


default search action
37th EUROCRYPT 2018: Tel Aviv, Israel - Part I
- Jesper Buus Nielsen, Vincent Rijmen:

Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I. Lecture Notes in Computer Science 10820, Springer 2018, ISBN 978-3-319-78380-2
Foundations
- Daniele Micciancio

, Michael Walter
:
On the Bit Security of Cryptographic Primitives. 3-28 - Sebastian Berndt, Maciej Liskiewicz:

On the Gold Standard for Security of Universal Steganography. 29-60 - Yuyu Wang

, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Memory Lower Bounds of Reductions Revisited. 61-90 - Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum:

Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. 91-122
Lattices
- Léo Ducas:

Shortest Vector from Lattice Sieving: A Few Dimensions for Free. 125-145 - Miruna Rosca, Damien Stehlé, Alexandre Wallet

:
On the Ring-LWE and Polynomial-LWE Problems. 146-173 - Nicholas Genise, Daniele Micciancio

:
Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus. 174-203 - Vadim Lyubashevsky, Gregor Seiler:

Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs. 204-224
Random Oracle Model
- Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:

Random Oracles and Non-uniformity. 227-258 - Ilan Komargodski, Eylon Yogev:

Another Step Towards Realizing Random Oracles: Non-malleable Point Obfuscation. 259-279 - Jan Camenisch

, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven:
The Wonderful World of Global Random Oracles. 280-312
Fully Homomorphic Encryption
- Hao Chen, Kyoohyung Han:

Homomorphic Lower Digits Removal and Improved FHE Bootstrapping. 315-337 - Wouter Castryck

, Ilia Iliashenko
, Frederik Vercauteren
:
Homomorphic SIM ^2 D Operations: Single Instruction Much More Data. 338-359 - Jung Hee Cheon, Kyoohyung Han

, Andrey Kim, Miran Kim
, Yongsoo Song
:
Bootstrapping for Approximate Homomorphic Encryption. 360-384
Permutations
- Srimanta Bhattacharya, Mridul Nandi

:
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the \chi ^2 Method. 387-412 - Itai Dinur:

An Improved Affine Equivalence Algorithm for Random Permutations. 413-442
Galois Counter Mode
- Atul Luykx, Bart Preneel

:
Optimal Forgeries Against Polynomial-Based MACs and GCM. 445-467 - Priyanka Bose, Viet Tung Hoang, Stefano Tessaro:

Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds. 468-499
Attribute-Based Encryption
- Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee:

Unbounded ABE via Bilinear Entropy Expansion, Revisited. 503-534 - Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan:

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions. 535-564
Secret Sharing
- Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:

Towards Breaking the Exponential Barrier for General Secret Sharing. 567-596 - Oriol Farràs

, Tarik Kaced, Sebastià Martín Molleví, Carles Padró:
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing. 597-621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














