Lecture Notes in Computer Science},
3501 @inproceedings{crypto-2012-24317,
3502 title = {Stam's Conjecture and Threshold Phenomena in Collision Resistance},
3503 author = {John P. Steinberger and Xiaoming Sun and Zhe Yang},
3504 booktitle = {Advances in Cryptology - Crypto 2012},
3507 doi = {10.1007/978-3-642-32009-5_23},
3508 publisher = {Springer},
3509 series = {Lecture Notes in Computer Science},
3513 @inproceedings{crypto-2012-24318,
3514 title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques},
3515 author = {Allison B. Lewko and Brent Waters},
3516 booktitle = {Advances in Cryptology - Crypto 2012},
3519 doi = {10.1007/978-3-642-32009-5_12},
3520 publisher = {Springer},
3521 series = {Lecture Notes in Computer Science},
3525 @inproceedings{crypto-2012-24319,
3526 title = {Recent Advances and Existing Research Questions in Platform Security},
3527 author = {Ernie Brickell},
3528 booktitle = {Advances in Cryptology - Crypto 2012},
3531 doi = {10.1007/978-3-642-32009-5_33},
3532 publisher = {Springer},
3533 series = {Lecture Notes in Computer Science},
3537 @inproceedings{eurocrypt-2012-24240,
3538 title = {Cover and Decomposition Index Calculus on Elliptic Curves Made Practical - Application to a Previously Unreachable Curve over $F_(p^6)$},
3539 author = {Antoine Joux and Vanessa Vitse},
3540 booktitle = {EUROCRYPT},
3543 doi = {10.1007/978-3-642-29011-4_3},
3544 publisher = {Springer},
3545 series = {Lecture Notes in Computer Science},
3549 @inproceedings{eurocrypt-2012-24241,
3550 title = {Malleable Proof Systems and Applications},
3551 author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn},
3552 booktitle = {EUROCRYPT},
3555 doi = {10.1007/978-3-642-29011-4_18},
3556 publisher = {Springer},
3557 series = {Lecture Notes in Computer Science},
3561 @inproceedings{eurocrypt-2012-24242,
3562 title = {Robust Coin Flipping},
3563 author = {Gene S. Kopp and John D. Wiltshire-Gordon},
3564 booktitle = {EUROCRYPT},
3567 doi = {10.1007/978-3-642-29011-4_12},
3568 publisher = {Springer},
3569 series = {Lecture Notes in Computer Science},
3573 @inproceedings{eurocrypt-2012-24243,
3574 title = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation},
3575 author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam},
3576 booktitle = {EUROCRYPT},
3579 doi = {10.1007/978-3-642-29011-4_40},
3580 publisher = {Springer},
3581 series = {Lecture Notes in Computer Science},
3585 @inproceedings{eurocrypt-2012-24244,
3586 title = {Identity-Based (Lossy) Trapdoor Functions and Applications},
3587 author = {Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters},
3588 booktitle = {EUROCRYPT},
3591 doi = {10.1007/978-3-642-29011-4_15},
3592 publisher = {Springer},
3593 series = {Lecture Notes in Computer Science},
3597 @inproceedings{eurocrypt-2012-24245,
3598 title = {Message Authentication, Revisited},
3599 author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs},
3600 booktitle = {EUROCRYPT},
3603 doi = {10.1007/978-3-642-29011-4_22},
3604 publisher = {Springer},
3605 series = {Lecture Notes in Computer Science},
3609 @inproceedings{eurocrypt-2012-24246,
3610 title = {All-But-Many Lossy Trapdoor Functions},
3611 author = {Dennis Hofheinz},
3612 booktitle = {EUROCRYPT},
3615 doi = {10.1007/978-3-642-29011-4_14},
3616 publisher = {Springer},
3617 series = {Lecture Notes in Computer Science},
3621 @inproceedings{eurocrypt-2012-24247,
3622 title = {Identity-Based Encryption Resilient to Continual Auxiliary Leakage},
3623 author = {Tsz Hon Yuen and Sherman S. M. Chow and Ye Zhang and Siu Ming Yiu},
3624 booktitle = {EUROCRYPT},
3627 doi = {10.1007/978-3-642-29011-4_9},
3628 publisher = {Springer},
3629 series = {Lecture Notes in Computer Science},
3633 @inproceedings{eurocrypt-2012-24248,
3634 title = {Concurrently Secure Computation in Constant Rounds},
3635 author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai},
3636 booktitle = {EUROCRYPT},
3639 doi = {10.1007/978-3-642-29011-4_8},
3640 publisher = {Springer},
3641 series = {Lecture Notes in Computer Science},
3645 @inproceedings{eurocrypt-2012-24249,
3646 title = {Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More},
3647 author = {Hoeteck Wee},
3648 booktitle = {EUROCRYPT},
3651 doi = {10.1007/978-3-642-29011-4_16},
3652 publisher = {Springer},
3653 series = {Lecture Notes in Computer Science},
3657 @inproceedings{eurocrypt-2012-24250,
3658 title = {Quantum Proofs of Knowledge},
3659 author = {Dominique Unruh},
3660 booktitle = {EUROCRYPT},
3663 doi = {10.1007/978-3-642-29011-4_10},
3664 publisher = {Springer},
3665 series = {Lecture Notes in Computer Science},
3669 @inproceedings{eurocrypt-2012-24251,
3670 title = {Standard Security Does Not Imply Security against Selective-Opening},
3671 author = {Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek},
3672 booktitle = {EUROCRYPT},
3675 doi = {10.1007/978-3-642-29011-4_38},
3676 publisher = {Springer},
3677 series = {Lecture Notes in Computer Science},
3681 @inproceedings{eurocrypt-2012-24252,
3682 title = {Pseudorandom Functions and Lattices},
