Last update:
Wed Oct 8 06:48:36 MDT 2025
E. F. Brickell Editorial . . . . . . . . . . . . . . . 1--2
Burton S. Kaliski, Jr. and
Ronald L. Rivest and
Alan T. Sherman Is the Data Encryption Standard a Group?
(Results of Cycling Experiments on DES) 3--36
D. R. Stinson Some Constructions and Bounds for
Authentication Codes . . . . . . . . . . 37--52 (or 37--51??)
Pierre Beauchemin and
Gilles Brassard and
Claude Crépeau and
Claude Goutier and
Carl Pomerance The Generation of Random Numbers that
Are Probably Prime . . . . . . . . . . . 53--64
David Chaum The Dining Cryptographers Problem:
Unconditional Sender and Recipient
Untraceability . . . . . . . . . . . . . 65--75
Uriel Feige and
Amos Fiat and
Adi Shamir Zero-knowledge proofs of identity . . . 77--94
Kevin S. McCurley A key distribution system equivalent to
factoring . . . . . . . . . . . . . . . 95--105
Johannes Buchmann and
H. C. Williams A key-exchange system based on imaginary
quadratic fields . . . . . . . . . . . . 107--118
D. R. Stinson A construction for
authentication/secrecy codes from
certain combinatorial designs . . . . . 119--127
Pierre Beauchemin and
Gilles Brassard Generalization of Hellman's extension to
Shannon's approach to cryptography . . . 129--131
Martin Tompa and
Heather Woll How to share a secret with cheaters . . 133--138
Neal Koblitz Hyperelliptic cryptosystems . . . . . . 139--150
Michael Luby and
Charles Rackoff A study of password security . . . . . . 151--158
Willi Meier and
Othmar Staffelbach Fast correlation attacks on certain
stream ciphers . . . . . . . . . . . . . 159--176
Joan Boyar Inferring sequences produced by a linear
congruential generator missing low-order
bits . . . . . . . . . . . . . . . . . . 177--184
Fred Piper and
Michael Walker Linear ciphers and spreads . . . . . . . 185--188
Martin Abadi and
Joan Feigenbaum Secure circuit evaluation. A protocol
based on hiding information from an
oracle . . . . . . . . . . . . . . . . . 1--12
Kazuo Nishimura and
Masaaki Sibuya Probability to meet in the middle . . . 13--22
D. R. Stinson The combinatorics of authentication and
secrecy codes . . . . . . . . . . . . . 23--49
Li Gong and
David J. Wheeler A matrix key-distribution scheme . . . . 51--59
Joan F. Boyar and
Stuart A. Kurtz and
Mark W. Krentel Discrete logarithm implementation of
perfect zero-knowledge blobs . . . . . . 63--76
Gustavus J. Simmons Cartesian product construction for
unconditionally secure authentication
codes that permit arbitration . . . . . 77--104
Harald Niederreiter Combinatorial approach to probabilistic
results on the linear-complexity profile
of random sequences . . . . . . . . . . 105--112
Réjane Forré Methods and instruments for designing
$S$-boxes . . . . . . . . . . . . . . . 115--130
Michael Walker Information-theoretic bounds for
authentication schemes . . . . . . . . . 131--143
Sean Murphy The cryptanalysis of FEAL-$4$ with 20
chosen plaintexts . . . . . . . . . . . 145--154
Chris Mitchell Enumerating Boolean functions of
cryptographic significance . . . . . . . 155--170
Philippe Godlewski and
Chris Mitchell Key-minimal cryptosystems for
unconditional secrecy . . . . . . . . . 1--25
Carlisle Adams and
Stafford Tavares Structured design of cryptographically
good $S$-boxes . . . . . . . . . . . . . 27--41
Ralph C. Merkle A fast software one-way hash function 43--58
T. A. Berson and
R. A. Rueppel Guest Editor's Introduction . . . . . . 61--62
G. B. Agnew and
R. C. Mullin and
I. M. Onyszchuk and
S. A. Vanstone An implementation for a fast public-key
cryptosystem . . . . . . . . . . . . . . 63--79
Klaus Gaarder and
Einar Snekkenes Applying a formal analysis technique to
the CCITT X.509 strong two-way
authentication protocol . . . . . . . . 81--98
Stuart Haber and
W. Scott Stornetta How to time-stamp a digital document . . 99--111
Stephen M. Matyas Key processing with control vectors . . 113--136
Jose Pastor CRYPTOPOST. A cryptographic application
to mail processing . . . . . . . . . . . 137--146
H. W. Lenstra, Jr. On the Chor--Rivest knapsack
cryptosystem . . . . . . . . . . . . . . 149--155
S. Micali and
C. P. Schnorr Efficient, perfect polynomial random
number generators . . . . . . . . . . . 157--172
Marijke De Soete New bounds and constructions for
authentication/secrecy codes with
splitting . . . . . . . . . . . . . . . 173--186
Burton S. Kaliski, Jr. One-way permutations on elliptic curves 187--199
Jovan Dj. Goli\'c and
Miodrag J. Mihaljevi\'c Generalized correlation attack on a
class of stream ciphers based on the
Levenshtein distance . . . . . . . . . . 201--212
E. F. Brickell Editorial Introduction . . . . . . . . . 1--2
Eli Biham and
Adi Shamir Differential cryptanalysis of DES-like
cryptosystems . . . . . . . . . . . . . 3--72
J. Feigenbaum Guest Editor's Introduction . . . . . . 73--73
D. Beaver Secure Multiparty Protocols and
Zero-Knowledge Proof Systems Tolerating
a Faulty Minority . . . . . . . . . . . 75--122
E. F. Brickell and
D. M. Davenport On the Classification of Ideal Secret
Sharing Schemes . . . . . . . . . . . . 123--134
U. M. Maurer and
J. L. Massey Local Randomness in Pseudorandom
Sequences . . . . . . . . . . . . . . . 135--149
M. Naor Bit Commitment Using Pseudorandomness 151--158
C.-P. Schnorr Efficient Signature Generation by Smart
Cards . . . . . . . . . . . . . . . . . 161--174
C. Goutier S. Bengio, G. Brassard, Y. G. Desmedt and
J.-J. Quisquater Secure Implementations of Identification
Systems . . . . . . . . . . . . . . . . 175--183
Joan Boyar and
Katalin Friedl and
Carsten Lund Practical Zero-Knowledge Proofs: Giving
Hints and Using Deficiencies . . . . . . 185--206
Neal Koblitz Elliptic Curve Implementations of
Zero-Knowledge Blobs . . . . . . . . . . 207--213
I. B. Damgård Preface . . . . . . . . . . . . . . . . 1--1
Charles Bennett, H. and
François Bessette and
Gilles Brassard and
Louis Salvail Experimental quantum cryptography . . . 3--28
Ernest F. Brickell and
Kevin S. McCurley Interactive identification scheme based
on discrete logarithms and factoring . . 29--39
Jan-Hendrik Evertse and
Eug\`ene van Heyst Which new RSA-signatures can be computed
from certain given RSA-signatures? . . . 41--52
Ueli M. Maurer Conditionally-perfect secrecy and a
provably-secure randomized cipher . . . 53--66
Willi Meier and
Othmar Staffelbach Correlation properties of combiners with
memory in stream ciphers . . . . . . . . 67--86
Ueli M. Maurer A universal statistical test for random
bit generators . . . . . . . . . . . . . 89--105
Sheelagh Lloyd Counting binary functions with certain
cryptographic properties . . . . . . . . 107--131
Jean Georgiades Some remarks on the security of the
identification scheme based on permuted
kernels . . . . . . . . . . . . . . . . 133--137
J. H. Loxton and
David S. P. Khoo and
Gregory J. Bird and
Jennifer Seberry A cubic RSA code equivalent to
factorization . . . . . . . . . . . . . 139--150
E. F. Brickell and
D. R. Stinson Some improved bounds on the information
rate of perfect secret sharing schemes 153--166
Spyros S. Magliveras and
Nasir D. Memon Algebraic properties of cryptosystem PGM 167--183
Steven J. Phillips and
Nicholas C. Phillips Strongly ideal secret sharing schemes 185--191
Zong Duo Dai Binary sequences derived from
ML-sequences over rings I: Periods and
minimal polynomials . . . . . . . . . . 193--207
G. Brassard Editor's Note . . . . . . . . . . . . . 1--1
G. B. Agnew and
T. Beth and
R. C. Mullin and
S. A. Vanstone Arithmetic operations in $ {\rm
GF}(2^m)$ . . . . . . . . . . . . . . . 3--13
Mitsuru Ito and
Akira Saito and
Takao Nishizeki Multiple assignment scheme for sharing
secret . . . . . . . . . . . . . . . . . 15--20
Oded Goldreich Uniform-Complexity Treatment of
Encryption and Zero-Knowledge . . . . . 21--53
Ueli M. Maurer and
James L. Massey Cascade ciphers: The importance of being
first . . . . . . . . . . . . . . . . . 55--61
Joan Boyar and
Carsten Lund and
René Peralta On the communication complexity of
zero-knowledge proofs . . . . . . . . . 65--85
Benny Chor and
Eyal Kushilevitz Secret sharing over infinite domains . . 87--95
Oded Goldreich and
Eyal Kushilevitz A Perfect Zero-knowledge Proof System
for a Problem Equivalent to the Discrete
Algorithm . . . . . . . . . . . . . . . 97--116
A. W. Schrift and
A. Shamir Universal tests for nonuniform
distributions . . . . . . . . . . . . . 119--133
Ute Rosenbaum Lower bound on authentication after
having observed a sequence of messages 135--156
R. M. Capocelli and
A. De Santis and
L. Gargano and
U. Vaccaro On the size of shares for secret sharing
schemes . . . . . . . . . . . . . . . . 157--167
Don Coppersmith Modifications to the number field sieve 169--180
Glenn Orton and
Lloyd Peppard and
Stafford Tavares Design of a fast pipelined modular
multiplier based on a diminished-radix
algorithm . . . . . . . . . . . . . . . 183--208
Alfred J. Menezes and
Scott A. Vanstone Elliptic curve cryptosystems and their
implementation . . . . . . . . . . . . . 209--224
Arjen K. Lenstra and
Yacov Yacobi User impersonation in key certification
schemes . . . . . . . . . . . . . . . . 225--232
Oded Goldreich and
Yair Oren Definitions and Properties of
Zero-Knowledge Proof Systems . . . . . . 1--32
Andrew Klapper The Vulnerability of Geometric Sequences
Based on Fields of Odd Characteristic 33--51
Benny Chor and
Mihaly Gereb-Graus and
Eyal Kushilevitz On the Structure of the Privacy
Hierarchy . . . . . . . . . . . . . . . 53--60
Sean Murphy and
Kenneth Paterson and
Peter Wild A Weak Cipher that Generates the
Symmetric Group . . . . . . . . . . . . 61--65
G. J. Simmons Proof of soundness (integrity) of
cryptographic protocols . . . . . . . . 69--77
R. Kemmerer and
C. Meadows and
J. Millen Three systems for cryptographic protocol
analysis . . . . . . . . . . . . . . . . 79--130
Luke O'Connor An Analysis of a Class of Algorithms for
$S$-Box Construction . . . . . . . . . . 133--151
Shang-Hua Teng Functional Inversion and Communication
Complexity . . . . . . . . . . . . . . . 153--170
Renate Scheidler and
Johannes A. Buchmann and
Hugh C. Williams A Key-Exchange Protocol Using Real
Quadratic Fields . . . . . . . . . . . . 171--199
Ming Hua Qu and
S. A. Vanstone Factorizations in the Elementary Abelian
$p$-Group and Their Cryptographic
Significance . . . . . . . . . . . . . . 201--212
Luke O'Connor and
Andrew Klapper Algebraic Nonlinearity and Its
Applications to Cryptography . . . . . . 213--227
E. Biham New Types of Cryptanalytic Attacks Using
Related Keys . . . . . . . . . . . . . . 229
D. Davies and
S. Murphy Pairs and Triplets of DES $S$-Boxes . . 1
Kaisa Nyberg and
Lars Ramkilde Knudsen Provable Security Against a Differential
Attack . . . . . . . . . . . . . . . . . 27--37
C. Blundo and
A. De Santis and
D. R. Stinson and
U. Vaccaro Graph Decompositions and Secret Sharing
Schemes . . . . . . . . . . . . . . . . 39--64
L. O'Connor On the Distribution of Characteristics
in Bijective Mappings . . . . . . . . . 67
Alexander Russell Necessary and Sufficient Conditions for
Collision-Free Hashing . . . . . . . . . 87--99
S. A. Vanstone and
R. J. Zuccherato Short RSA Keys and Their Generation . . 101
Yi Xian Yang and
Bao An Guo Further Enumerating Boolean Functions of
Cryptographic Parameters . . . . . . . . 115--122
Ueli M. Maurer Fast Generation of Prime Numbers and
Secure Public-Key Cryptographic
Parameters . . . . . . . . . . . . . . . 123--155
Simon Blackburn and
Sean Murphy and
Jacques Stern The Cryptanalysis of a Public-Key
Implementation of Finite Group Mappings 157--166
D. R. Stinson and
