


default search action
37th EUROCRYPT 2019: Darmstadt, Germany - Part II
- Yuval Ishai, Vincent Rijmen:

Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11477, Springer 2019, ISBN 978-3-030-17655-6
Homomorphic Primitives
- Elette Boyle, Lisa Kohl, Peter Scholl:

Homomorphic Secret Sharing from Lattices Without FHE. 3-33 - Hao Chen

, Ilaria Chillotti
, Yongsoo Song
:
Improved Bootstrapping for Approximate Homomorphic Encryption. 34-54 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:

Minicrypt Primitives with Algebraic Structure and Applications. 55-82
Standards
- Viet Tung Hoang

, David Miller, Ni Trieu:
Attacks only Get Better: How to Break FF3 on Large Domains. 85-116 - Nimrod Aviram, Kai Gellert

, Tibor Jager:
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT. 117-150 - Joanne Woodage, Dan Shumow:

An Analysis of NIST SP 800-90A. 151-180
Searchable Encryption and ORAM
- Seny Kamara, Tarik Moataz:

Computationally Volume-Hiding Structured Encryption. 183-213 - Gilad Asharov

, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass
, Ling Ren, Elaine Shi:
Locality-Preserving Oblivious RAM. 214-243 - Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs:

Private Anonymous Data Access. 244-273
Proofs of Work and Space
- Hamza Abusalah

, Chethan Kamath
, Karen Klein
, Krzysztof Pietrzak, Michael Walter
:
Reversible Proofs of Sequential Work. 277-291 - Nico Döttling, Russell W. F. Lai

, Giulio Malavolta
:
Incremental Proofs of Sequential Work. 292-323 - Ben Fisch:

Tight Proofs of Space and Replication. 324-348
Secure Computation
- Arka Rai Choudhuri

, Vipul Goyal, Abhishek Jain:
Founding Secure Computation on Blockchains. 351-380 - Navneet Agarwal, Sanat Anand, Manoj Prabhakaran:

Uncovering Algebraic Structures in the MPC Landscape. 381-406
Quantum I
- Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny:

Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies. 409-441 - Divesh Aggarwal, Kai-Min Chung

, Han-Hsuan Lin
, Thomas Vidick:
A Quantum-Proof Non-malleable Extractor - With Application to Privacy Amplification Against Active Quantum Adversaries. 442-469
Secure Computation and NIZK
- Geoffroy Couteau

:
A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model. 473-503 - Benny Applebaum, Zvika Brakerski, Rotem Tsabary:

Degree 2 is Complete for the Round-Complexity of Malicious MPC. 504-531 - Prabhanjan Ananth, Arka Rai Choudhuri

, Aarushi Goel, Abhishek Jain:
Two Round Information-Theoretic MPC with Malicious Security. 532-561 - Geoffroy Couteau

, Dennis Hofheinz:
Designated-Verifier Pseudorandom Generators, and Their Applications. 562-592 - Willy Quach, Ron D. Rothblum, Daniel Wichs:

Reusable Designated-Verifier NIZKs for all NP from CDH. 593-621 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:

Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. 622-651
Lattice-Based Cryptography
- Nicholas Genise

, Daniele Micciancio
, Yuriy Polyakov
:
Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More. 655-684 - Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé:

Approx-SVP in Ideal Lattices with Pre-processing. 685-716 - Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova

, Eamonn W. Postlethwaite
, Marc Stevens
:
The General Sieve Kernel and New Records in Lattice Reduction. 717-746 - Ciprian Baetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay:

Misuse Attacks on Post-quantum Cryptosystems. 747-776

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