3683 author = {Abhishek Banerjee and Chris Peikert and Alon Rosen},
3684 booktitle = {EUROCRYPT},
3687 doi = {10.1007/978-3-642-29011-4_42},
3688 publisher = {Springer},
3689 series = {Lecture Notes in Computer Science},
3693 @inproceedings{eurocrypt-2012-24253,
3694 title = {Efficient Zero-Knowledge Argument for Correctness of a Shuffle},
3695 author = {Stephanie Bayer and Jens Groth},
3696 booktitle = {EUROCRYPT},
3699 doi = {10.1007/978-3-642-29011-4_17},
3700 publisher = {Springer},
3701 series = {Lecture Notes in Computer Science},
3705 @inproceedings{eurocrypt-2012-24254,
3706 title = {Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers},
3707 author = {Yuanmi Chen and Phong Q. Nguyen},
3708 booktitle = {EUROCRYPT},
3711 doi = {10.1007/978-3-642-29011-4_30},
3712 publisher = {Springer},
3713 series = {Lecture Notes in Computer Science},
3717 @inproceedings{eurocrypt-2012-24255,
3718 title = {Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers},
3719 author = {Jean-Sébastien Coron and David Naccache and Mehdi Tibouchi},
3720 booktitle = {EUROCRYPT},
3723 doi = {10.1007/978-3-642-29011-4_27},
3724 publisher = {Springer},
3725 series = {Lecture Notes in Computer Science},
3729 @inproceedings{eurocrypt-2012-24256,
3730 title = {Lattice Signatures without Trapdoors},
3731 author = {Vadim Lyubashevsky},
3732 booktitle = {EUROCRYPT},
3735 doi = {10.1007/978-3-642-29011-4_43},
3736 publisher = {Springer},
3737 series = {Lecture Notes in Computer Science},
3741 @inproceedings{eurocrypt-2012-24257,
3742 title = {Statistical Tools Flavor Side-Channel Collision Attacks},
3743 author = {Amir Moradi},
3744 booktitle = {EUROCRYPT},
3747 doi = {10.1007/978-3-642-29011-4_26},
3748 publisher = {Springer},
3749 series = {Lecture Notes in Computer Science},
3753 @inproceedings{eurocrypt-2012-24258,
3754 title = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model},
3755 author = {Yannick Seurin},
3756 booktitle = {EUROCRYPT},
3759 doi = {10.1007/978-3-642-29011-4_33},
3760 publisher = {Springer},
3761 series = {Lecture Notes in Computer Science},
3765 @inproceedings{eurocrypt-2012-24259,
3766 title = {Incremental Deterministic Public-Key Encryption},
3767 author = {Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev},
3768 booktitle = {EUROCRYPT},
3771 doi = {10.1007/978-3-642-29011-4_37},
3772 publisher = {Springer},
3773 series = {Lecture Notes in Computer Science},
3777 @inproceedings{eurocrypt-2012-24260,
3778 title = {Another Look at Provable Security},
3779 author = {Alfred Menezes},
3780 booktitle = {EUROCRYPT},
3783 doi = {10.1007/978-3-642-29011-4_2},
3784 publisher = {Springer},
3785 series = {Lecture Notes in Computer Science},
3789 @inproceedings{eurocrypt-2012-24261,
3790 title = {Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks},
3791 author = {Yu Sasaki},
3792 booktitle = {EUROCRYPT},
3795 doi = {10.1007/978-3-642-29011-4_25},
3796 publisher = {Springer},
3797 series = {Lecture Notes in Computer Science},
3801 @inproceedings{eurocrypt-2012-24262,
3802 title = {Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security},
3803 author = {Susan Hohenberger and Allison B. Lewko and Brent Waters},
3804 booktitle = {EUROCRYPT},
3807 doi = {10.1007/978-3-642-29011-4_39},
3808 publisher = {Springer},
3809 series = {Lecture Notes in Computer Science},
3813 @inproceedings{eurocrypt-2012-24263,
3814 title = {Group to Group Commitments Do Not Shrink},
3815 author = {Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo},
3816 booktitle = {EUROCRYPT},
3819 doi = {10.1007/978-3-642-29011-4_19},
3820 publisher = {Springer},
3821 series = {Lecture Notes in Computer Science},
3825 @inproceedings{eurocrypt-2012-24264,
3826 title = {Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE},
3827 author = {Gilad Asharov and Abhishek Jain and Adriana López-Alt and Eran Tromer and Vinod Vaikuntanathan and Daniel Wichs},
3828 booktitle = {EUROCRYPT},
3831 doi = {10.1007/978-3-642-29011-4_29},
3832 publisher = {Springer},
3833 series = {Lecture Notes in Computer Science},
3837 @inproceedings{eurocrypt-2012-24265,
3838 title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract)},
3839 author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and François-Xavier Standaert and John P. Steinberger and Elmar Tischhauser},
3840 booktitle = {EUROCRYPT},
3843 doi = {10.1007/978-3-642-29011-4_5},
3844 publisher = {Springer},
3845 series = {Lecture Notes in Computer Science},
3849 @inproceedings{eurocrypt-2012-24266,
3850 title = {Fair Computation with Rational Players},
3851 author = {Adam Groce and Jonathan Katz},
3852 booktitle = {EUROCRYPT},
3855 doi = {10.1007/978-3-642-29011-4_7},
3856 publisher = {Springer},
3857 series = {Lecture Notes in Computer Science},
3861 @inproceedings{eurocrypt-2012-24267,
3862 title = {Narrow-Bicliques: Cryptanalysis of Full IDEA},
3863 author = {Dmitry Khovratovich and Gaëtan Leurent and Christian Rechberger},
3864 booktitle = {EUROCRYPT},
3867 doi = {10.1007/978-3-642-29011-4_24},
3868 publisher = {Springer},
3869 series = {Lecture Notes in Computer Science},