J. L. Massey An Infinite Class of Counterexamples to
a Conjecture Concerning Nonlinear
Resilient Functions . . . . . . . . . . 167--173
Ding Yi Pei Information-Theoretic Bounds for
Authentication Codes and Block Designs 177--188
Martin Dyer and
Trevor Fenner and
Alan Frieze and
Andrew Thomason On Key Storage in Secure Networks . . . 189
I. B. Damgård Practical and Provably Secure Release of
a Secret and Exchange of Signatures . . 201
Howard M. Heys and
Stafford E. Tavares Substitution-Permutation Networks
Resistant to Differential and Linear
Cryptanalysis . . . . . . . . . . . . . 1--19
Ishai Ben-Aroya and
Eli Biham Differential Cryptanalysis of Lucifer 21--34
Shimon Even and
Oded Goldreich and
Silvio Micali On-Line/Off-Line Digital Signatures . . 35--67
Michael J. Fischer and
Rebecca N. Wright Bounds on Secret Key Exchange Using a
Random Deal of Cards . . . . . . . . . . 71--99
Toshiya Itoh and
Masafumi Hoshi and
Shigeo Tsujii A Low Communication Competitive
Interactive Proof System for Promised
Quadratic Residuosity . . . . . . . . . 101--109
Jovan Dj. Golic Correlation Properties of a General
Binary Combiner with Memory . . . . . . 111--126
Claude Crépeau Guest Editor's Introduction . . . . . . 127--128
Alfredo De Santis and
Giuseppe Persiano The Power of Preprocessing in
Zero-Knowledge Proofs of Knowledge . . . 129--148
Mihir Bellare and
Moti Yung Certifying Permutations: Noninteractive
Zero-Knowledge Based on Any Trapdoor
Permutation . . . . . . . . . . . . . . 149--166
Oded Goldreich and
Ariel Kahan How To Construct Constant-Round
Zero-Knowledge Proof Systems for NP . . 167--189
M. J. Fischer and
S. Micali and
C. Rackoff A Secure Protocol for the Oblivious
Transfer (Extended Abstract) . . . . . . 191--195
Russell Impagliazzo and
Moni Naor Efficient Cryptographic Schemes Provably
as Secure as Subset Sum . . . . . . . . 199--216
Matthew Franklin and
Stuart Haber Joint Encryption and Message-Efficient
Secure Computation . . . . . . . . . . . 217--232
Wen-Ai Jackson and
Keith M. Martin and
Christine M. O'Keefe Ideal Secret Sharing Schemes with
Multiple Secrets . . . . . . . . . . . . 233--250
Yenjo Han and
Lane A. Hemaspaandra Pseudorandom Generators and the
Frequency of Simplicity . . . . . . . . 251--261
Peter de Rooij On Schnorr's Preprocessing for Digital
Signature Schemes . . . . . . . . . . . 1--16
D. Beaver and
J. Feigenbaum and
J. Kilian and
P. Rogaway Locally Random Reductions: Improvements
and Applications . . . . . . . . . . . . 17--36
Toshiya Itoh and
Yuji Ohta and
Hiroki Shizuya A Language-Dependent Cryptographic
Primitive . . . . . . . . . . . . . . . 37--49
H. Dobbertin RIPEMD with Two-Round Compress Function
Is Not Collision-Free . . . . . . . . . 51--69
B. S. Kaliski A Chosen Message Attack on Demytko's
Elliptic Curve Cryptosystem . . . . . . 71--72
A. Fiat Batch RSA . . . . . . . . . . . . . . . 75--88
Y. Yacobi and
M. J. Beller Batch Diffie--Hellman Key Agreement
Systems . . . . . . . . . . . . . . . . 89--96
C. Cachin and
U. M. Maurer Linking Information Reconciliation and
Privacy Amplification . . . . . . . . . 97--110
Andrew Klapper and
Mark Goresky Feedback Shift Registers, $2$-Adic Span,
and Combiners with Memory . . . . . . . 111--147
Shimon Even and
Yishay Mansour A Construction of a Cipher from a Single
Pseudorandom Permutation . . . . . . . . 151--161
Ivan B. Damgård and
Torben P. Pedersen and
Birgit Pfitzmann On the Existence of Statistically Hiding
Bit Commitment Schemes and Fail-Stop
Signatures . . . . . . . . . . . . . . . 163--194
Eli Biham and
Alex Biryukov An Improvement of Davies' Attack on DES 195--205
Don Coppersmith and
Jacques Stern and
Serge Vaudenay The Security of the Birational
Permutation Signature Schemes . . . . . 207--221
László Csirmaz The Size of a Share Must Be Large . . . 223--231
Don Coppersmith Small Solutions to Polynomial Equations,
and Low Exponent RSA Vulnerabilities . . 233--260
Wen-Ai Jackson and
Keith M. Martin and
Christine M. O'Keefe Mutually Trusted Authority-Free Secret
Sharing Schemes . . . . . . . . . . . . 261--289
Joe Kilian and
Erez Petrank An Efficient Noninteractive
Zero-Knowledge Proof System for NP with
General Assumptions . . . . . . . . . . 1--27
Kouichi Sakurai and
Hiroki Shizuya A Structural Comparison of the
Computational Difficulty of Breaking
Discrete Log Cryptosystems . . . . . . . 29--43
Eli Biham Cryptanalysis of Multiple Modes of
Operation . . . . . . . . . . . . . . . 45--58
Lars R. Knudsen and
Xuejia Lai and
Bart Preneel Attacks on Fast Double Block Length Hash
Functions . . . . . . . . . . . . . . . 59--72
Jovan Dj. Goli\'c On Matroid Characterization of Ideal
Secret Sharing Schemes . . . . . . . . . 75--86
Moni Naor and
Rafail Ostrovsky and
Ramarathnam Venkatesan and
Moti Yung Perfect Zero-Knowledge Arguments for NP
Using Any One-Way Permutation . . . . . 87--108
R. Scheidler A Public-Key Cryptosystem Using Purely
Cubic Fields . . . . . . . . . . . . . . 109--124
Claus Peter Schnorr and
Serge Vaudenay The Black-Box Model for Cryptographic
Primitives . . . . . . . . . . . . . . . 125--140
R. Balasubramanian and
Neal Koblitz The Improbability That an Elliptic Curve
Has Subexponential Discrete Log Problem
under the Menezes-Okamoto-Vanstone
Algorithm . . . . . . . . . . . . . . . 141--145
Jòrgen Brandt and
Ivan Damgård and
Peter Landrock and
Torben Pedersen Zero-Knowledge Authentication Scheme
with Secret Key Exchange . . . . . . . . 147--159
Antoine Joux and
Jacques Stern Lattice Reduction: a Toolbox for the
Cryptanalyst . . . . . . . . . . . . . . 161--185
Cynthia Dwork and
Moni Naor An Efficient Existentially Unforgeable
Signature Scheme and Its Applications 187--208
Ivan B. Damgård and
Lars R. Knudsen Two-Key Triple Encryption . . . . . . . 209--218
Volker Müller Fast Multiplication on Elliptic Curves
over Small Fields of Characteristic Two 219--234
Sean Murphy An Analysis of SAFER . . . . . . . . . . 235--251
Hans Dobbertin Cryptanalysis of MD4 . . . . . . . . . . 253--271
Phillip Rogaway and
Don Coppersmith A Software-Optimized Encryption
Algorithm . . . . . . . . . . . . . . . 273--287
Paul C. van Oorschot and
Michael J. Wiener Parallel Collision Search with
Cryptanalytic Applications . . . . . . . 1--28
Moni Naor and
Omer Reingold On the Construction of Pseudorandom
Permutations: Luby-Rackoff Revisited . . 29--66
N. P. Smart and
S. Siksek A Fast Diffie--Hellman Protocol in Genus
2 . . . . . . . . . . . . . . . . . . . 67--73
Shai Halevi Efficient Commitment Schemes with
Bounded Sender and Unbounded Receiver 77--89
Phillip Rogaway Bucket Hashing and Its Application to
Fast Message Authentication . . . . . . 91--115
Mihir Bellare and
Ronald L. Rivest Translucent Cryptography --- An
Alternative to Key Escrow, and Its
Implementation via Fractional Oblivious
Transfer . . . . . . . . . . . . . . . . 117--139
N. P. Smart Elliptic Curve Cryptosystems over Small
Fields of Odd Characteristic . . . . . . 141--151
Carlo Blundo and
Alfredo De Santis and
Kaoru Kurosawa and
Wakaha Ogata On a Fallacious Bound for Authentication
Codes . . . . . . . . . . . . . . . . . 155--159
Eli Biham Cryptanalysis of Triple Modes of
Operation . . . . . . . . . . . . . . . 161--184
Daniel J. Bernstein How to Stretch Random Functions: The
Security of Protected Counter Sums . . . 185--192
N. P. Smart The Discrete Logarithm Problem on
Elliptic Curves of Trace One . . . . . . 193--196
Mike Burmester and
Yvo G. Desmedt and
Toshiya Itoh and
Kouichi Sakurai and
Hiroki Shizuya Divertible and Subliminal-Free
Zero-Knowledge Proofs for Languages . . 197--223
Kathleen A. S. Quinn Bounds for Key Distribution Patterns . . 227--239
Marc Joye and
Arjen K. Lenstra and
Jean-Jacques Quisquater Chinese Remaindering Based Cryptosystems
in the Presence of Faults . . . . . . . 241--245
Victor Shoup On the Security of a Practical
Identification Scheme . . . . . . . . . 247--260
Carlo Blundo and
Alfredo De Santis and
Douglas R. Stinson On the Contrast in Visual Cryptography
Schemes . . . . . . . . . . . . . . . . 261--289
Oded Goldreich Preface . . . . . . . . . . . . . . . . 1--7
Matthew Franklin and
Rebecca N. Wright Secure Communication in Minimal
Connectivity Models . . . . . . . . . . 9--30
Martin Hirt and
Ueli Maurer Player Simulation and General Adversary
Structures in Perfect Multiparty
Computation . . . . . . . . . . . . . . 31--60
Ran Canetti and
Shai Halevi and
Amir Herzberg Maintaining Authenticated Communication
in the Presence of Break-Ins . . . . . . 61--105
Ran Canetti and
Eyal Kushilevitz and
Rafail Ostrovsky and
Adi Rosén Randomness versus Fault-Tolerance . . . 107--142
Ran Canetti Security and Composition of Multiparty
Cryptographic Protocols . . . . . . . . 143--202
H. Zbinden and
N. Gisin and
B. Huttner and
A. Muller and
W. Tittel Practical Aspects of Quantum
Cryptographic Key Distribution . . . . . 207--220
R. Fischlin and
C. P. Schnorr Stronger Security Proofs for RSA and
Rabin Bits . . . . . . . . . . . . . . . 221--244
Jovan Dj. Golic and
Mahmoud Salmasizadeh and
Ed Dawson Fast Correlation Attacks on the
Summation Generator . . . . . . . . . . 245--262
Sachar Paulus and
Tsuyoshi Takagi A New Public-Key Cryptosystem over a
Quadratic Order with Quadratic
Decryption Time . . . . . . . . . . . . 263--272
Rosario Gennaro and
Tal Rabin and
Stanislav Jarecki and
Hugo Krawczyk Robust and Efficient Sharing of RSA
Functions . . . . . . . . . . . . . . . 273--300
Muxiang Zhang Maximum Correlation Analysis of
Nonlinear Combining Functions in Stream
Ciphers . . . . . . . . . . . . . . . . 301--314
Erez Petrank and
Charles Rackoff CBC MAC for Real-Time Data Sources . . . 315--338
Don Coppersmith and
Igor Shparlinski On Polynomial Approximation of the
Discrete Logarithm and the
Diffie--Hellman Mapping . . . . . . . . 339--360
David Pointcheval and
Jacques Stern Security Arguments for Digital
Signatures and Blind Signatures . . . . 361--396
Rosario Gennaro and
Tal Rabin and
Hugo Krawczyk RSA-Based Undeniable Signatures . . . . 397--416
Lars R. Knudsen A Detailed Analysis of SAFER K . . . . . 417--436
J. M. Pollard Kangaroos, Monopoly and Discrete
Logarithms . . . . . . . . . . . . . . . 437--447
Joan Boyar and
Ivan Damgård and
René Peralta Short Non-Interactive Cryptographic
Proofs . . . . . . . . . . . . . . . . . 449--472
Michael J. Jacobson, Jr. Computing Discrete Logarithms in
Quadratic Orders . . . . . . . . . . . . 473--492
Andrew Klapper On the Existence of Secure Keystream
Generators . . . . . . . . . . . . . . . 1--15
Joe Kilian and
Phillip Rogaway How to Protect DES Against Exhaustive
Key Search (an Analysis of DESX) . . . . 17--35
Giovanni Di Crescenzo and
Yuval Ishai and
Rafail Ostrovsky Universal Service-Providers for Private
Information Retrieval . . . . . . . . . 37--74
Don Coppersmith Weakness in Quaternion Signatures . . . 77--85
Serge Vaudenay Cryptanalysis of the Chor--Rivest
Cryptosystem . . . . . . . . . . . . . . 87--100
Dan Boneh and
Richard A. DeMillo and
Richard J. Lipton On the Importance of Eliminating Errors
in Cryptographic Computations . . . . . 101--119
Yongge Wang and
Yvo Desmedt Secure Communication in Multicast
Channels: The Answer to Franklin and
Wright's Question . . . . . . . . . . . 121--135
Dingfeng Ye and
Zongduo Dai and
Kwok-Yan Lam Decomposing Attacks on Asymmetric
Cryptography Based on Mapping
Compositions . . . . . . . . . . . . . . 137--150
Daniel V. Bailey and
Christof Paar Efficient Arithmetic in Finite Field
Extensions with Application in Elliptic
Curve Cryptography . . . . . . . . . . . 153--176
Mikael Goldmann and
Mats Näslund and
Alexander Russell Complexity Bounds on General Hard-Core
