


default search action
37th EUROCRYPT 2019: Darmstadt, Germany - Part III
- Yuval Ishai, Vincent Rijmen:

Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11478, Springer 2019, ISBN 978-3-030-17658-7
Foundations I
- Mark Zhandry

:
On ELFs, Deterministic Encryption, and Correlated-Input Security. 3-32 - Sanjam Garg, Romain Gay

, Mohammad Hajiabadi:
New Techniques for Efficient Trapdoor Functions and Applications. 33-63 - Daniele Micciancio

:
Symbolic Encryption with Pseudorandom Keys. 64-93
Efficient Secure Computation
- Cheng Hong

, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, Xiao Wang
:
Covert Security with Public Verifiability: Faster, Leaner, and Simpler. 97-121 - Benny Pinkas, Thomas Schneider

, Oleksandr Tkachenko
, Avishay Yanai:
Efficient Circuit-Based PSI with Linear Communication. 122-153 - Satrajit Ghosh, Tobias Nilges:

An Algebraic Approach to Maliciously Secure Private Set Intersection. 154-185
Quantum II
- Qipeng Liu, Mark Zhandry

:
On Finding Quantum Multi-collisions. 189-218 - Dorit Aharonov, Zvika Brakerski, Kai-Min Chung

, Ayal Green, Ching-Yi Lai
, Or Sattath
:
On Quantum Advantage in Information Theoretic Single-Server PIR. 219-246 - Andrea Coladangelo

, Alex Bredariol Grilo, Stacey Jeffery
, Thomas Vidick
:
Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources. 247-277
Signatures I
- Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:

Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. 281-311 - Shuichi Katsumata, Shota Yamada:

Group Signatures Without NIZK: From Lattices in the Standard Model. 312-344 - Eduard Hauck, Eike Kiltz

, Julian Loss:
A Modular Treatment of Blind Signatures from Identification Schemes. 345-375
Best Paper Awards
- Benjamin Wesolowski:

Efficient Verifiable Delay Functions. 379-407 - Mark Zhandry

:
Quantum Lightning Never Strikes the Same State Twice. 408-438
Information-Theoretic Cryptography
- Benny Applebaum, Amos Beimel

, Oriol Farràs
, Oded Nir, Naty Peter:
Secret-Sharing Schemes for General and Uniform Access Structures. 441-471 - Serge Fehr, Chen Yuan:

Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary. 472-499 - Jiaxin Guan, Mark Zhandry:

Simple Schemes in the Bounded Storage Model. 500-524
Cryptanalysis
- Gaëtan Leurent, Thomas Peyrin

:
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1. 527-555 - Ting Li, Yao Sun:

Preimage Attacks on Round-Reduced Keccak-224/256 via an Allocating Approach. 556-584 - Anne Canteaut, Virginie Lallemand, Gregor Leander

, Patrick Neumann
, Friedrich Wiemer
:
bison Instantiating the Whitened Swap-Or-Not Construction. 585-616
Foundations II
- Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs:

Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing. 619-635 - James Bartusek

, Tancrède Lepoint, Fermi Ma, Mark Zhandry
:
New Techniques for Obfuscating Conjunctions. 636-666 - Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev:

Distributional Collision Resistance Beyond One-Way Functions. 667-695
Signatures II
- Itai Dinur, Niv Nadler:

Multi-target Attacks on the Picnic Signature Scheme and Related Protocols. 699-727 - Nicolas Aragon, Olivier Blazy

, Philippe Gaborit, Adrien Hauteville, Gilles Zémor:
Durandal: A Rank Metric Based Signature Scheme. 728-758 - Luca De Feo

, Steven D. Galbraith
:
SeaSign: Compact Isogeny Signatures from Class Group Actions. 759-789

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