3873 @inproceedings{eurocrypt-2012-24268,
3874 title = {Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting},
3875 author = {Allison B. Lewko},
3876 booktitle = {EUROCRYPT},
3879 doi = {10.1007/978-3-642-29011-4_20},
3880 publisher = {Springer},
3881 series = {Lecture Notes in Computer Science},
3885 @inproceedings{eurocrypt-2012-24269,
3886 title = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited},
3887 author = {Orr Dunkelman and Nathan Keller and Adi Shamir},
3888 booktitle = {EUROCRYPT},
3891 doi = {10.1007/978-3-642-29011-4_21},
3892 publisher = {Springer},
3893 series = {Lecture Notes in Computer Science},
3897 @inproceedings{eurocrypt-2012-24270,
3898 title = {Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields},
3899 author = {Jean-Charles Faugère and Ludovic Perret and Christophe Petit and Guénaël Renault},
3900 booktitle = {EUROCRYPT},
3903 doi = {10.1007/978-3-642-29011-4_4},
3904 publisher = {Springer},
3905 series = {Lecture Notes in Computer Science},
3909 @inproceedings{eurocrypt-2012-24271,
3910 title = {Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding},
3911 author = {Anja Becker and Antoine Joux and Alexander May and Alexander Meurer},
3912 booktitle = {EUROCRYPT},
3915 doi = {10.1007/978-3-642-29011-4_31},
3916 publisher = {Springer},
3917 series = {Lecture Notes in Computer Science},
3921 @inproceedings{eurocrypt-2012-24272,
3922 title = {Fully Homomorphic Encryption with Polylog Overhead},
3923 author = {Craig Gentry and Shai Halevi and Nigel P. Smart},
3924 booktitle = {EUROCRYPT},
3927 doi = {10.1007/978-3-642-29011-4_28},
3928 publisher = {Springer},
3929 series = {Lecture Notes in Computer Science},
3933 @inproceedings{eurocrypt-2012-24273,
3934 title = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption},
3935 author = {Tatsuaki Okamoto and Katsuyuki Takashima},
3936 booktitle = {EUROCRYPT},
3939 doi = {10.1007/978-3-642-29011-4_35},
3940 publisher = {Springer},
3941 series = {Lecture Notes in Computer Science},
3945 @inproceedings{eurocrypt-2012-24274,
3946 title = {Tightly-Secure Signatures from Lossy Identification Schemes},
3947 author = {Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi},
3948 booktitle = {EUROCRYPT},
3951 doi = {10.1007/978-3-642-29011-4_34},
3952 publisher = {Springer},
3953 series = {Lecture Notes in Computer Science},
3957 @inproceedings{eurocrypt-2012-24275,
3958 title = {Optimal Security Proofs for Full Domain Hash, Revisited},
3959 author = {Saqib A. Kakvi and Eike Kiltz},
3960 booktitle = {EUROCRYPT},
3963 doi = {10.1007/978-3-642-29011-4_32},
3964 publisher = {Springer},
3965 series = {Lecture Notes in Computer Science},
3969 @inproceedings{eurocrypt-2012-24276,
3970 title = {A Tutorial on High Performance Computing Applied to Cryptanalysis - (Invited Talk Abstract)},
3971 author = {Antoine Joux},
3972 booktitle = {EUROCRYPT},
3975 doi = {10.1007/978-3-642-29011-4_1},
3976 publisher = {Springer},
3977 series = {Lecture Notes in Computer Science},
3981 @inproceedings{eurocrypt-2012-24277,
3982 title = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller},
3983 author = {Daniele Micciancio and Chris Peikert},
3984 booktitle = {EUROCRYPT},
3987 doi = {10.1007/978-3-642-29011-4_41},
3988 publisher = {Springer},
3989 series = {Lecture Notes in Computer Science},
3993 @inproceedings{eurocrypt-2012-24278,
3994 title = {Scalable Group Signatures with Revocation},
3995 author = {Benoît Libert and Thomas Peters and Moti Yung},
3996 booktitle = {EUROCRYPT},
3999 doi = {10.1007/978-3-642-29011-4_36},
4000 publisher = {Springer},
4001 series = {Lecture Notes in Computer Science},
4005 @inproceedings{eurocrypt-2012-24279,
4006 title = {Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading},
4007 author = {Peter Gazi and Stefano Tessaro},
4008 booktitle = {EUROCRYPT},
4011 doi = {10.1007/978-3-642-29011-4_6},
4012 publisher = {Springer},
4013 series = {Lecture Notes in Computer Science},
4017 @inproceedings{eurocrypt-2012-24280,
4018 title = {Property Preserving Symmetric Encryption},
4019 author = {Omkant Pandey and Yannis Rouselakis},
4020 booktitle = {EUROCRYPT},
4023 doi = {10.1007/978-3-642-29011-4_23},
4024 publisher = {Springer},
4025 series = {Lecture Notes in Computer Science},
4029 @inproceedings{eurocrypt-2012-24281,
4030 title = {Unconditionally-Secure Robust Secret Sharing with Compact Shares},
4031 author = {Alfonso Cevallos and Serge Fehr and Rafail Ostrovsky and Yuval Rabani},
4032 booktitle = {EUROCRYPT},
4035 doi = {10.1007/978-3-642-29011-4_13},
4036 publisher = {Springer},
4037 series = {Lecture Notes in Computer Science},
4041 @inproceedings{eurocrypt-2012-24282,
4042 title = {On Round-Optimal Zero Knowledge in the Bare Public-Key Model},
4043 author = {Alessandra Scafuro and Ivan Visconti},
4044 booktitle = {EUROCRYPT},
4047 doi = {10.1007/978-3-642-29011-4_11},
4048 publisher = {Springer},
4049 series = {Lecture Notes in Computer Science},
4053 @proceedings{eurocrypt-2012-24284,
4054 title = {Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings},