Predicates . . . . . . . . . . . . . . . 177--195
Thomas Jakobsen and
Lars R. Knudsen Attacks on Block Ciphers of Low
Algebraic Degree . . . . . . . . . . . . 197--210
Amos Fiat and
Tamir Tassa Dynamic Traitor Tracing . . . . . . . . 211--223
Thomas Scanlon Public Key Cryptosystems Based on
Drinfeld Modules Are Insecure . . . . . 225--230
Kaoru Kurosawa and
Thomas Johansson and
Douglas R. Stinson Almost $k$-Wise Independent Sample
Spaces and Their Cryptologic
Applications . . . . . . . . . . . . . . 231--253
Arjen K. Lenstra and
Eric R. Verheul Selecting Cryptographic Key Sizes . . . 255--293
Silvio Micali and
Leonid Reyzin Improving the Exact Security of Digital
Signature Schemes . . . . . . . . . . . 1--18
P. Gaudry and
F. Hess and
N. P. Smart Constructive and Destructive Facets of
Weil Descent on Elliptic Curves . . . . 19--46
Eli Biham and
Lars R. Knudsen Cryptanalysis of the ANSI X9.52 CBCM
Mode . . . . . . . . . . . . . . . . . . 47--59
A. A. Moldovyan and
N. A. Moldovyan A Cipher Based on Data-Dependent
Permutations . . . . . . . . . . . . . . 61--72
Victor Shoup and
Rosario Gennaro Securing Threshold Cryptosystems against
Chosen Ciphertext Attack . . . . . . . . 75--96
Moni Naor and
Omer Reingold Constructing Pseudo-Random Permutations
with a Prescribed Structure . . . . . . 97--102
Martín Abadi and
Phillip Rogaway Reconciling Two Views of Cryptography
(The Computational Soundness of Formal
Encryption) . . . . . . . . . . . . . . 103--127
Steven D. Galbraith Elliptic Curve Paillier Schemes . . . . 129--138
Anna M. Johnston and
Peter S. Gemmell Authenticated Key Exchange Provably
Secure Against the Man-in-the-Middle
Attack . . . . . . . . . . . . . . . . . 139--148
Phong Q. Nguyen and
Igor E. Shparlinski The Insecurity of the Digital Signature
Algorithm with Partially Known Nonces 151--176
Yehuda Lindell and
Benny Pinkas Privacy Preserving Data Mining . . . . . 177--206
Lars R. Knudsen The Security of Feistel Ciphers with Six
Rounds or Less . . . . . . . . . . . . . 207--222
Victor Shoup OAEP Reconsidered . . . . . . . . . . . 223--249
Dario Catalano and
Rosario Gennaro and
Nick Howgrave-Graham Paillier's Trapdoor Function Hides up to
$O(n)$ Bits . . . . . . . . . . . . . . 251--269
Mihir Bellare A Note on Negligible Functions . . . . . 271--284
S. S. Magliveras and
D. R. Stinson and
Tran van Trung New Approaches to Designing Public Key
Cryptosystems Using One-Way Functions
and Trapdoors in Finite Groups . . . . . 285--297
Steven Myers Efficient Amplification of the Security
of Weak Pseudo-Random Function
Generators . . . . . . . . . . . . . . . 1--24
Amos Beimel and
Shlomi Dolev Buses for Anonymous Message Delivery . . 25--39
Jovan Dj. Golic and
Renato Menicocci Edit Probability Correlation Attacks on
Stop/Go Clocked Keystream Generators . . 41--68
Oded Goldreich and
Vered Rosen On the Security of Modular
Exponentiation with Application to the
Construction of Pseudorandom Generators 71--93
Michael Ben-Or and
Dan Gutfreund Trading Help for Interaction in
Statistical Zero-Knowledge Proofs . . . 95--116
Siguna Müller A Probable Prime Test with Very High
Confidence for $n L 3 \bmod 4$ . . . . . 117--139
Yehuda Lindell Parallel Coin-Tossing and Constant-Round
Secure Two-Party Computation . . . . . . 143--184
M. Bellare and
C. Namprempre and
D. Pointcheval and
M. Semanko The One-More-RSA-Inversion Problems and
the Security of Chaum's Blind Signature
Scheme . . . . . . . . . . . . . . . . . 185--215
Gilles Brassard and
Claude Crépeau and
Stefan Wolf Oblivious Transfers and Privacy
Amplification . . . . . . . . . . . . . 219--237
Antoine Joux and
Kim Nguyen Separating Decision Diffie--Hellman from
Computational Diffie--Hellman in
Cryptographic Groups . . . . . . . . . . 239--247
Serge Vaudenay Decorrelation: a Theory for Block Cipher
Security . . . . . . . . . . . . . . . . 249--286
Adam Kalai Generating Random Factored Numbers,
Easily . . . . . . . . . . . . . . . . . 287--289
Oded Goldreich Preface . . . . . . . . . . . . . . . . 1--3
Stefan Dziembowski and
Ueli Maurer Optimal Randomizer Efficiency in the
Bounded-Storage Model . . . . . . . . . 5--26
Chi-Jen Lu Encryption against Storage-Bounded
Adversaries from On-Line Strong
Extractors . . . . . . . . . . . . . . . 27--42
Salil P. Vadhan Constructing Locally Computable
Extractors and Cryptosystems in the
Bounded-Storage Model . . . . . . . . . 43--77
Eiichiro Fujisaki and
Tatsuaki Okamoto and
David Pointcheval and
Jacques Stern RSA-OAEP Is Secure under the RSA
Assumption . . . . . . . . . . . . . . . 81--104
Michael J. Wiener The Full Cost of Cryptanalytic Attacks 105--124
Amos Beimel and
Yuval Ishai and
Tal Malkin Reducing the Servers --- Computation in
Private Information Retrieval: PIR with
Preprocessing . . . . . . . . . . . . . 125--151
Ran Canetti and
Ivan Damgård and
Stefan Dziembowski and
Yuval Ishai and
Tal Malkin Adaptive versus Non-Adaptive Security of
Multi-Party Protocols . . . . . . . . . 153--207
Gustav Hast Nearly One-Sided Tests and the
Goldreich--Levin Predicate . . . . . . . 209--229
Arjen K. Lenstra Preface . . . . . . . . . . . . . . . . 233--233
Victor S. Miller The Weil Pairing, and Its Efficient
Calculation . . . . . . . . . . . . . . 235--261
Antoine Joux A One Round Protocol for Tripartite
Diffie--Hellman . . . . . . . . . . . . 263--276
Eric R. Verheul Evidence that XTR Is More Secure than
Supersingular Elliptic Curve
Cryptosystems . . . . . . . . . . . . . 277--296
Dan Boneh and
Ben Lynn and
Hovav Shacham Short Signatures from the Weil Pairing 297--319
Paulo S. L. M. Barreto and
Ben Lynn and
Michael Scott Efficient Implementation of
Pairing-Based Cryptosystems . . . . . . 321--334
Moni Naor and
Benny Pinkas Computationally Secure Oblivious
Transfer . . . . . . . . . . . . . . . . 1--35
Matthias Fitzi and
Juan A. Garay and
Ueli Maurer and
others Minimal Complete Primitives for Secure
Multi-Party Computation . . . . . . . . 37--61
Henri Cohen Analysis of the Sliding Window Powering
Algorithm . . . . . . . . . . . . . . . 63--76
Régis Dupont and
Andreas Enge and
François Morain Building Curves with Arbitrary Small MOV
Degree over Finite Prime Fields . . . . 79--89
Rosario Gennaro An Improved Pseudo-Random Generator
Based on the Discrete Logarithm Problem 91--110
John Black and
Phillip Rogaway CBC MACs for Arbitrary-Length Messages:
The Three-Key Constructions . . . . . . 111--131
Hoi-Kwong Lo and
H. F. Chau and
M. Ardehali Efficient Quantum Key Distribution
Scheme and a Proof of Its Unconditional
Security . . . . . . . . . . . . . . . . 133--165
Tamir Tassa Low Bandwidth Dynamic Traitor Tracing
Schemes . . . . . . . . . . . . . . . . 167--183
Ran Canetti Preface . . . . . . . . . . . . . . . . 187--189
Jeffrey Considine and
Matthias Fitzi and
Matthew Franklin and
Leonid A. Levin and
Ueli Maurer and
David Metcalf Byzantine Agreement Given Partial
Broadcast . . . . . . . . . . . . . . . 191--217
Christian Cachin and
Klaus Kursawe and
Victor Shoup Random Oracles in Constantinople:
Practical Asynchronous Byzantine
Agreement Using Cryptography . . . . . . 219--246
Shafi Goldwasser and
Yehuda Lindell Secure Multi-Party Computation without
Agreement . . . . . . . . . . . . . . . 247--287
Eli Biham and
Alex Biryukov and
Adi Shamir Cryptanalysis of Skipjack Reduced to
$31$ Rounds Using Impossible
Differentials . . . . . . . . . . . . . 291--311
Adrian Kent Secure Classical Bit Commitment Using
Fixed Capacity Communication Channels 313--335
Joachim von zur Gathen and
Michael Nöcker Polynomial and Normal Bases for Finite
Fields . . . . . . . . . . . . . . . . . 337--355
Roberto M. Avanzi The Complexity of Certain
Multi-Exponentiation Techniques in
Cryptography . . . . . . . . . . . . . . 357--373
Lars R. Knudsen and
Chris J. Mitchell Partial Key Recovery Attack Against RMAC 375--389
Carlo Blundo and
Paolo D'Arco Analysis and Design of Distributed Key
Distribution Centers . . . . . . . . . . 391--414
Jan Denef and
Frederik Vercauteren An Extension of Kedlaya's Algorithm to
Hyperelliptic Curves in Characteristic
$2$ . . . . . . . . . . . . . . . . . . 1--25
Philip MacKenzie and
Thomas Shrimpton and
Markus Jakobsson Threshold Password-Authenticated Key
Exchange . . . . . . . . . . . . . . . . 27--66
Jonathan Katz and
Moti Yung Characterization of Security Notions for
Probabilistic Private-Key Encryption . . 67--95
Yan-Cheng Chang and
Chun-Yuan Hsiao and
Chi-Jen Lu The Impossibility of Basing One-Way
Permutations on Central Cryptographic
Primitives . . . . . . . . . . . . . . . 97--114
Edlyn Teske An Elliptic Curve Trapdoor System . . . 115--133
Ran Canetti and
Eyal Kushilevitz and
Yehuda Lindell On the Limitations of Universally
Composable Two-Party Computation Without
Set-Up Assumptions . . . . . . . . . . . 135--167
Juan A. Garay and
Philip MacKenzie and
Ke Yang Strengthening Zero-Knowledge Protocols
Using Signatures . . . . . . . . . . . . 169--209
Michael J. Jacobson and
Renate Scheidler and
Hugh C. Williams An Improved Real-Quadratic-Field-Based
Key Exchange Procedure . . . . . . . . . 211--239
Oded Goldreich and
Yehuda Lindell Session-Key Generation Using Human
Passwords Only . . . . . . . . . . . . . 241--340
Markus Bläser and
Andreas Jakoby and
Maciej Liskiewicz and
Bodo Manthey Private Computation: $k$-Connected
versus $1$-Connected Networks . . . . . 341--357
Yehuda Lindell A Simpler Construction of CCA2-Secure
Public-Key Encryption under General
Assumptions . . . . . . . . . . . . . . 359--377
Eli Biham and
Michel Boyer and
P. Oscar Boykin and
Tal Mor and
Vwani Roychowdhury A Proof of the Security of Quantum Key
Distribution . . . . . . . . . . . . . . 381--439
Deukjo Hong and
Seokhie Hong and
Wonil Lee and
Sangjin Lee and
Jongin Lim and
Jaechul Sung and
Okyeon Yi Known-IV, Known-in-Advance-IV, and
Replayed-and-Known-IV Attacks on
Multiple Modes of Operation of Block
Ciphers . . . . . . . . . . . . . . . . 441--462
Marc Girault and
Guillaume Poupard and
Jacques Stern On the Fly Authentication and Signature
Schemes Based on Groups of Unknown Order 463--487
Ivan Bjerre Damgard and
Gudmund Skovbjerg Frandsen An Extended Quadratic Frobenius
Primality Test with Average- and
Worst-Case Error Estimate . . . . . . . 489--520
Danny Harnik and
Moni Naor and
Omer Reingold and
Alon Rosen Completeness in Two-Party Secure
Computation: a Computational View . . . 521--552
Florian Luca and
Igor E. Shparlinski Elliptic Curves with Low Embedding
Degree . . . . . . . . . . . . . . . . . 553--562
Anonymous Editor's Note . . . . . . . . . . . . . 1--1
Neal Koblitz and
Alfred J. Menezes Another Look at ``Provable Security'' 3--37
Jean-Sebastien Coron and
Alexander May Deterministic Polynomial-Time
Equivalence of Computing the RSA Secret
Key and Factoring . . . . . . . . . . . 39--50
Rosario Gennaro and
Stanislaw Jarecki and
Hugo Krawczyk and
Tal Rabin Secure Distributed Key Generation for
Discrete-Log Based Cryptosystems . . . . 51--83
Jonathan Katz and
Moti Yung Scalable Protocols for Authenticated
Group Key Exchange . . . . . . . . . . . 85--113
Dario Catalano and
David Pointcheval and
Thomas Pornin Trapdoor Hard-to-Invert Group
Isomorphisms and Their Application to
Password-Based Authentication . . . . . 115--149
Johan Håstad The Security of the IAPM and IACBC Modes 153--163
Yan Zong Ding and
Danny Harnik and
Alon Rosen and
Ronen Shaltiel Constant-Round Oblivious Transfer in the
Bounded Storage Model . . . . . . . . . 165--202
Joonsang Baek and
Ron Steinfeld and
Yuliang Zheng Formal Proofs for the Security of
Signcryption . . . . . . . . . . . . . . 203--235
