


default search action
40th CRYPTO 2020: Santa Barbara, CA, USA - Part I
- Daniele Micciancio

, Thomas Ristenpart
:
Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12170, Springer 2020, ISBN 978-3-030-56783-5
Security Models
- Joseph Jaeger

, Nirvan Tyagi
:
Handling Adaptive Compromise for Practical Encryption Schemes. 3-32 - Daniel Jost

, Ueli Maurer:
Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees. 33-62 - Mark Zhandry

, Cong Zhang:
Indifferentiability for Public Key Cryptosystems. 63-93 - Christopher Patton, Thomas Shrimpton:

Quantifying the Security Cost of Migrating Protocols to Practice. 94-124
Symmetric and Real World Cryptography
- Ashrujit Ghoshal

, Joseph Jaeger
, Stefano Tessaro:
The Memory-Tightness of Authenticated Encryption. 127-156 - Akshima, David Cash, Andrew Drucker, Hoeteck Wee:

Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions. 157-186 - Aldo Gunsing, Bart Mennink:

The Summation-Truncation Hybrid: Reusing Discarded Bits for Free. 187-217 - Viet Tung Hoang, Yaobin Shen:

Security Analysis of NIST CTR-DRBG. 218-247 - Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:

Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. 248-277 - Michel Abdalla

, Manuel Barbosa
, Tatiana Bradley
, Stanislaw Jarecki
, Jonathan Katz, Jiayu Xu
:
Universally Composable Relaxed Password Authenticated Key Exchange. 278-307 - Ben Kreuter, Tancrède Lepoint, Michele Orrù

, Mariana Raykova:
Anonymous Tokens with Private Metadata Bit. 308-336
Hardware Security and Leakage Resilience
- Sonia Belaïd, Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Abdul Rahman Taleb:

Random Probing Security: Verification, Composition, Expansion and New Constructions. 339-368 - Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert

:
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle. 369-400 - Xin Li, Fermi Ma, Willy Quach, Daniel Wichs:

Leakage-Resilient Key Exchange and Two-Seed Extractors. 401-429
Outsourced Encryption
- Sarvar Patel, Giuseppe Persiano

, Kevin Yeo:
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model. 433-463 - Colin Boyd, Gareth T. Davies

, Kristian Gjøsteen, Yao Jiang
:
Fast and Secure Updatable Encryption. 464-493 - Tal Moran, Daniel Wichs:

Incompressible Encodings. 494-523
Constructions
- Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:

New Constructions of Hinting PRGs, OWFs with Encryption, and More. 527-558 - Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:

Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. 559-589 - Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:

Collusion Resistant Watermarkable PRFs from Standard Assumptions. 590-620 - Rishab Goyal, Satyanarayana Vusirikala:

Verifiable Registration-Based Encryption. 621-651 - Mark Zhandry

:
New Techniques for Traitor Tracing: Size N1/3 and More from Pairings. 652-682
Public Key Cryptography
- Michel Abdalla

, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. 685-716 - Aayush Jain, Alexis Korb

, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. 717-746 - Jérémy Chotard, Edouard Dufour-Sans, Romain Gay

, Duong Hieu Phan
, David Pointcheval:
Dynamic Decentralized Functional Encryption. 747-775 - Ohad Barta, Yuval Ishai, Rafail Ostrovsky, David J. Wu:

On Succinct Arguments and Witness Encryption from Groups. 776-806 - Ran Canetti, Sunoo Park, Oxana Poburinnaya:

Fully Deniable Interactive Encryption. 807-835 - Susan Hohenberger, Venkata Koppula, Brent Waters:

Chosen Ciphertext Security from Injective Trapdoor Functions. 836-866

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