4055 booktitle = {EUROCRYPT},
4057 url = {http://link.springer.com/book/10.1007/978-3-642-29011-4},
4058 doi = {10.1007/978-3-642-29011-4},
4059 publisher = {Springer},
4060 series = {Lecture Notes in Computer Science},
4064 @proceedings{fse-2012-24458,
4065 title = {Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
4068 url = {http://link.springer.com/book/10.1007/978-3-642-34047-5},
4069 doi = {10.1007/978-3-642-34047-5},
4070 publisher = {Springer},
4074 @inproceedings{fse-2012-24459,
4075 title = {ElimLin Algorithm Revisited},
4076 author = {Nicolas T. Courtois and Pouyan Sepehrdad and Petr Susil and Serge Vaudenay},
4080 doi = {10.1007/978-3-642-34047-5_18},
4081 publisher = {Springer},
4085 @inproceedings{fse-2012-24460,
4086 title = {McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes},
4087 author = {Ewan Fleischmann and Christian Forler and Stefan Lucks},
4091 doi = {10.1007/978-3-642-34047-5_12},
4092 publisher = {Springer},
4096 @inproceedings{fse-2012-24461,
4097 title = {'Provable' Security against Differential and Linear Cryptanalysis},
4098 author = {Kaisa Nyberg},
4102 doi = {10.1007/978-3-642-34047-5_1},
4103 publisher = {Springer},
4107 @inproceedings{fse-2012-24462,
4108 title = {Improved Attacks on Full GOST},
4109 author = {Itai Dinur and Orr Dunkelman and Adi Shamir},
4113 doi = {10.1007/978-3-642-34047-5_2},
4114 publisher = {Springer},
4118 @inproceedings{fse-2012-24463,
4119 title = {Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2},
4120 author = {Ji Li and Takanori Isobe and Kyoji Shibutani},
4124 doi = {10.1007/978-3-642-34047-5_16},
4125 publisher = {Springer},
4129 @inproceedings{fse-2012-24464,
4130 title = {Higher-Order Masking Schemes for S-Boxes},
4131 author = {Claude Carlet and Louis Goubin and Emmanuel Prouff and Michaël Quisquater and Matthieu Rivain},
4135 doi = {10.1007/978-3-642-34047-5_21},
4136 publisher = {Springer},
4140 @inproceedings{fse-2012-24465,
4141 title = {New Attacks on Keccak-224 and Keccak-256},
4142 author = {Itai Dinur and Orr Dunkelman and Adi Shamir},
4146 doi = {10.1007/978-3-642-34047-5_25},
4147 publisher = {Springer},
4151 @inproceedings{fse-2012-24466,
4152 title = {Zero Correlation Linear Cryptanalysis with Reduced Data Complexity},
4153 author = {Andrey Bogdanov and Meiqin Wang},
4157 doi = {10.1007/978-3-642-34047-5_3},
4158 publisher = {Springer},
4162 @inproceedings{fse-2012-24467,
4163 title = {On the (In)Security of IDEA in Various Hashing Modes},
4164 author = {Lei Wei 0001 and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang},
4168 doi = {10.1007/978-3-642-34047-5_10},
4169 publisher = {Springer},
4173 @inproceedings{fse-2012-24468,
4174 title = {New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia},
4175 author = {Ya Liu 0001 and Leibo Li and Dawu Gu and Xiaoyun Wang and Zhiqiang Liu and Jiazhe Chen and Wei Li 0013},
4179 doi = {10.1007/978-3-642-34047-5_6},
4180 publisher = {Springer},
4184 @inproceedings{fse-2012-24469,
4185 title = {Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes},
4186 author = {Markku-Juhani Olavi Saarinen},
4190 doi = {10.1007/978-3-642-34047-5_13},
4191 publisher = {Springer},
4195 @inproceedings{fse-2012-24470,
4196 title = {A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract)},
4197 author = {Jiqiang Lu},
4201 doi = {10.1007/978-3-642-34047-5_5},
4202 publisher = {Springer},
4206 @inproceedings{fse-2012-24471,
4207 title = {Lapin: An Efficient Authentication Protocol Based on Ring-LPN},
4208 author = {Stefan Heyse and Eike Kiltz and Vadim Lyubashevsky and Christof Paar and Krzysztof Pietrzak},
4212 doi = {10.1007/978-3-642-34047-5_20},
4213 publisher = {Springer},
4217 @inproceedings{fse-2012-24472,
4218 title = {Differential Propagation Analysis of Keccak},
4219 author = {Joan Daemen and Gilles Van Assche},
4223 doi = {10.1007/978-3-642-34047-5_24},
4224 publisher = {Springer},
4228 @inproceedings{fse-2012-24473,
4229 title = {Recursive Diffusion Layers for Block Ciphers and Hash Functions},
4230 author = {Mahdi Sajadieh and Mohammad Dakhilalian and Hamid Mala and Pouyan Sepehrdad},
4234 doi = {10.1007/978-3-642-34047-5_22},
4235 publisher = {Springer},
4239 @inproceedings{fse-2012-24474,
4240 title = {Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family},
4241 author = {Dmitry Khovratovich and Christian Rechberger and Alexandra Savelieva},
4245 doi = {10.1007/978-3-642-34047-5_15},
4246 publisher = {Springer},
4250 @inproceedings{fse-2012-24475,
4251 title = {The Security of Ciphertext Stealing},
4252 author = {Phillip Rogaway and Mark Wooding and Haibin Zhang},
4256 doi = {10.1007/978-3-642-34047-5_11},
4257 publisher = {Springer},
4261 @inproceedings{fse-2012-24476,
4262 title = {Improved Rebound Attack on the Finalist Gr\østl},
4263 author = {Jérémy Jean and María Naya-Plasencia and Thomas Peyrin},
4267 doi = {10.1007/978-3-642-34047-5_7},
4268 publisher = {Springer},
4272 @inproceedings{fse-2012-24477,
4273 title = {UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX},
4274 author = {Vesselin Velichkov and Nicky Mouha and Christophe De Cannière and Bart Preneel},