Tamir Tassa Hierarchical Threshold Secret Sharing 237--264
Ran Canetti and
Shai Halevi and
Jonathan Katz A Forward-Secure Public-Key Encryption
Scheme . . . . . . . . . . . . . . . . . 265--294
Amos Beimel and
Yoav Stahl Robust Information-Theoretic Private
Information Retrieval . . . . . . . . . 295--321
Carlo Blundo and
Paolo D'Arco and
Alfredo De Santis and
Douglas Stinson On Unconditionally Secure Distributed
Oblivious Transfer . . . . . . . . . . . 323--373
Qi Cheng Primality Proving via One Round in ECPP
and One Iteration in AKS . . . . . . . . 375--387
Boaz Tsaban Theoretical Cryptanalysis of the
Klimov--Shamir Number Generator TF-1 . . 389--392
Rosario Gennaro and
Tal Rabin and
Stanislav Jarecki and
Hugo Krawczyk Robust and Efficient Sharing of RSA
Functions . . . . . . . . . . . . . . . 393--393
Rosario Gennaro and
Tal Rabin and
Hugo Krawczyk RSA-Based Undeniable Signatures . . . . 394--394
Martin Abadi and
Phillip Rogaway Reconciling Two Views of Cryptography
(The Computational Soundness of Formal
Encryption) . . . . . . . . . . . . . . 395--395
Rafail Ostrovsky and
William E. Skeith Private Searching on Streaming Data . . 397--430
Yael Tauman Kalai and
Yehuda Lindell and
Manoj Prabhakaran Concurrent Composition of Secure
Protocols in the Timing Model . . . . . 431--492
Eu-Jin Goh and
Stanislaw Jarecki and
Jonathan Katz and
Nan Wang Efficient Signature Schemes with Tight
Reductions to the Diffie--Hellman
Problems . . . . . . . . . . . . . . . . 493--514
Johan Håstad and
Mats Näslund Practical Construction and Analysis of
Pseudo-Randomness Primitives . . . . . . 1--26
D. Coppersmith and
J. S. Coron and
F. Grieu and
S. Halevi and
C. Jutla and
D. Naccache and
J. P. Stern Cryptanalysis of ISO/IEC 9796-1 . . . . 27--51
Minh-Huyen Nguyen and
Salil Vadhan Simpler Session-Key Generation from
Short Random Passwords . . . . . . . . . 52--96
Masayuki Abe and
Rosario Gennaro and
Kaoru Kurosawa Tag-KEM/DEM: a New Framework for Hybrid
Encryption . . . . . . . . . . . . . . . 97--130
Ali Aydìn Selçuk On Probability of Success in Linear and
Differential Cryptanalysis . . . . . . . 131--147
Dan Boneh and
Xavier Boyen Short Signatures Without Random Oracles
and the SDH Assumption in Bilinear
Groups . . . . . . . . . . . . . . . . . 149--177
K. Bentahar and
P. Farshim and
J. Malone-Lee and
N. P. Smart Generic Constructions of Identity-Based
and Certificateless KEMs . . . . . . . . 178--199
Yehuda Lindell Lower Bounds and Impossibility Results
for Concurrent Self Composition . . . . 200--249
Jérôme Renault and
Tristan Tomala Probabilistic Reliability and Privacy of
Communication Using Multicast in General
Neighbor Networks . . . . . . . . . . . 250--279
R. Overbeck Structural Attacks for Public Key
Cryptosystems based on Gabidulin Codes 280--301
Jonathan Katz and
Yehuda Lindell Handling Expected Polynomial-Time
Strategies in Simulation-Based Security
Proofs . . . . . . . . . . . . . . . . . 303--349
Michel Abdalla and
Mihir Bellare and
Dario Catalano and
Eike Kiltz and
Tadayoshi Kohno and
Tanja Lange and
John Malone-Lee and
Gregory Neven and
Pascal Paillier and
Haixia Shi Searchable Encryption Revisited:
Consistency Properties, Relation to
Anonymous IBE, and Extensions . . . . . 350--391
Elad Barkan and
Eli Biham and
Nathan Keller Instant Ciphertext-Only Cryptanalysis of
GSM Encrypted Communication . . . . . . 392--429
Yi Lu and
Serge Vaudenay Cryptanalysis of an E0-like Combiner
with Memory . . . . . . . . . . . . . . 430--457
Francesco Matucci Cryptanalysis of the Shpilrain--Ushakov
Protocol for Thompson's Group . . . . . 458--468
Mihir Bellare and
Chanathip Namprempre Authenticated Encryption: Relations
among Notions and Analysis of the
Generic Composition Paradigm . . . . . . 469--491
Ralf Küsters and
Anupam Datta and
John C. Mitchell and
Ajith Ramanathan On the Relationships between Notions of
Simulation-Based Security . . . . . . . 492--546
Charanjit S. Jutla Encryption Modes with Almost Free
Message Integrity . . . . . . . . . . . 547--578
Rahul Jain New Binding-Concealing Trade-Offs for
Quantum String Commitment . . . . . . . 579--592
Claus Diem and
Emmanuel Thomé Index Calculus in Class Groups of
Non-hyperelliptic Curves of Genus Three 593--611
Mihir Bellare and
Chanathip Namprempre and
Gregory Neven Security Proofs for Identity-Based
Identification and Signature Schemes . . 1--61
Wolfgang Lempken and
Trung van Tran and
Spyros S. Magliveras and
Wandi Wei A Public Key Cryptosystem Based on
Non-abelian Finite Groups . . . . . . . 62--74
Russell Impagliazzo and
Ragesh Jaiswal and
Valentine Kabanets Chernoff-Type Direct Product Theorems 75--92
Denis X. Charles and
Kristin E. Lauter and
Eyal Z. Goren Cryptographic Hash Functions from
Expander Graphs . . . . . . . . . . . . 93--113
Adam Bender and
Jonathan Katz and
Ruggero Morselli Ring Signatures: Stronger Definitions,
and Constructions without Random Oracles 114--138
Phong Q. Nguyen and
Oded Regev Learning a Parallelepiped: Cryptanalysis
of GGH and NTRU Signatures . . . . . . . 139--160
Yehuda Lindell and
Benny Pinkas A Proof of Security of Yao's Protocol
for Two-Party Computation . . . . . . . 161--188
Tal Moran and
Ronen Shaltiel and
Amnon Ta-Shma Non-interactive Timestamping in the
Bounded-Storage Model . . . . . . . . . 189--226
Tamir Tassa and
Nira Dyn Multipartite Secret Sharing by Bivariate
Interpolation . . . . . . . . . . . . . 227--258
M. Barbosa and
A. Moss and
D. Page Constructive and Destructive Use of
Compilers in Elliptic Curve Cryptography 259--281
Iftach Haitner and
Omer Horvitz and
Jonathan Katz and
Chiu-Yuen Koo and
Ruggero Morselli and
others Reducing Complexity Assumptions for
Statistically-Hiding Commitment . . . . 283--310
J. Black and
M. Cochran and
T. Shrimpton On the Impossibility of Highly-Efficient
Blockcipher-Based Hash Functions . . . . 311--329
K. Rubin and
A. Silverberg Using Abelian Varieties to Improve
Pairing-Based Cryptography . . . . . . . 330--364
Nenad Dedi\'c and
Gene Itkis and
Leonid Reyzin and
Scott Russell Upper and Lower Bounds on Black-Box
Steganography . . . . . . . . . . . . . 365--394
Yehuda Lindell General Composition and Universal
Composability in Secure Multiparty
Computation . . . . . . . . . . . . . . 395--428
Benny Applebaum and
Yuval Ishai and
Eyal Kushilevitz Cryptography with Constant Input
Locality . . . . . . . . . . . . . . . . 429--469
David Cash and
Eike Kiltz and
Victor Shoup The Twin Diffie--Hellman Problem and
Applications . . . . . . . . . . . . . . 470--504
Benjamin Smith Isogenies and the Discrete Logarithm
Problem in Jacobians of Genus $3$
Hyperelliptic Curves . . . . . . . . . . 505--529
Marc Fischlin and
Roger Fischlin Efficient Non-malleable Commitment
Schemes . . . . . . . . . . . . . . . . 530--571
Mario Di Raimondo and
Rosario Gennaro New Approaches for Deniable
Authentication . . . . . . . . . . . . . 572--615
Oded Goldreich On Expected Probabilistic
Polynomial-Time Adversaries: a
Suggestion for Restricted Definitions
and Their Benefits . . . . . . . . . . . 1--36
Eran Tromer and
Dag Arne Osvik and
Adi Shamir Efficient Cache Attacks on AES, and
Countermeasures . . . . . . . . . . . . 37--71
Lars R. Knudsen and
John Erik Mathiassen and
Frédéric Muller and
Sòren S. Thomsen Cryptanalysis of MD2 . . . . . . . . . . 72--90
Yvo Desmedt and
Rosario Gennaro and
Kaoru Kurosawa and
Victor Shoup A New and Improved Paradigm for Hybrid
Encryption Secure Against
Chosen-Ciphertext Attack . . . . . . . . 91--120
Dennis Hofheinz and
John Malone-Lee and
Martijn Stam Obfuscation for Cryptographic Purposes 121--168
Daniele Micciancio The RSA Group is Pseudo-Free . . . . . . 169--186
P. Morrissey and
N. P. Smart and
B. Warinschi The TLS Handshake Protocol: a Modular
Analysis . . . . . . . . . . . . . . . . 187--223
David Freeman and
Michael Scott and
Edlyn Teske A Taxonomy of Pairing-Friendly Elliptic
Curves . . . . . . . . . . . . . . . . . 224--280
Yonatan Aumann and
Yehuda Lindell Security Against Covert Adversaries:
Efficient Protocols for Realistic
Adversaries . . . . . . . . . . . . . . 281--343
Amos Beimel and
Tal Malkin and
Kobbi Nissim and
Enav Weinreb How Should We Solve Search Problems
Privately? . . . . . . . . . . . . . . . 344--371
Gagan Aggarwal and
Nina Mishra and
Benny Pinkas Secure Computation of the Median (and
Other Elements of Specified Ranks) . . . 373--401
Jonathan Katz and
Ji Sun Shin and
Adam Smith Parallel and Concurrent Security of the
HB and HB$^+$ Protocols . . . . . . . . 402--421
Carmit Hazay and
Yehuda Lindell Efficient Protocols for Set Intersection
and Pattern Matching with Security
Against Malicious and Covert Adversaries 422--456
Jung Hee Cheon Discrete Logarithm Problems with
Auxiliary Inputs . . . . . . . . . . . . 457--476
Elisavet Konstantinou and
Aristides Kontogeorgis and
Yannis C. Stamatiou and
Christos Zaroliagis On the Efficient Generation of
Prime-Order Elliptic Curves . . . . . . 477--503
Alex Biryukov and
Adi Shamir Structural Cryptanalysis of SASAS . . . 505--518
J. Black and
P. Rogaway and
T. Shrimpton and
M. Stam An Analysis of the Blockcipher--Based
Hash Functions from PGV . . . . . . . . 519--545
Jens Groth A Verifiable Secret Shuffle of
Homomorphic Encryptions . . . . . . . . 546--579
Omer Barkol and
Yuval Ishai and
Enav Weinreb On $d$-Multiplicative Secret Sharing . . 580--593
Jörn Müller-Quade and
Dominique Unruh Long-Term Security and Universal
Composability . . . . . . . . . . . . . 594--671
Sebastiaan Indesteege and
Bart Preneel Practical Collisions for EnRUPT . . . . 1--23
Andreas Enge and
Pierrick Gaudry and
Emmanuel Thomé An $L(1/3)$ Discrete Logarithm Algorithm
for Low Degree Curves . . . . . . . . . 24--41
Michel Abdalla and
James Birkett and
Dario Catalano and
Alexander W. Dent and
John Malone-Lee and
Gregory Neven and
Jacob C. N. Schuldt and
Nigel P. Smart Wildcarded Identity-Based Encryption . . 42--82
Ran Canetti and
Jonathan Herzog Universally Composable Symbolic Security
Analysis . . . . . . . . . . . . . . . . 83--147
Markus Grassl and
Ivana Ili\'c and
Spyros Magliveras and
Rainer Steinwandt Cryptanalysis of the Tillich--Zémor Hash
Function . . . . . . . . . . . . . . . . 148--156
Gilad Asharov and
Yehuda Lindell Utility Dependence in Correct and Fair
Rational Secret Sharing . . . . . . . . 157--202
Marc Fischlin and
Roger Fischlin Efficient Non-Malleable Commitment
Schemes . . . . . . . . . . . . . . . . 203--244
Christof Paar and
Jean-Jacques Quisquater and
Berk Sunar Guest Editorial . . . . . . . . . . . . 245--246
G. Canivet and
P. Maistri and
R. Leveugle and
J. Clédi\`ere and
F. Valette and
M. Renaudin Glitch and Laser Fault Attacks onto a
Secure AES Implementation on a
SRAM-Based FPGA . . . . . . . . . . . . 247--268
Lejla Batina and
Benedikt Gierlichs and
Emmanuel Prouff and
Matthieu Rivain and
François-Xavier Standaert and
Nicolas Veyrat-Charvillon Mutual Information Analysis: a
Comprehensive Study . . . . . . . . . . 269--291
Svetla Nikova and
Vincent Rijmen and
Martin Schläffer Secure Hardware Implementation of
Nonlinear Functions in the Presence of
Glitches . . . . . . . . . . . . . . . . 292--321
Axel Poschmann and
Amir Moradi and
Khoongming Khoo and
Chu-Wee Lim and
Huaxiong Wang and
San Ling Side-Channel Resistant Crypto for Less
than 2,300 GE . . . . . . . . . . . . . 322--345
Agustin Dominguez-Oviedo and
M. Anwar Hasan and
Bijan Ansari Fault-Based Attack on Montgomery's
Ladder Algorithm . . . . . . . . . . . . 346--374
Abhranil Maiti and
Patrick Schaumont Improved Ring Oscillator PUF: An
FPGA-friendly Secure Primitive . . . . . 375--397
Mathieu Baudet and
David Lubicz and
Julien Micolod and
André Tassiaux On the Security of Oscillator-Based
Random Number Generators . . . . . . . . 398--425
Martin Hell and
Thomas Johansson Breaking the Stream Ciphers F-FCSR-H and
F-FCSR-16 in Real Time . . . . . . . . . 427--445
Steven D. Galbraith and
Xibin Lin and
Michael Scott Endomorphisms for Faster Elliptic Curve
Cryptography on a Large Class of Curves 446--469
Dennis Hofheinz Possibility and Impossibility Results
for Selective Decommitments . . . . . . 470--516
Dafna Kidron and
Yehuda Lindell Impossibility Results for Universal
Composability in Public-Key Models and
with Fixed Inputs . . . . . . . . . . . 517--544
Jean Monnerat and
Serge Vaudenay Short Undeniable Signatures Based on
Group Homomorphisms . . . . . . . . . . 545--587
Moses Liskov and
Ronald L. Rivest and
David Wagner Tweakable Block Ciphers . . . . . . . . 588--613
Juan A. Garay and
Philip MacKenzie and
Manoj Prabhakaran and
Ke Yang Resource Fairness and Composability of
Cryptographic Protocols . . . . . . . . 615--658
Dan Boneh and
Xavier Boyen Efficient Selective Identity-Based
Encryption Without Random Oracles . . . 659--693
Susan Hohenberger and
Guy N. Rothblum and
Abhi Shelat and
Vinod Vaikuntanathan Securely Obfuscating Re-Encryption . . . 694--719
Boaz Barak and
Ran Canetti and
Yehuda Lindell and
Rafael Pass and
Tal Rabin Secure Computation Without
Authentication . . . . . . . . . . . . . 720--760
Yehuda Lindell and
Hila Zarosim Adaptive Zero-Knowledge Proofs and
Adaptively Secure Oblivious Transfer . . 761--799
Rahul Jain Resource Requirements of Private Quantum
Channels and Consequences for Oblivious
Remote State Preparation . . . . . . . . 1--13
S. Dov Gordon and
Jonathan Katz Partial Fairness in Secure Two-Party
Computation . . . . . . . . . . . . . . 14--40
Jonathan Katz Which Languages Have 4-Round
Zero-Knowledge Proofs? . . . . . . . . . 41--56
Alexandra Boldyreva and
Adriana Palacio and
Bogdan Warinschi Secure Proxy Signature Schemes for
Delegation of Signing Rights . . . . . . 57--115
Krzysztof Pietrzak and
Douglas Wikström Parallel Repetition of Computationally
Sound Protocols Revisited . . . . . . . 116--135
Wim Aerts and
Eli Biham and
Dieter De Moitié and
Elke De Mulder and
Orr Dunkelman and
Sebastiaan Indesteege and
Nathan Keller and
Bart Preneel and
Guy A. E. Vandenbosch and
Ingrid Verbauwhede A Practical Attack on KeeLoq . . . . . . 136--157
Shai Halevi and
Yael Tauman Kalai Smooth Projective Hashing and
Two-Message Oblivious Transfer . . . . . 158--193
Jung Hee Cheon and
Jin Hong and
Minkyu Kim Accelerating Pollard's Rho Algorithm on
Finite Fields . . . . . . . . . . . . . 195--242
Giuseppe Ateniese and
Alfredo De Santis and
Anna Lisa Ferrara and
Barbara Masucci Provably-Secure Time-Bound Hierarchical
Key Assignment Schemes . . . . . . . . . 243--270
Shoichi Hirose and
Je Hong Park and
Aaram Yun A Simple Variant of the Merkle--Damgård
Scheme with a Permutation . . . . . . . 271--309
Tom Roeder and
Rafael Pass and
Fred B. Schneider Multi-Verifier Signatures . . . . . . . 310--348
Lorenz Minder and
Alistair Sinclair The Extended $k$-tree Algorithm . . . . 349--382
Carmit Hazay and
Kobbi Nissim Efficient Set Operations in the Presence
of Malicious Adversaries . . . . . . . . 383--433
Oriol Farr\`as and
Jaume Martí-Farré and
Carles Padró Ideal Multipartite Secret Sharing
Schemes . . . . . . . . . . . . . . . . 434--463
Stanislav V. Smyshlyaev Perfectly Balanced Boolean Functions and
Goli\'c Conjecture . . . . . . . . . . . 464--483
Dennis Hofheinz and
Eike Kiltz Programmable Hash Functions and Their
Applications . . . . . . . . . . . . . . 484--527
Akinori Kawachi and
Takeshi Koshiba and
Harumichi Nishimura and
Tomoyuki Yamakami Computational Indistinguishability
Between Quantum States and Its
Cryptographic Application . . . . . . . 528--555
Yvo Desmedt and
Josef Pieprzyk and
Ron Steinfeld and
Xiaoming Sun and
Christophe Tartary and
Huaxiong Wang and
Andrew Chi-Chih Yao Graph Coloring Applied to Secure
Computation in Non-Abelian Groups . . . 557--600
David Cash and
Dennis Hofheinz and
Eike Kiltz and
Chris Peikert Bonsai Trees, or How to Delegate a
Lattice Basis . . . . . . . . . . . . . 601--639
M. Bellare and
A. Boldyreva and
L. Knudsen and
C. Namprempre On-line Ciphers and the Hash-CBC
Constructions . . . . . . . . . . . . . 640--679
Yehuda Lindell and
Benny Pinkas Secure Two--Party Computation via
Cut-and-Choose Oblivious Transfer . . . 680--722
Jan Camenisch and
Susan Hohenberger and
Michael Òstergaard Pedersen Batch Verification of Short Signatures 723--747
Praveen Gauravaram and
Lars R. Knudsen Security Analysis of
Randomize-Hash-then-Sign Digital
Signatures . . . . . . . . . . . . . . . 748--779
Rafael Pass and
Alon Rosen and
Wei-Lung Dustin Tseng Public-Coin Parallel Zero--Knowledge for
NP . . . . . . . . . . . . . . . . . . . 1--10
Julia Borghoff and
Lars R. Knudsen and
Gregor Leander and
Sòren S. Thomsen Slender-Set Differential Cryptanalysis 11--38
David Mandell Freeman and
Oded Goldreich and
Eike Kiltz and
Alon Rosen and
Gil Segev More Constructions of Lossy and
Correlation-Secure Trapdoor Functions 39--74
Hossein Ghodosi Analysis of an Unconditionally Secure
Distributed Oblivious Transfer . . . . . 75--79
Eiichiro Fujisaki and
Tatsuaki Okamoto Secure Integration of Asymmetric and
Symmetric Encryption Schemes . . . . . . 80--101
Dennis Hofheinz and
Eike Kiltz and
Victor Shoup Practical Chosen Ciphertext Secure
Encryption from Factoring . . . . . . . 102--118
Antoine Joux and
Vanessa Vitse Elliptic Curve Discrete Logarithm
Problem over Small Degree Extension
Fields . . . . . . . . . . . . . . . . . 119--143
Andrej Bogdanov and
Alon Rosen Input Locality and Hardness
Amplification . . . . . . . . . . . . . 144--171
Takanori Isobe A Single-Key Attack on the Full GOST
Block Cipher . . . . . . . . . . . . . . 172--189
Jonathan Katz and
Amit Sahai and
Brent Waters Predicate Encryption Supporting
Disjunctions, Polynomial Equations, and
Inner Products . . . . . . . . . . . . . 191--224
Tibor Jager and
Jörg Schwenk On the Analysis of Cryptographic
Assumptions in the Generic Ring Model 225--245
Jean-Sébastien Coron and
Alexey Kirichenko and
Mehdi Tibouchi A Note on the Bivariate Coppersmith
Theorem . . . . . . . . . . . . . . . . 246--250
Melissa Chase and
Alexander Healy and
Anna Lysyanskaya and
Tal Malkin and
Leonid Reyzin Mercurial Commitments with Applications
to Zero-Knowledge Sets . . . . . . . . . 251--279
Joan Boyar and
Philip Matthews and
René Peralta Logic Minimization Techniques with
Applications to Cryptology . . . . . . . 280--312
Jean-Philippe Aumasson and
Luca Henzen and
Willi Meier and
María Naya-Plasencia \sc Quark: a Lightweight Hash . . . . . 313--339
Steve Lu and
Rafail Ostrovsky and
Amit Sahai and
Hovav Shacham and
Brent Waters Sequential Aggregate Signatures,
Multisignatures, and Verifiably
Encrypted Signatures Without Random
Oracles . . . . . . . . . . . . . . . . 340--373
Dennis Hofheinz and
Dominique Unruh and
Jörn Müller-Quade Polynomial Runtime and Composability . . 375--441
Hovav Shacham and
Brent Waters Compact Proofs of Retrievability . . . . 442--483
Oded Goldreich and
Ron D. Rothblum Enhancements of Trapdoor Permutations 484--512
Elette Boyle and
Gil Segev and
Daniel Wichs Fully Leakage-Resilient Signatures . . . 513--558
Jin Hong and
Sunghwan Moon A Comparison of Cryptanalytic Tradeoff
Algorithms . . . . . . . . . . . . . . . 559--637
Yehuda Lindell A Note on Constant-Round Zero-Knowledge
Proofs of Knowledge . . . . . . . . . . 638--654
Marten van Dijk and
Ari Juels and
Alina Oprea and
Ronald L. Rivest FlipIt: The Game of ``Stealthy
Takeover'' . . . . . . . . . . . . . . . 655--713
Jonathan Katz and
Vinod Vaikuntanathan Round-Optimal Password-Based
Authenticated Key Exchange . . . . . . . 714--743
Paul Stankovski and
Martin Hell and
Thomas Johansson An Efficient State Recovery Attack on
the X-FCSR Family of Stream Ciphers . . 1--22
Aggelos Kiayias and
Yona Raekow and
Alexander Russell A One-Time Stegosystem and Applications
to Efficient Covert Communication . . . 23--44
Rafael Pass and
Wei-Lung Dustin Tseng Concurrent Zero Knowledge, Revisited . . 45--66
Sourav Sen Gupta and
Subhamoy Maitra and
Goutam Paul and
Santanu Sarkar (Non-)Random Sequences from (Non-)Random
Permutations --- Analysis of RC4 Stream
Cipher . . . . . . . . . . . . . . . . . 67--108
Iftach Haitner and
Omer Reingold A New Interactive Hashing Theorem . . . 109--138
James Birkett and
Alexander W. Dent Security Models and Proof Strategies for
Plaintext-Aware Encryption . . . . . . . 139--180
Jin Hong and
Sunghwan Moon Erratum to: \booktitleA Comparison of
Cryptanalytic Tradeoff Algorithms . . . 181--181
Itai Dinur and
Orr Dunkelman and
Adi Shamir Improved Practical Attacks on
Round-Reduced Keccak . . . . . . . . . . 183--209
Zvika Brakerski and
Gil Segev Better Security for Deterministic
Public-Key Encryption: The
Auxiliary-Input Setting . . . . . . . . 210--247
Patrick Longa and
Francesco Sica Four-Dimensional
Gallant--Lambert--Vanstone Scalar
Multiplication . . . . . . . . . . . . . 248--283
Ronald Cramer and
Ivan Damgård and
Marcel Keller On the Amortized Complexity of
Zero-Knowledge Protocols . . . . . . . . 284--316
Nir Bitansky and
Ran Canetti On Strong Simulation and Composable
Point Obfuscation . . . . . . . . . . . 317--357
Carmit Hazay and
Tomas Toft Computationally Secure Pattern Matching
in the Presence of Malicious Adversaries 358--395
Marc Fischlin and
Anja Lehmann and
Krzysztof Pietrzak Robust Multi-Property Combiners for Hash
Functions . . . . . . . . . . . . . . . 397--428
Benny Applebaum Key-Dependent Message Security: Generic
Amplification and Completeness . . . . . 429--451
Dmitry Khovratovich and
Ivica Nikoli\'c and
Christian Rechberger Rotational Rebound Attacks on Reduced
Skein . . . . . . . . . . . . . . . . . 452--479
Shafi Goldwasser and
Guy N. Rothblum On Best-Possible Obfuscation . . . . . . 480--505
Jens Groth and
Rafail Ostrovsky Cryptography in the Multi-string Model 506--543
Michel Abdalla and
Dario Catalano and
Dario Fiore Verifiable Random Functions: Relations
to Identity-Based Key Encapsulation and
New Constructions . . . . . . . . . . . 544--593
Jean-Charles Faug\`ere and
Pierrick Gaudry and
Louise Huot and
Guénaël Renault Using Symmetries in the Index Calculus
for Elliptic Curves Discrete Logarithm 595--635
Yair Amir and
Paul Bunn and
Rafail Ostrovsky Authenticated Adversarial Routing . . . 636--771
Jérémy Jean and
María Naya-Plasencia and
Thomas Peyrin Improved Cryptanalysis of \tt AES-like
Permutations . . . . . . . . . . . . . . 772--798
Mihir Bellare and
Todor Ristov A Characterization of Chameleon Hash
Functions and New, Efficient Designs . . 799--823
Orr Dunkelman and
Nathan Keller and
Adi Shamir A Practical-Time Related-Key Attack on
the KASUMI Cryptosystem Used in GSM and
3G Telephony . . . . . . . . . . . . . . 824--849
Orr Dunkelman and
Nathan Keller and
Adi Shamir Slidex Attacks on the Even--Mansour
Encryption Scheme . . . . . . . . . . . 1--28
Mihir Bellare and
Dennis Hofheinz and
Eike Kiltz Subtleties in the Definition of
IND--CCA: When and How Should Challenge
Decryption Be Disallowed? . . . . . . . 29--48
Arpita Patra and
Ashish Choudhury and
C. Pandu Rangan Efficient Asynchronous Verifiable Secret
Sharing and Multiparty Computation . . . 49--109
Eli Biham and
Rafi Chen and
Antoine Joux Cryptanalysis of SHA-0 and Reduced SHA-1 110--160
Ämin Baumeler and
Anne Broadbent Quantum Private Information Retrieval
has Linear Communication Complexity . . 161--175