4278 doi = {10.1007/978-3-642-34047-5_17},
4279 publisher = {Springer},
4283 @inproceedings{fse-2012-24478,
4284 title = {(Pseudo) Preimage Attack on Round-Reduced Gr\østl Hash Function and Others},
4285 author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou},
4289 doi = {10.1007/978-3-642-34047-5_8},
4290 publisher = {Springer},
4294 @inproceedings{fse-2012-24479,
4295 title = {Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128},
4296 author = {Florian Mendel and Tomislav Nad and Martin Schläffer},
4300 doi = {10.1007/978-3-642-34047-5_14},
4301 publisher = {Springer},
4305 @inproceedings{fse-2012-24480,
4306 title = {Practical Cryptanalysis of ARMADILLO2},
4307 author = {María Naya-Plasencia and Thomas Peyrin},
4311 doi = {10.1007/978-3-642-34047-5_9},
4312 publisher = {Springer},
4316 @inproceedings{fse-2012-24481,
4317 title = {Unaligned Rebound Attack: Application to Keccak},
4318 author = {Alexandre Duc and Jian Guo and Thomas Peyrin and Lei Wei 0001},
4322 doi = {10.1007/978-3-642-34047-5_23},
4323 publisher = {Springer},
4327 @inproceedings{fse-2012-24482,
4328 title = {A Model for Structure Attacks, with Applications to PRESENT and Serpent},
4329 author = {Meiqin Wang and Yue Sun and Elmar Tischhauser and Bart Preneel},
4333 doi = {10.1007/978-3-642-34047-5_4},
4334 publisher = {Springer},
4338 @inproceedings{fse-2012-24483,
4339 title = {Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication},
4340 author = {Long Hoang Nguyen and A. W. Roscoe},
4344 doi = {10.1007/978-3-642-34047-5_19},
4345 publisher = {Springer},
4349 @inproceedings{pkc-2012-24337,
4350 title = {Public-Key Identification Schemes Based on Multivariate Cubic Polynomials},
4351 author = {Koichi Sakumoto},
4352 booktitle = {Public Key Cryptography - PKC 2012},
4355 doi = {10.1007/978-3-642-30057-8_11},
4356 publisher = {Springer},
4357 series = {Lecture Notes in Computer Science},
4361 @inproceedings{pkc-2012-24338,
4362 title = {The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles},
4363 author = {Qiong Huang and Duncan S. Wong and Willy Susilo},
4364 booktitle = {Public Key Cryptography - PKC 2012},
4367 doi = {10.1007/978-3-642-30057-8_8},
4368 publisher = {Springer},
4369 series = {Lecture Notes in Computer Science},
4373 @inproceedings{pkc-2012-24339,
4374 title = {On Definitions of Selective Opening Security},
4375 author = {Florian Böhl and Dennis Hofheinz and Daniel Kraschewski},
4376 booktitle = {Public Key Cryptography - PKC 2012},
4379 doi = {10.1007/978-3-642-30057-8_31},
4380 publisher = {Springer},
4381 series = {Lecture Notes in Computer Science},
4385 @inproceedings{pkc-2012-24340,
4386 title = {Generating Provable Primes Efficiently on Embedded Devices},
4387 author = {Christophe Clavier and Benoit Feix and Loïc Thierry and Pascal Paillier},
4388 booktitle = {Public Key Cryptography - PKC 2012},
4391 doi = {10.1007/978-3-642-30057-8_22},
4392 publisher = {Springer},
4393 series = {Lecture Notes in Computer Science},
4397 @inproceedings{pkc-2012-24341,
4398 title = {Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices},
4399 author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee},
4400 booktitle = {Public Key Cryptography - PKC 2012},
4403 doi = {10.1007/978-3-642-30057-8_17},
4404 publisher = {Springer},
4405 series = {Lecture Notes in Computer Science},
4409 @inproceedings{pkc-2012-24342,
4410 title = {Multi-location Leakage Resilient Cryptography},
4411 author = {Ali Juma and Yevgeniy Vahlis and Moti Yung},
4412 booktitle = {Public Key Cryptography - PKC 2012},
4415 doi = {10.1007/978-3-642-30057-8_30},
4416 publisher = {Springer},
4417 series = {Lecture Notes in Computer Science},
4421 @inproceedings{pkc-2012-24343,
4422 title = {Strong Security from Probabilistic Signature Schemes},
4423 author = {Sven Schäge},
4424 booktitle = {Public Key Cryptography - PKC 2012},
4427 doi = {10.1007/978-3-642-30057-8_6},
4428 publisher = {Springer},
4429 series = {Lecture Notes in Computer Science},
4433 @inproceedings{pkc-2012-24344,
4434 title = {Polly Cracker, Revisited, Revisited},
4435 author = {Gottfried Herold},
4436 booktitle = {Public Key Cryptography - PKC 2012},
4439 doi = {10.1007/978-3-642-30057-8_2},
4440 publisher = {Springer},
4441 series = {Lecture Notes in Computer Science},
4445 @inproceedings{pkc-2012-24345,
4446 title = {Constant-Round Multi-party Private Set Union Using Reversed Laurent Series},
4447 author = {Jae Hong Seo and Jung Hee Cheon and Jonathan Katz},
4448 booktitle = {Public Key Cryptography - PKC 2012},
4451 doi = {10.1007/978-3-642-30057-8_24},
4452 publisher = {Springer},
4453 series = {Lecture Notes in Computer Science},
4457 @inproceedings{pkc-2012-24346,
4458 title = {New Definitions and Separations for Circular Security},
4459 author = {David Cash and Matthew Green and Susan Hohenberger},
4460 booktitle = {Public Key Cryptography - PKC 2012},
4463 doi = {10.1007/978-3-642-30057-8_32},
4464 publisher = {Springer},
4465 series = {Lecture Notes in Computer Science},