Florian Böhl and
Dennis Hofheinz and
Tibor Jager and
Jessica Koch and
Christoph Striecks Confined Guessing: New Signatures From
Standard Assumptions . . . . . . . . . . 176--208
Eli Biham and
Orr Dunkelman and
Nathan Keller and
Adi Shamir New Attacks on IDEA with at Least 6
Rounds . . . . . . . . . . . . . . . . . 209--239
Mahdi Sajadieh and
Mohammad Dakhilalian and
Hamid Mala and
Pouyan Sepehrdad Efficient Recursive Diffusion Layers for
Block Ciphers and Hash Functions . . . . 240--256
Mario Lamberger and
Florian Mendel and
Martin Schläffer and
Christian Rechberger and
Vincent Rijmen The Rebound Attack and Subspace
Distinguishers: Application to Whirlpool 257--296
Itay Berman and
Iftach Haitner From Non-adaptive to Adaptive
Pseudorandom Functions . . . . . . . . . 297--311
Yehuda Lindell and
Benny Pinkas An Efficient Protocol for Secure
Two-Party Computation in the Presence of
Malicious Adversaries . . . . . . . . . 312--350
Jae Hyun Ahn and
Dan Boneh and
Jan Camenisch and
Susan Hohenberger and
Abhi Shelat and
Brent Waters Computing on Authenticated Data . . . . 351--395
Orr Dunkelman and
Nathan Keller and
Adi Shamir Improved Single-Key Attacks on $8$-Round
AES-192 and AES-256 . . . . . . . . . . 397--422
Dennis Hofheinz and
Victor Shoup GNUC: A New Universal Composability
Framework . . . . . . . . . . . . . . . 423--508
Eric Miles and
Emanuele Viola On the Complexity of Constructing
Pseudorandom Functions (Especially when
They Don't Exist) . . . . . . . . . . . 509--532
Lior Malka How to Achieve Perfect Simulation and a
Complete Problem for Non-interactive
Perfect Zero-Knowledge . . . . . . . . . 533--550
Amos Beimel and
Eran Omri and
Ilan Orlov Protocols for Multiparty Coin Toss with
a Dishonest Majority . . . . . . . . . . 551--600
Boaz Tsaban Polynomial-Time Solutions of
Computational Problems in
Noncommutative-Algebraic Cryptography 601--622
Ron Berman and
Amos Fiat and
Marcin Gomulkiewicz and
Marek Klonowski Provable Unlinkability Against Traffic
Analysis with Low Message Overhead . . . 623--640
Sven Schäge Tight Security for Signature Schemes
Without Random Oracles . . . . . . . . . 641--670
Benjamin Fuller and
Adam O'Neill and
Leonid Reyzin A Unified Approach to Deterministic
Encryption: New Constructions and a
Connection to Computational Entropy . . 671--717
Hadi Soleimany and
Céline Blondeau and
Xiaoli Yu and
Wenling Wu Reflection Cryptanalysis of PRINCE-Like
Ciphers . . . . . . . . . . . . . . . . 718--744
Nishanth Chandran and
Juan A. Garay and
Rafail Ostrovsky Almost-Everywhere Secure Computation
with Edge Corruptions . . . . . . . . . 745--768
Gordon Procter and
Carlos Cid On Weak Keys and Forgery Attacks Against
Polynomial-Based MAC Schemes . . . . . . 769--795
James Aspnes and
Zoë Diamadi and
Aleksandr Yampolskiy and
Kristian Gjòsteen Spreading Alerts Quietly and the
Subgroup Escape Problem . . . . . . . . 796--819
Craig Gentry and
Jens Groth and
Yuval Ishai and
Chris Peikert and
Amit Sahai Using Fully Homomorphic Hybrid
Encryption to Minimize Non-interactive
Zero-Knowledge Proofs . . . . . . . . . 820--843
Mihir Bellare New Proofs for NMAC and HMAC: Security
without Collision Resistance . . . . . . 844--878
Thomas Peyrin Collision Attack on \tt Grindahl . . . . 879--898
Marco Baldi and
Marco Bianchi and
Franco Chiaraluce and
Joachim Rosenthal Enhanced Public Key Security for the
McEliece Cryptosystem . . . . . . . . . 1--27
Joppe W. Bos and
Craig Costello and
Huseyin Hisil and
Kristin Lauter Fast Cryptography in Genus $2$ . . . . . 28--60
Jean-Sébastien Coron and
Thomas Holenstein and
Robin Künzler How to Build an Ideal Cipher: The
Indifferentiability of the Feistel
Construction . . . . . . . . . . . . . . 61--114
Michael J. Freedman and
Carmit Hazay and
Kobbi Nissim and
Benny Pinkas Efficient Set Intersection with
Simulation-Based Security . . . . . . . 115--155
Andrew Chi-Chih Yao and
Moti Yung and
Yunlei Zhao Concurrent Knowledge Extraction in
Public-Key Models . . . . . . . . . . . 156--219
Daniel R. L. Brown Breaking RSA May Be As Difficult As
Factoring . . . . . . . . . . . . . . . 220--241
Rosario Gennaro and
Carmit Hazay and
Jeffrey S. Sorensen Automata Evaluation and Text Search
Protocols with Simulation-Based Security 243--282
Iftach Haitner and
Eran Omri and
Hila Zarosim Limits on the Usefulness of Random
Oracles . . . . . . . . . . . . . . . . 283--335
Amos Beimel and
Oriol Farr\`as and
Yuval Mintz Secret-Sharing Schemes for Very Dense
Graphs . . . . . . . . . . . . . . . . . 336--362
Masayuki Abe and
Georg Fuchsbauer and
Jens Groth and
Kristiyan Haralambiev and
Miyako Ohkubo Structure-Preserving Signatures and
Commitments to Group Elements . . . . . 363--421
Sebastian Faust and
Carmit Hazay and
Jesper Buus Nielsen and
Peter Sebastian Nordholt and
Angela Zottarel Signature Schemes Secure Against
Hard-to-Invert Leakage . . . . . . . . . 422--455
Yehuda Lindell Fast Cut-and-Choose-Based Protocols for
Malicious and Covert Adversaries . . . . 456--490
Tal Moran and
Moni Naor and
Gil Segev An Optimally Fair Coin Toss . . . . . . 491--513
Carmit Hazay and
Adriana López-Alt and
Hoeteck Wee and
Daniel Wichs Leakage-Resilient Cryptography from
Minimal Assumptions . . . . . . . . . . 514--551
Benny Applebaum Garbling XOR Gates ''For Free'' in the
Standard Model . . . . . . . . . . . . . 552--576
Benny Applebaum and
Andrej Bogdanov and
Alon Rosen A Dichotomy for Local Small-Bias
Generators . . . . . . . . . . . . . . . 577--596
Michel Abdalla and
Pierre-Alain Fouque and
Vadim Lyubashevsky and
Mehdi Tibouchi Tightly Secure Signatures From Lossy
Identification Schemes . . . . . . . . . 597--631
Jean-Sébastien Coron and
David Naccache and
Mehdi Tibouchi and
Ralf-Philipp Weinmann Practical Cryptanalysis of ISO 9796-2
and EMV Signatures . . . . . . . . . . . 632--656
Elena Andreeva and
Charles Bouillaguet and
Orr Dunkelman and
Pierre-Alain Fouque and
Jonathan Hoch and
John Kelsey and
Adi Shamir and
Sébastien Zimmer New Second-Preimage Attacks on Hash
Functions . . . . . . . . . . . . . . . 657--696
Itai Dinur and
Orr Dunkelman and
Nathan Keller and
Adi Shamir Key Recovery Attacks on Iterated
Even--Mansour Encryption Schemes . . . . 697--728
Xavier Boyen Unconditionally Anonymous Ring and Mesh
Signatures . . . . . . . . . . . . . . . 729--774
Eli Biham and
Yaniv Carmeli and
Adi Shamir Bug Attacks . . . . . . . . . . . . . . 775--805
Benjamin Smith The $ \mathbb {Q}$-curve Construction
for Endomorphism-Accelerated Elliptic
Curves . . . . . . . . . . . . . . . . . 806--832
Masayuki Abe and
Melissa Chase and
Bernardo David and
Markulf Kohlweiss and
Ryo Nishimaki and
Miyako Ohkubo Constant-Size Structure-Preserving
Signatures: Generic Constructions and
Simple Assumptions . . . . . . . . . . . 833--878
Gilad Asharov and
Ran Canetti and
Carmit Hazay Toward a Game Theoretic View of Secure
Computation . . . . . . . . . . . . . . 879--926
Franck Landelle and
Thomas Peyrin Cryptanalysis of Full RIPEMD-128 . . . . 927--951
Andreas Winter Weak Locking Capacity of Quantum
Channels Can be Much Larger Than Private
Capacity . . . . . . . . . . . . . . . . 1--21
David Cash and
Alptekin Küpçü and
Daniel Wichs Dynamic Proofs of Retrievability Via
Oblivious RAM . . . . . . . . . . . . . 22--57
Gilad Asharov and
Yehuda Lindell A Full Proof of the BGW Protocol for
Perfectly Secure Multiparty Computation 58--151
Ivan Damgård and
Sebastian Faust and
Pratyay Mukherjee and
Daniele Venturi Bounded Tamper Resilience: How to Go
Beyond the Algebraic Barrier . . . . . . 152--190
Mahdi Cheraghchi and
Venkatesan Guruswami Non-malleable Coding Against Bit-Wise
and Split-State Tampering . . . . . . . 191--241
Alex Escala and
Gottfried Herold and
Eike Kiltz and
Carla R\`afols and
Jorge Villar An Algebraic Framework for
Diffie--Hellman Assumptions . . . . . . 242--288
Zvika Brakerski and
Guy N. Rothblum Obfuscating Conjunctions . . . . . . . . 289--320
Carmit Hazay and
Arpita Patra Efficient One-Sided Adaptively Secure
Computation . . . . . . . . . . . . . . 321--371
Naofumi Homma and
Yu-ichi Hayashi and
Noriyuki Miura and
Daisuke Fujimoto and
Makoto Nagata and
Takafumi Aoki Design Methodology and Validity
Verification for a Reactive
Countermeasure Against EM Attacks . . . 373--391
Daniel Genkin and
Adi Shamir and
Eran Tromer Acoustic Cryptanalysis . . . . . . . . . 392--443
Ilan Komargodski and
Moni Naor and
Eylon Yogev Secret-Sharing for NP . . . . . . . . . 444--469
Dominique Schröder and
Dominique Unruh Security of Blind Signatures Revisited 470--494
Jooyoung Lee and
Martijn Stam and
John Steinberger The Security of Tandem--DM in the Ideal
Cipher Model . . . . . . . . . . . . . . 495--518
Fabrice Benhamouda and
Javier Herranz and
Marc Joye and
Beno\^\it Libert Efficient Cryptosystems From $
\mathbf{2}^{\vec{k}} $-th Power Residue
Symbols . . . . . . . . . . . . . . . . 519--549
Shahin Tajik and
Enrico Dietz and
Sven Frohmann and
Helmar Dittrich and
Dmitry Nedospasov and
Clemens Helfmeier and
Jean-Pierre Seifert and
Christian Boit and
Heinz-Wilhelm Hübers Photonic Side-Channel Analysis of
Arbiter PUFs . . . . . . . . . . . . . . 550--571
Huseyin Hisil and
Craig Costello Jacobian Coordinates on Genus $2$ Curves 572--600
Manoj Prabhakaran and
Mike Rosulek Reconciling Non-malleability with
Homomorphic Encryption . . . . . . . . . 601--671
Benny Applebaum and
Yoni Moses Locally Computable UOWHF with Linear
Shrinkage . . . . . . . . . . . . . . . 672--698
Boaz Barak and
Mohammad Mahmoody Merkle's Key Agreement Protocol is
Optimal: An $ O(n^2) $ Attack on Any Key
Agreement from Random Oracles . . . . . 699--734
Jae Hong Seo Short Signatures from Diffie--Hellman:
Realizing Almost Compact Public Key . . 735--759
H. W. Lenstra, Jr. and
A. Silverberg Lattices with Symmetry . . . . . . . . . 760--804
Gilad Asharov and
Yehuda Lindell and
Thomas Schneider and
Michael Zohner More Efficient Oblivious Transfer
Extensions . . . . . . . . . . . . . . . 805--858
Céline Blondeau and
Gregor Leander and
Kaisa Nyberg Differential--Linear Cryptanalysis
Revisited . . . . . . . . . . . . . . . 859--888
Eike Kiltz and
Adam O'Neill and
Adam Smith Instantiability of RSA--OAEP Under
Chosen--Plaintext Attack . . . . . . . . 889--919
Yosuke Todo Integral Cryptanalysis on Full MISTY1 920--959
Benny Applebaum and
Pavel Raykov From Private Simultaneous Messages to
Zero--Information Arthur--Merlin
Protocols and Back . . . . . . . . . . . 961--988
Nir Bitansky and
Ran Canetti and
Alessandro Chiesa and
Shafi Goldwasser and
Huijia Lin and
Aviad Rubinstein and
Eran Tromer The Hunting of the SNARK . . . . . . . . 989--1066
Sune K. Jakobsen Information Theoretical Cryptogenography 1067--1115
Charanjit S. Jutla and
Arnab Roy Shorter Quasi-Adaptive NIZK Proofs for
Linear Subspaces . . . . . . . . . . . . 1116--1156
Ran Cohen and
Yehuda Lindell Fairness Versus Guaranteed Output
Delivery in Secure Multiparty
Computation . . . . . . . . . . . . . . 1157--1186
Mohammad Hajiabadi and
Bruce M. Kapron Reproducible Circularly Secure Bit
Encryption: Applications and
Realizations . . . . . . . . . . . . . . 1187--1237
Eike Kiltz and
Krzysztof Pietrzak and
Daniele Venturi and
David Cash and
Abhishek Jain Efficient Authentication from Hard
Learning Problems . . . . . . . . . . . 1238--1275
Tibor Jager and
Florian Kohlar and
Sven Schäge and
Jörg Schwenk Authenticated Confidential Channel
Establishment and the Security of
TLS--DHE . . . . . . . . . . . . . . . . 1276--1324
Benny Applebaum and
Yuval Ishai and
Eyal Kushilevitz Minimizing Locality of One-Way Functions
via Semi-private Randomized Encodings 1--22
Dario Catalano and