4469 @inproceedings{pkc-2012-24347,
4470 title = {From Selective to Full Security: Semi-generic Transformations in the Standard Model},
4471 author = {Michel Abdalla and Dario Fiore and Vadim Lyubashevsky},
4472 booktitle = {Public Key Cryptography - PKC 2012},
4475 doi = {10.1007/978-3-642-30057-8_19},
4476 publisher = {Springer},
4477 series = {Lecture Notes in Computer Science},
4481 @inproceedings{pkc-2012-24348,
4482 title = {Space Efficient Signature Schemes from the RSA Assumption},
4483 author = {Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro},
4484 booktitle = {Public Key Cryptography - PKC 2012},
4487 doi = {10.1007/978-3-642-30057-8_7},
4488 publisher = {Springer},
4489 series = {Lecture Notes in Computer Science},
4493 @inproceedings{pkc-2012-24349,
4494 title = {Public Key Encryption against Related Key Attacks},
4495 author = {Hoeteck Wee},
4496 booktitle = {Public Key Cryptography - PKC 2012},
4499 doi = {10.1007/978-3-642-30057-8_16},
4500 publisher = {Springer},
4501 series = {Lecture Notes in Computer Science},
4505 @inproceedings{pkc-2012-24350,
4506 title = {DDH-Like Assumptions Based on Extension Rings},
4507 author = {Ronald Cramer and Ivan Damgård and Eike Kiltz and Sarah Zakarias and Angela Zottarel},
4508 booktitle = {Public Key Cryptography - PKC 2012},
4511 doi = {10.1007/978-3-642-30057-8_38},
4512 publisher = {Springer},
4513 series = {Lecture Notes in Computer Science},
4517 @inproceedings{pkc-2012-24351,
4518 title = {NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model},
4519 author = {Ron Steinfeld and San Ling and Josef Pieprzyk and Christophe Tartary and Huaxiong Wang},
4520 booktitle = {Public Key Cryptography - PKC 2012},
4523 doi = {10.1007/978-3-642-30057-8_21},
4524 publisher = {Springer},
4525 series = {Lecture Notes in Computer Science},
4529 @inproceedings{pkc-2012-24352,
4530 title = {Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods},
4531 author = {Aurélie Bauer and Damien Vergnaud and Jean-Christophe Zapalowicz},
4532 booktitle = {Public Key Cryptography - PKC 2012},
4535 doi = {10.1007/978-3-642-30057-8_36},
4536 publisher = {Springer},
4537 series = {Lecture Notes in Computer Science},
4541 @inproceedings{pkc-2012-24353,
4542 title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices},
4543 author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama},
4544 booktitle = {Public Key Cryptography - PKC 2012},
4547 doi = {10.1007/978-3-642-30057-8_28},
4548 publisher = {Springer},
4549 series = {Lecture Notes in Computer Science},
4553 @inproceedings{pkc-2012-24354,
4554 title = {Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies},
4555 author = {Emil Stefanov and Elaine Shi and Dawn Song},
4556 booktitle = {Public Key Cryptography - PKC 2012},
4559 doi = {10.1007/978-3-642-30057-8_25},
4560 publisher = {Springer},
4561 series = {Lecture Notes in Computer Science},
4565 @inproceedings{pkc-2012-24355,
4566 title = {Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts},
4567 author = {Nelly Fazio and Irippuge Milinda Perera},
4568 booktitle = {Public Key Cryptography - PKC 2012},
4571 doi = {10.1007/978-3-642-30057-8_14},
4572 publisher = {Springer},
4573 series = {Lecture Notes in Computer Science},
4577 @inproceedings{pkc-2012-24356,
4578 title = {Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication},
4579 author = {Shota Yamada and Nuttapong Attrapadung and Bagus Santoso and Jacob C. N. Schuldt and Goichiro Hanaoka and Noboru Kunihiro},
4580 booktitle = {Public Key Cryptography - PKC 2012},
4583 doi = {10.1007/978-3-642-30057-8_15},
4584 publisher = {Springer},
4585 series = {Lecture Notes in Computer Science},
4589 @inproceedings{pkc-2012-24357,
4590 title = {Correlated Product Security from Any One-Way Function},
4591 author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky},
4592 booktitle = {Public Key Cryptography - PKC 2012},
4595 doi = {10.1007/978-3-642-30057-8_33},
4596 publisher = {Springer},
4597 series = {Lecture Notes in Computer Science},
4601 @inproceedings{pkc-2012-24358,
4602 title = {Password-Based Authenticated Key Exchange},
4603 author = {David Pointcheval},
4604 booktitle = {Public Key Cryptography - PKC 2012},
4607 doi = {10.1007/978-3-642-30057-8_23},
4608 publisher = {Springer},
4609 series = {Lecture Notes in Computer Science},
4613 @inproceedings{pkc-2012-24359,
4614 title = {Waters Signatures with Optimal Security Reduction},
4615 author = {Dennis Hofheinz and Tibor Jager and Edward Knapp},
4616 booktitle = {Public Key Cryptography - PKC 2012},
4619 doi = {10.1007/978-3-642-30057-8_5},
4620 publisher = {Springer},
4621 series = {Lecture Notes in Computer Science},
4625 @inproceedings{pkc-2012-24360,
4626 title = {Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)},
4627 author = {Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar},
4628 booktitle = {Public Key Cryptography - PKC 2012},
4631 doi = {10.1007/978-3-642-30057-8_18},
4632 publisher = {Springer},
4633 series = {Lecture Notes in Computer Science},
4637 @inproceedings{pkc-2012-24361,
4638 title = {Ring-LWE in Polynomial Rings},
4639 author = {Léo Ducas and Alain Durmus},
4640 booktitle = {Public Key Cryptography - PKC 2012},
4643 doi = {10.1007/978-3-642-30057-8_3},
4644 publisher = {Springer},
4645 series = {Lecture Notes in Computer Science},
4649 @inproceedings{pkc-2012-24362,
4650 title = {Extended-DDH and Lossy Trapdoor Functions},
4651 author = {Brett Hemenway and Rafail Ostrovsky},
4652 booktitle = {Public Key Cryptography - PKC 2012},
4655 doi = {10.1007/978-3-642-30057-8_37},
4656 publisher = {Springer},
4657 series = {Lecture Notes in Computer Science},
4661 @inproceedings{pkc-2012-24363,
4662 title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking},
4663 author = {Yusuke Sakai and Jacob C. N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta},
4664 booktitle = {Public Key Cryptography - PKC 2012},
4667 doi = {10.1007/978-3-642-30057-8_42},
4668 publisher = {Springer},
4669 series = {Lecture Notes in Computer Science},
4673 @inproceedings{pkc-2012-24364,
4674 title = {Solving Underdetermined Systems of Multivariate Quadratic Equations Revisited},
4675 author = {Enrico Thomae and Christopher Wolf},
4676 booktitle = {Public Key Cryptography - PKC 2012},
4679 doi = {10.1007/978-3-642-30057-8_10},
4680 publisher = {Springer},
4681 series = {Lecture Notes in Computer Science},
4685 @inproceedings{pkc-2012-24365,
4686 title = {Better Bootstrapping in Fully Homomorphic Encryption},
4687 author = {Craig Gentry and Shai Halevi and Nigel P. Smart},
4688 booktitle = {Public Key Cryptography - PKC 2012},
4691 doi = {10.1007/978-3-642-30057-8_1},
4692 publisher = {Springer},
4693 series = {Lecture Notes in Computer Science},
4697 @inproceedings{pkc-2012-24366,
4698 title = {Security of Blind Signatures Revisited},
4699 author = {Dominique Schröder and Dominique Unruh},
4700 booktitle = {Public Key Cryptography - PKC 2012},
4703 doi = {10.1007/978-3-642-30057-8_39},
4704 publisher = {Springer},
4705 series = {Lecture Notes in Computer Science},
4709 @inproceedings{pkc-2012-24367,
4710 title = {Efficient Password Authenticated Key Exchange via Oblivious Transfer},
4711 author = {Ran Canetti and Dana Dachman-Soled and Vinod Vaikuntanathan and Hoeteck Wee},
4712 booktitle = {Public Key Cryptography - PKC 2012},
4715 doi = {10.1007/978-3-642-30057-8_27},
4716 publisher = {Springer},
4717 series = {Lecture Notes in Computer Science},
4721 @inproceedings{pkc-2012-24368,
4722 title = {Public-Key Cryptography from New Multivariate Quadratic Assumptions},
4723 author = {Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang},
4724 booktitle = {Public Key Cryptography - PKC 2012},
4727 doi = {10.1007/978-3-642-30057-8_12},
4728 publisher = {Springer},
4729 series = {Lecture Notes in Computer Science},
4733 @inproceedings{pkc-2012-24369,
4734 title = {On Homomorphic Encryption and Chosen-Ciphertext Security},
4735 author = {Brett Hemenway and Rafail Ostrovsky},
4736 booktitle = {Public Key Cryptography - PKC 2012},
4739 doi = {10.1007/978-3-642-30057-8_4},
4740 publisher = {Springer},
4741 series = {Lecture Notes in Computer Science},
4745 @inproceedings{pkc-2012-24370,
4746 title = {Efficiently Shuffling in Public},
4747 author = {Udaya Parampalli and Kim Ramchen and Vanessa Teague},
4748 booktitle = {Public Key Cryptography - PKC 2012},
4751 doi = {10.1007/978-3-642-30057-8_26},
4752 publisher = {Springer},
4753 series = {Lecture Notes in Computer Science},
4757 @inproceedings{pkc-2012-24371,
4758 title = {Improved Security for Linearly Homomorphic Signatures: A Generic Framework},
4759 author = {David Mandell Freeman},
4760 booktitle = {Public Key Cryptography - PKC 2012},
4763 doi = {10.1007/978-3-642-30057-8_41},
4764 publisher = {Springer},
4765 series = {Lecture Notes in Computer Science},
4769 @inproceedings{pkc-2012-24372,
4770 title = {Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve},
4771 author = {Yumi Sakemi and Goichiro Hanaoka and Tetsuya Izu and Masahiko Takenaka and Masaya Yasuda},
4772 booktitle = {Public Key Cryptography - PKC 2012},
4775 doi = {10.1007/978-3-642-30057-8_35},
4776 publisher = {Springer},
4777 series = {Lecture Notes in Computer Science},
4781 @inproceedings{pkc-2012-24373,
4782 title = {Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms},
4783 author = {Takahiro Matsuda 0002 and Goichiro Hanaoka and Kanta Matsuura},
4784 booktitle = {Public Key Cryptography - PKC 2012},
4787 doi = {10.1007/978-3-642-30057-8_34},
4788 publisher = {Springer},
4789 series = {Lecture Notes in Computer Science},
4793 @inproceedings{pkc-2012-24374,
4794 title = {Circular and KDM Security for Identity-Based Encryption},
4795 author = {Jacob Alperin-Sheriff and Chris Peikert},
4796 booktitle = {Public Key Cryptography - PKC 2012},
4799 doi = {10.1007/978-3-642-30057-8_20},
4800 publisher = {Springer},
4801 series = {Lecture Notes in Computer Science},
4805 @inproceedings{pkc-2012-24375,
4806 title = {Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes},
4807 author = {Pierre-Louis Cayrel and Gerhard Hoffmann and Edoardo Persichetti},