Dario Fiore Practical Homomorphic Message
Authenticators for Arithmetic Circuits 23--59
Ilan Komargodski and
Gil Segev and
Eylon Yogev Functional Encryption for Randomized
Functionalities in the Private-Key
Setting from Minimal Assumptions . . . . 60--100
Christina Boura and
Virginie Lallemand and
María Naya-Plasencia and
Valentin Suder Making the Impossible Possible . . . . . 101--133
Ilya Mironov and
Omkant Pandey and
Omer Reingold and
Gil Segev Incremental Deterministic Public-Key
Encryption . . . . . . . . . . . . . . . 134--161
Shoni Gilboa and
Shay Gueron and
Ben Morris How Many Queries are Needed to
Distinguish a Truncated Random
Permutation from a Random Function? . . 162--171
Seung Geol Choi and
Dana Dachman-Soled and
Tal Malkin and
Hoeteck Wee A Black-Box Construction of
Non-malleable Encryption from
Semantically Secure Encryption . . . . . 172--201
Zvika Brakerski and
Gil Segev Function-Private Functional Encryption
in the Private--Key Setting . . . . . . 202--225
Eiichiro Fujisaki All-But-Many Encryption . . . . . . . . 226--275
Saqib A. Kakvi and
Eike Kiltz Optimal Security Proofs for Full Domain
Hash, Revisited . . . . . . . . . . . . 276--306
Michel Abdalla and
Mihir Bellare and
Gregory Neven Robust Encryption . . . . . . . . . . . 307--350
Nicolas Bruneau and
Sylvain Guilley and
Zakaria Najm and
Yannick Teglia Multivariate High-Order Attacks of
Shuffled Tables Recomputation . . . . . 351--393
Bin Zhang and
Chao Xu and
Dengguo Feng Practical Cryptanalysis of Bluetooth
Encryption with Condition Masking . . . 394--433
Zvika Brakerski and
Ilan Komargodski and
Gil Segev Multi-input Functional Encryption in the
Private-Key Setting: Stronger Security
from Weaker Assumptions . . . . . . . . 434--520
Ben Morris and
Phillip Rogaway and
Till Stegers Deterministic Encryption with the Thorp
Shuffle . . . . . . . . . . . . . . . . 521--536
Carmit Hazay Oblivious Polynomial Evaluation and
Secure Set-Intersection from Algebraic
PRFs . . . . . . . . . . . . . . . . . . 537--586
Ran Cohen and
Iftach Haitner and
Eran Omri and
Lior Rotem Characterization of Secure Multiparty
Computation Without Broadcast . . . . . 587--609
Shi Bai and
Tancr\`ede Lepoint and
Adeline Roux-Langlois and
Amin Sakzad and
Damien Stehlé and
Ron Steinfeld Improved Security Proofs in
Lattice-Based Cryptography: Using the
Rényi Divergence Rather than the
Statistical Distance . . . . . . . . . . 610--640
Achiya Bar-On and
Eli Biham and
Orr Dunkelman and
Nathan Keller Efficient Slide Attacks . . . . . . . . 641--670
Yehuda Lindell and
Eran Omri and
Hila Zarosim Completeness for Symmetric Two-Party
Functionalities: Revisited . . . . . . . 671--697
Gilad Asharov and
Gil Segev On Constructing One-Way Permutations
from Indistinguishability Obfuscation 698--736
Yehuda Lindell and
Hila Zarosim On the Feasibility of Extending
Oblivious Transfer . . . . . . . . . . . 737--773
Vadim Lyubashevsky and
Daniele Micciancio Asymptotically Efficient Lattice-Based
Digital Signatures . . . . . . . . . . . 774--797
Shay Gueron and
Yehuda Lindell and
Ariel Nof and
Benny Pinkas Fast Garbling of Circuits Under Standard
Assumptions . . . . . . . . . . . . . . 798--844
Brice Minaud and
Patrick Derbez and
Pierre-Alain Fouque and
Pierre Karpman Key-Recovery Attacks on ASASA . . . . . 845--884
Anne Canteaut and
Sergiu Carpov and
Caroline Fontaine and
Tancr\`ede Lepoint and
María Naya-Plasencia and
Pascal Paillier and
Renaud Sirdey Stream Ciphers: A Practical Solution for
Efficient Homomorphic-Ciphertext
Compression . . . . . . . . . . . . . . 885--916
Michel Abdalla and
Fabrice Benhamouda and
Alain Passel\`egue and
Kenneth G. Paterson Related-Key Security for Pseudorandom
Functions Beyond the Linear Barrier . . 917--964
Dominique Unruh Everlasting Multi-party Computation . . 965--1011
Ananth Raghunathan and
Gil Segev and
Salil Vadhan Deterministic Public-Key Encryption for
Adaptively-Chosen Plaintext
Distributions . . . . . . . . . . . . . 1012--1063
Shan Chen and
Rodolphe Lampe and
Jooyoung Lee and
Yannick Seurin and
John Steinberger Minimizing the Two-Round Even-Mansour
Cipher . . . . . . . . . . . . . . . . . 1064--1119
Dennis Hofheinz and
Jörn Müller-Quade and
Dominique Unruh On the (Im-)Possibility of Extending
Coin Toss . . . . . . . . . . . . . . . 1120--1163
Michael Hutter and
Erich Wenger Fast Multi-precision Multiplication for
Public-Key Cryptography on Embedded
Microprocessors . . . . . . . . . . . . 1164--1182
Miia Hermelin and
Joo Yeon Cho and
Kaisa Nyberg Multidimensional Linear Cryptanalysis 1--34
Shi Bai and
Steven D. Galbraith and
Liangze Li and
Daniel Sheffield Improved Combinatorial Algorithms for
the Inhomogeneous Short Integer Solution
Problem . . . . . . . . . . . . . . . . 35--83
Michel Abdalla and
Fabrice Benhamouda and
David Pointcheval On the Tightness of Forward-Secure
Signature Reductions . . . . . . . . . . 84--150
Alexandre Duc and
Stefan Dziembowski and
Sebastian Faust Unifying Leakage Models: From Probing
Attacks to Noisy Leakage . . . . . . . . 151--177
Susumu Kiyoshima Round-Efficient Black-Box Construction
of Composable Multi-Party Computation 178--238
Masayuki Abe and
Jan Camenisch and
Rafael Dowsley and
Maria Dubovitskaya On the Impossibility of
Structure-Preserving Deterministic
Primitives . . . . . . . . . . . . . . . 239--264
Carmit Hazay and
Gert Læssòe Mikkelsen and
Tal Rabin and
Tomas Toft and
Angelo Agatino Nicolosi Efficient RSA Key Generation and
Threshold Paillier in the Two-Party
Setting . . . . . . . . . . . . . . . . 265--323
Gilles Barthe and
Edvard Fagerholm and
Dario Fiore and
John Mitchell and
Andre Scedrov and
Benedikt Schmidt Automated Analysis of Cryptographic
Assumptions in Generic Group Models . . 324--360
Itay Berman and
Iftach Haitner and
Ilan Komargodski and
Moni Naor Hardness-Preserving Reductions via
Cuckoo Hashing . . . . . . . . . . . . . 361--392
Susumu Kiyoshima Non-black-box Simulation in the Fully
Concurrent Setting, Revisited . . . . . 393--434
Florent Bernard and
Patrick Haddad and
Viktor Fischer and
Jean Nicolai From Physical to Stochastic Modeling of
a TERO-Based TRNG . . . . . . . . . . . 435--458
Seung Geol Choi and
Jonathan Katz and
Dominique Schrögder and
Arkady Yerukhimovich and
Hong-Sheng Zhou (Efficient) Universally Composable
Oblivious Transfer Using a Minimal
Number of Stateless Tokens . . . . . . . 459--497
Georg Fuchsbauer and
Christian Hanser and
Daniel Slamanig Structure-Preserving Signatures on
Equivalence Classes and Constant-Size
Anonymous Credentials . . . . . . . . . 498--546
Jung Hee Cheon and
Kyoohyung Han and
Changmin Lee and
Hansol Ryu and
Damien Stehlé Cryptanalysis of the CLT13 Multilinear
Map . . . . . . . . . . . . . . . . . . 547--565
Nils Fleischhacker and
Tibor Jager and
Dominique Schröder On Tight Security Proofs for Schnorr
Signatures . . . . . . . . . . . . . . . 566--599
Gilles Brassard and
Peter Hòyer and
Kassem Kalach and
Marc Kaplan and
Sophie Laplante and
Louis Salvail Key Establishment \`a la Merkle in a
Quantum World . . . . . . . . . . . . . 601--634
Carmit Hazay and
Muthuramakrishnan Venkitasubramaniam On Black-Box Complexity of Universally
Composable Security in the CRS Model . . 635--689
Ran Cohen and
Sandro Coretti and
Juan Garay and
Vassilis Zikas Probabilistic Termination and
Composability of Cryptographic Protocols 690--741
Dana Dachman-Soled and
S. Dov Gordon and
Feng-Hao Liu and
Adam O'Neill and
Hong-Sheng Zhou Leakage Resilience from Program
Obfuscation . . . . . . . . . . . . . . 742--824
Mark Zhandry The Magic of ELFs . . . . . . . . . . . 825--866
Thomaz Oliveira and
Julio López and
Daniel Cervantes-Vázquez and
Francisco Rodr\'ìguez-Henr\'ìquez Koblitz Curves over Quadratic Fields . . 867--894
Philipp Jovanovic and
Atul Luykx and
Bart Mennink and
Yu Sasaki and
Kan Yasuda Beyond Conventional Security in
Sponge-Based Authenticated Encryption
Modes . . . . . . . . . . . . . . . . . 895--940
Dana Dachman-Soled and
Chang Liu and
Charalampos Papamanthou and
Elaine Shi and
Uzi Vishkin Oblivious Network RAM and Leveraging
Parallelism to Achieve Obliviousness . . 941--972
Masayuki Abe and
Jens Groth and
Markulf Kohlweiss and
Miyako Ohkubo and
Mehdi Tibouchi Efficient Fully Structure-Preserving
Signatures and Shrinking Commitments . . 973--1025
Yehuda Lindell and
Benny Pinkas and
Nigel P. Smart and
Avishay Yanai Efficient Constant-Round Multi-party
Computation Combining BMR and SPDZ . . . 1026--1069
Felipe G. Lacerda and
Joseph M. Renes and
Renato Renner Classical Leakage Resilience from
Fault-Tolerant Quantum Computation . . . 1071--1094
Estuardo Alpirez Bock and
Joppe W. Bos and
Chris Brzuska and
Charles Hubain and
Wil Michiels and
Cristofaro Mune and
Eloi Sanfelix Gonzalez and
Philippe Teuwen and
Alexander Treff White-Box Cryptography: Don't Forget
About Grey-Box Attacks . . . . . . . . . 1095--1143
Carmit Hazay and
Avishay Yanai Constant-Round Maliciously Secure
Two-Party Computation in the RAM Model 1144--1199
Carmit Hazay and
Muthuramakrishnan Venkitasubramaniam What Security Can We Achieve Within 4
Rounds? . . . . . . . . . . . . . . . . 1200--1262
Alexandre Duc and
Sebastian Faust and
François-Xavier Standaert Making Masking Security Proofs Concrete
(Or How to Evaluate the Security of Any
Leaking Device), Extended Version . . . 1263--1297
Razvan Barbulescu and
Sylvain Duquesne Updating Key Size Estimations for
Pairings . . . . . . . . . . . . . . . . 1298--1336
Atsushi Takayasu and
Yao Lu and
Liqiang Peng Small CRT-Exponent RSA Revisited . . . . 1337--1382
Yosuke Todo and
Gregor Leander and
Yu Sasaki Nonlinear Invariant Attack: Practical
Attack on Full SCREAM, iSCREAM, and
Midori64 . . . . . . . . . . . . . . . . 1383--1422
Colin Chaigneau and
Thomas Fuhr and
Henri Gilbert and
Jérémy Jean and
Jean-René Reinhard Cryptanalysis of NORX v2.0 . . . . . . . 1423--1447
Itai Dinur and
Orr Dunkelman and
Nathan Keller and
Adi Shamir Efficient Dissection of Bicomposite
Problems with Cryptanalytic Applications 1448--1490
Tatsuaki Okamoto and
Katsuyuki Takashima Fully Secure Functional Encryption with
a Large Class of Relations from the
Decisional Linear Assumption . . . . . . 1491--1573
Qian Guo and
Thomas Johansson and
Carl Löndahl Solving LPN Using Covering Codes . . . . 1--33
Ilaria Chillotti and
Nicolas Gama and
Mariya Georgieva and
Malika Izabach\`ene TFHE: Fast Fully Homomorphic Encryption
Over the Torus . . . . . . . . . . . . . 34--91
Sabyasachi Karati and
Palash Sarkar Kummer for Genus One Over Prime-Order
Fields . . . . . . . . . . . . . . . . . 92--129
Steven D. Galbraith and
Christophe Petit and
Javier Silva Identification Protocols and Signature
Schemes Based on Supersingular Isogeny
Problems . . . . . . . . . . . . . . . . 130--175
Adi Akavia and
Rio LaVigne and
Tal Moran Topology-Hiding Computation on All
Graphs . . . . . . . . . . . . . . . . . 176--227
Jian Guo and
Guohong Liao and
Guozhen Liu and
Meicheng Liu and
Kexin Qiao and
Ling Song Practical Collision Attacks against
Round-Reduced SHA-3 . . . . . . . . . . 228--270
Carmit Hazay and
Muthuramakrishnan Venkitasubramaniam On the Power of Secure Two-Party
Computation . . . . . . . . . . . . . . 271--318
Dana Dachman-Soled and
Feng-Hao Liu and
Elaine Shi and
Hong-Sheng Zhou Locally Decodable and Updatable
Non-malleable Codes and Their
Applications . . . . . . . . . . . . . . 319--355
Nir Bitansky and
Ryo Nishimaki and
Alain Passel\`egue and
Daniel Wichs From Cryptomania to Obfustopia Through
Secret-Key Functional Encryption . . . . 357--405
Ilan Komargodski and
Gil Segev From Minicrypt to Obfustopia via