4808 booktitle = {Public Key Cryptography - PKC 2012},
4811 doi = {10.1007/978-3-642-30057-8_9},
4812 publisher = {Springer},
4813 series = {Lecture Notes in Computer Science},
4817 @inproceedings{pkc-2012-24376,
4818 title = {Efficient Network Coding Signatures in the Standard Model},
4819 author = {Dario Catalano and Dario Fiore and Bogdan Warinschi},
4820 booktitle = {Public Key Cryptography - PKC 2012},
4823 doi = {10.1007/978-3-642-30057-8_40},
4824 publisher = {Springer},
4825 series = {Lecture Notes in Computer Science},
4829 @inproceedings{pkc-2012-24377,
4830 title = {Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model},
4831 author = {Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia},
4832 booktitle = {Public Key Cryptography - PKC 2012},
4835 doi = {10.1007/978-3-642-30057-8_13},
4836 publisher = {Springer},
4837 series = {Lecture Notes in Computer Science},
4841 @inproceedings{pkc-2012-24378,
4842 title = {Relatively-Sound NIZKs and Password-Based Key-Exchange},
4843 author = {Charanjit S. Jutla and Arnab Roy},
4844 booktitle = {Public Key Cryptography - PKC 2012},
4847 doi = {10.1007/978-3-642-30057-8_29},
4848 publisher = {Springer},
4849 series = {Lecture Notes in Computer Science},
4853 @proceedings{pkc-2012-24778,
4854 title = {Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings},
4857 doi = {10.1007/978-3-642-30057-8},
4858 publisher = {Springer},
4862 @inproceedings{tcc-2012-24204,
4863 title = {On the Security of the 'Free-XOR' Technique},
4864 author = {Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Hong-Sheng Zhou},
4865 booktitle = {Theory of Cryptography},
4868 doi = {10.1007/978-3-642-28914-9_3},
4869 publisher = {Springer},
4870 series = {Lecture Notes in Computer Science},
4874 @inproceedings{tcc-2012-24205,
4875 title = {On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction},
4876 author = {Avradip Mandal and Jacques Patarin and Yannick Seurin},
4877 booktitle = {Theory of Cryptography},
4880 doi = {10.1007/978-3-642-28914-9_16},
4881 publisher = {Springer},
4882 series = {Lecture Notes in Computer Science},
4886 @inproceedings{tcc-2012-24206,
4887 title = {Computational Extractors and Pseudorandomness},
4888 author = {Dana Dachman-Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin},
4889 booktitle = {Theory of Cryptography},
4892 doi = {10.1007/978-3-642-28914-9_22},
4893 publisher = {Springer},
4894 series = {Lecture Notes in Computer Science},
4898 @inproceedings{tcc-2012-24207,
4899 title = {How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption},
4900 author = {Bryan Parno and Mariana Raykova and Vinod Vaikuntanathan},
4901 booktitle = {Theory of Cryptography},
4904 doi = {10.1007/978-3-642-28914-9_24},
4905 publisher = {Springer},
4906 series = {Lecture Notes in Computer Science},
4910 @inproceedings{tcc-2012-24208,
4911 title = {Point Obfuscation and 3-Round Zero-Knowledge},
4912 author = {Nir Bitansky and Omer Paneth},
4913 booktitle = {Theory of Cryptography},
4916 doi = {10.1007/978-3-642-28914-9_11},
4917 publisher = {Springer},
4918 series = {Lecture Notes in Computer Science},
4922 @inproceedings{tcc-2012-24209,
4923 title = {Leakage-Resilient Circuits without Computational Assumptions},
4924 author = {Stefan Dziembowski and Sebastian Faust},
4925 booktitle = {Theory of Cryptography},
4928 doi = {10.1007/978-3-642-28914-9_13},
4929 publisher = {Springer},
4930 series = {Lecture Notes in Computer Science},
4934 @inproceedings{tcc-2012-24210,
4935 title = {Identifying Cheaters without an Honest Majority},
4936 author = {Yuval Ishai and Rafail Ostrovsky and Hakan Seyalioglu},
4937 booktitle = {Theory of Cryptography},
4940 doi = {10.1007/978-3-642-28914-9_2},
4941 publisher = {Springer},
4942 series = {Lecture Notes in Computer Science},
4946 @inproceedings{tcc-2012-24211,
4947 title = {From Non-adaptive to Adaptive Pseudorandom Functions},
4948 author = {Itay Berman and Iftach Haitner},
4949 booktitle = {Theory of Cryptography},
4952 doi = {10.1007/978-3-642-28914-9_20},
4953 publisher = {Springer},
4954 series = {Lecture Notes in Computer Science},
4958 @inproceedings{tcc-2012-24212,
4959 title = {On Efficient Zero-Knowledge PCPs},
4960 author = {Yuval Ishai and Mohammad Mahmoody and Amit Sahai},
4961 booktitle = {Theory of Cryptography},
4964 doi = {10.1007/978-3-642-28914-9_9},
4965 publisher = {Springer},
4966 series = {Lecture Notes in Computer Science},
4970 @inproceedings{tcc-2012-24213,
4971 title = {Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures},
4972 author = {Jae Hong Seo and Jung Hee Cheon},
4973 booktitle = {Theory of Cryptography},
4976 doi = {10.1007/978-3-642-28914-9_8},
4977 publisher = {Springer},
4978 series = {Lecture Notes in Computer Science},
4982 @inproceedings{tcc-2012-24214,
4983 title = {On the Instantiability of Hash-and-Sign RSA Signatures},
4984 author = {Yevgeniy Dodis and Iftach Haitner and Aris Tentes},
4985 booktitle = {Theory of Cryptography},
4988 doi = {10.1007/978-3-642-28914-9_7},
4989 publisher = {Springer},
4990 series = {Lecture Notes in Computer Science},