Private-Key Functional Encryption . . . 406--458
Nir Bitansky Verifiable Random Functions from
Non-interactive
Witness-Indistinguishable Proofs . . . . 459--493
David A. Basin and
Andreas Lochbihler and
S. Reza Sefidgar CryptHOL: Game-Based Proofs in
Higher-Order Logic . . . . . . . . . . . 494--566
Tomer Ashur and
Tim Beyne and
Vincent Rijmen Revisiting the Wrong-Key-Randomization
Hypothesis . . . . . . . . . . . . . . . 567--594
Dana Dachman-Soled and
Nils Fleischhacker and
Jonathan Katz and
Anna Lysyanskaya and
Dominique Schröder Feasibility and Infeasibility of Secure
Computation with Malicious PUFs . . . . 595--617
Sam Kim and
David J. Wu Multi-theorem Preprocessing NIZKs from
Lattices . . . . . . . . . . . . . . . . 619--702
Avik Chakraborti and
Tetsu Iwata and
Kazuhiko Minematsu and
Mridul Nandi Blockcipher-Based Authenticated
Encryption: How Small Can We Go? . . . . 703--741
Zhenzhen Bao and
Itai Dinur and
Jian Guo and
Gaëtan Leurent and
Lei Wang Generic Attacks on Hash Combiners . . . 742--823
Itai Dinur and
Nathan Keller and
Ohad Klein An Optimal Distributed Discrete Log
Protocol with Applications to
Homomorphic Secret Sharing . . . . . . . 824--873
Itai Dinur Cryptanalytic Time--Memory--Data
Trade-offs for FX-Constructions and the
Affine Equivalence Problem . . . . . . . 874--909
Orr Dunkelman and
Nathan Keller and
Eran Lambooij and
Yu Sasaki A Practical Forgery Attack on
Lilliput--AE . . . . . . . . . . . . . . 910--916
Benny Applebaum and
Thomas Holenstein and
Manoj Mishra and
Ofer Shayevitz The Communication Complexity of Private
Simultaneous Messages, Revisited . . . . 917--953
Lucas Kowalczyk and
Hoeteck Wee Compact Adaptively Secure ABE for $
\mathsf{NC}^1 $ from $k$-Lin . . . . . . 954--1002
Achiya Bar-On and
Orr Dunkelman and
Nathan Keller and
Eyal Ronen and
Adi Shamir Improved Key Recovery Attacks on
Reduced-Round AES with Practical Data
and Memory Complexities . . . . . . . . 1003--1043
Bhavana Kanukurthi and
Sai Lakshmi Bhavana Obbattu and
Sruthi Sekar Four-State Non-malleable Codes with
Explicit Constant Rate . . . . . . . . . 1044--1079
Martin R. Albrecht and
Pooya Farshim and
Shuai Han and
Dennis Hofheinz and
Enrique Larraia and
Kenneth G. Paterson Multilinear Maps from Obfuscation . . . 1080--1113
Felix Wegener and
Lauren De Meyer and
Amir Moradi Spin Me Right Round Rotational Symmetry
for FPGA-Specific AES: Extended Version 1114--1155
Tim Beyne Block Cipher Invariants as Eigenvectors
of Correlation Matrices . . . . . . . . 1156--1183
Patrick Derbez and
Léo Perrin Meet-in-the-Middle Attacks and
Structural Analysis of Round-Reduced
PRINCE . . . . . . . . . . . . . . . . . 1184--1215
Masaud Y. Alhassan and
Daniel Günther and
Ágnes Kiss and
Thomas Schneider Efficient and Scalable Universal
Circuits . . . . . . . . . . . . . . . . 1216--1271
Ashwin Jha and
Mridul Nandi Tight Security of Cascaded LRW2 . . . . 1272--1317
Susumu Kiyoshima Statistical Concurrent Non-Malleable
Zero-Knowledge from One-Way Functions 1318--1361
Paul Bunn and
Rafail Ostrovsky Oblivious Sampling with Applications to
Two-Party $k$-Means Clustering . . . . . 1362--1403
Beno\^\it Libert and
Moti Yung Adaptively Secure Non-interactive
CCA-Secure Threshold Cryptosystems:
Generic Framework and Constructions . . 1405--1441
Michael Hutter and
Erich Wenger Fast Multi-precision Multiplication for
Public-Key Cryptography on Embedded
Microprocessors . . . . . . . . . . . . 1442--1460
Ralf Küsters and
Max Tuengerthal and
Daniel Rausch The IITM Model: A Simple and Expressive
Model for Universal Composability . . . 1461--1584
Ralf Küsters and
Max Tuengerthal and
Daniel Rausch Joint State Composition Theorems for
Public-Key Encryption and Digital
Signature Functionalities with Local
Computation . . . . . . . . . . . . . . 1585--1658
Amos Beimel and
Yehuda Lindell and
Eran Omri and
Ilan Orlov $ \vec {1 / p}$-Secure Multiparty
Computation without an Honest Majority
and the Best of Both Worlds . . . . . . 1659--1731
Carmit Hazay and
Peter Scholl and
Eduardo Soria-Vazquez Low Cost Constant Round MPC Combining
BMR and Oblivious Transfer . . . . . . . 1732--1786
Roman Langrehr and
Jiaxin Pan Tightly Secure Hierarchical
Identity-Based Encryption . . . . . . . 1787--1821
Jonathan Bootle and
Andrea Cerulli and
Pyrros Chaidos and
Essam Ghadafi and
Jens Groth Foundations of Fully Dynamic Group
Signatures . . . . . . . . . . . . . . . 1822--1870
Akiko Inoue and
Tetsu Iwata and
Kazuhiko Minematsu and
Bertram Poettering Cryptanalysis of OCB2: Attacks on
Authenticity and Confidentiality . . . . 1871--1913
Katriel Cohn-Gordon and
Cas Cremers and
Benjamin Dowling and
Luke Garratt and
Douglas Stebila A Formal Security Analysis of the Signal
Messaging Protocol . . . . . . . . . . . 1914--1983
Sandro Coretti and
Yevgeniy Dodis and
Ueli Maurer and
Björn Tackmann and
Daniele Venturi Non-malleable Encryption: Simpler,
Shorter, Stronger . . . . . . . . . . . 1984--2033
Sebastian Faust and
Pratyay Mukherjee and
Jesper Buus Nielsen and
Daniele Venturi Continuously Non-malleable Codes in the
Split-State Model . . . . . . . . . . . 2034--2077
Jonathan Ullman and
Salil Vadhan PCPs and the Hardness of Generating
Synthetic Data . . . . . . . . . . . . . 2078--2112
Benjamin Wesolowski Efficient Verifiable Delay Functions . . 2113--2147
Alon Rosen and
Gil Segev and
Ido Shahaf Can PPAD Hardness be Based on Standard
Cryptographic Assumptions? . . . . . . . ??
Shai Halevi and
Victor Shoup Bootstrapping for HElib . . . . . . . . ??
Mark Zhandry Quantum Lightning Never Strikes the Same
State Twice. Or: Quantum Money from
Cryptographic Assumptions . . . . . . . ??
Shuichi Katsumata and
Shota Yamada and
Takashi Yamakawa Tighter Security Proofs for GPV--IBE in
the Quantum Random Oracle Model . . . . ??
Christian Kaspers and
Yue Zhou The Number of Almost Perfect Nonlinear
Functions Grows Exponentially . . . . . ??
Ron D. Rothblum and
Adam Sealfon and
Katerina Sotiraki Toward Non-interactive Zero-Knowledge
Proofs for NP from LWE . . . . . . . . . ??
Ran Canetti and
Benjamin Fuller and
Omer Paneth and
Leonid Reyzin and
Adam Smith Reusable Fuzzy Extractors for
Low-Entropy Distributions . . . . . . . ??
Léo Ducas and
Yang Yu Learning Strikes Again: The Case of the
DRS Signature Scheme . . . . . . . . . . ??
Benny Applebaum and
Zvika Brakerski Obfuscating Circuits Via Composite-Order
Graded Encoding . . . . . . . . . . . . ??
David Derler and
Kai Gellert and
Tibor Jager and
Daniel Slamanig and
Christoph Striecks Bloom Filter Encryption and Applications
to Efficient Forward-Secret 0-RTT Key
Exchange . . . . . . . . . . . . . . . . ??
Ran Cohen and
Sandro Coretti and
Juan Garay and
Vassilis Zikas Round-Preserving Parallel Composition of
Probabilistic-Termination Cryptographic
Protocols . . . . . . . . . . . . . . . ??
Benny Applebaum and
Prashant Nalini Vasudevan Placing Conditional Disclosure of
Secrets in the Communication Complexity
Universe . . . . . . . . . . . . . . . . ??
Fabrice Benhamouda and
Akshay Degwekar and
Yuval Ishai and
Tal Rabin On the Local Leakage Resilience of
Linear Secret Sharing Schemes . . . . . ??
Gilad Asharov and
Gil Segev and
Ido Shahaf Tight Tradeoffs in Searchable Symmetric
Encryption . . . . . . . . . . . . . . . ??
Behzad Abdolmaleki and
Helger Lipmaa and
Janno Siim and
Micha\l Zajac On Subversion-Resistant SNARKs . . . . . ??
Giuseppe Ateniese and
Danilo Francati and
David Nuñez and
Daniele Venturi Match Me if You Can: Matchmaking
Encryption and Its Applications . . . . ??
Rijmen Vincent Editorial . . . . . . . . . . . . . . . ??
Antonio Flórez-Gutiérrez and
Gaëtan Leurent and
María Naya-Plasencia and
Léo Perrin and
André Schrottenloher and
Ferdinand Sibleyras Internal Symmetries and Linear
Properties: Full-permutation
Distinguishers and Improved Collisions
on Gimli . . . . . . . . . . . . . . . . ??
Yehuda Lindell Fast Secure Two-Party ECDSA Signing . . ??
Amir Jafari and
Shahram Khazaei On Abelian and Homomorphic Secret
Sharing Schemes . . . . . . . . . . . . ??
Shuichi Katsumata and
Ryo Nishimaki and
Shota Yamada and
Takashi Yamakawa Compact Designated Verifier NIZKs from
the CDH Assumption Without Pairings . . ??
Vincent Rijmen Correction to: Editorial . . . . . . . . ??
Arpita Patra and
Divya Ravi On the Exact Round Complexity of Secure
Three--Party Computation . . . . . . . . ??
Lior Rotem and
Gil Segev Injective Trapdoor Functions via
Derandomization: How Strong is Rudich's
Black-Box Barrier? . . . . . . . . . . . ??
Andrej Bogdanov and
Yuval Ishai and
Akshayaram Srinivasan Unconditionally Secure Computation
Against Low-Complexity Leakage . . . . . ??
Benjamin Dowling and
Marc Fischlin and
Felix Günther and
Douglas Stebila A Cryptographic Analysis of the TLS 1.3
Handshake Protocol . . . . . . . . . . . ??
Ted Krovetz and
Phillip Rogaway The Design and Evolution of OCB . . . . ??
Dragos Rotaru and
Nigel P. Smart and
Titouan Tanguy and
Frederik Vercauteren and
Tim Wood Actively Secure Setup for SPDZ . . . . . ??
Ran Cohen and
Iftach Haitner and
Eran Omri and
Lior Rotem From Fairness to Full Security in
Multiparty Computation . . . . . . . . . ??
Marek Sýs and
Lubomír Obrátil and
Vashek Matyás and
Dusan Klinec A Bad Day to Die Hard: Correcting the
Dieharder Battery . . . . . . . . . . . ??
Andrej Bogdanov and
Yuval Ishai and
Akshayaram Srinivasan Correction to: Unconditionally Secure
Computation Against Low-Complexity
Leakage . . . . . . . . . . . . . . . . ??
Siyao Guo and
Pritish Kamath and
Alon Rosen and
Katerina Sotiraki Limits on the Efficiency of (Ring)
LWE--Based Non-interactive Key Exchange ??
Roy Radian and
Or Sattath Semi-quantum Money . . . . . . . . . . . ??
Andrej Bogdanov and
Yuval Ishai and
Akshayaram Srinivasan Correction to: Unconditionally Secure
Computation Against Low--Complexity
Leakage . . . . . . . . . . . . . . . . ??
Gilad Asharov and
T.-H. Hubert Chan and
Kartik Nayak and
Rafael Pass and
Ling Ren and
Elaine Shi Locality-Preserving Oblivious RAM . . . ??
Fuyuki Kitagawa and
Ryo Nishimaki and
Keisuke Tanaka Obfustopia Built on Secret-Key
Functional Encryption . . . . . . . . . ??
Nir Bitansky and
Vinod Vaikuntanathan A Note on Perfect Correctness by
Derandomization . . . . . . . . . . . . ??
Keitaro Hashimoto and
Shuichi Katsumata and
Thomas Prest An Efficient and Generic Construction
for Signal's Handshake (X3DH):
Post-quantum, State Leakage Secure, and
Deniable . . . . . . . . . . . . . . . . ??
Susumu Kiyoshima Constant-Round Leakage-Resilient
Zero-Knowledge from Collision Resistance ??
Nir Bitansky and
Alessandro Chiesa and
Omer Paneth Succinct Non-Interactive Arguments via
Linear Interactive Proofs . . . . . . . ??
Fuyuki Kitagawa and
Ryo Nishimaki and
Keisuke Tanaka Obfustopia Built on Secret-Key
Functional Encryption . . . . . . . . . ??
Bernardo Magri and
Giulio Malavolta and
Dominique Unruh Everlasting UC Commitments from Fully
Malicious PUFs . . . . . . . . . . . . . ??
Gilad Asharov and
Ilan Komargodski and
Naomi Sirkin On the Complexity of Compressing
Obfuscation . . . . . . . . . . . . . . ??
Charles Grover and
Andrew Mendelsohn and
Roope Vehkalahti Non-commutative Ring Learning with
Errors from Cyclic Algebras . . . . . . ??
Carmit Hazay and
Muthuramakrishnan Venkitasubramaniam and
Mor Weiss ZK-PCPs from Leakage-Resilient Secret
Sharing . . . . . . . . . . . . . . . . ??
Katharina Boudgoust and
Corentin Jeudy and
Adeline Roux-Langlois and
Weiqiang Wen On the Hardness of Module Learning with
Errors with Short Distributions . . . . ??
Navid Alamati and
Hart Montgomery and
Sikhar Patranabis and
Arnab Roy Minicrypt Primitives with Algebraic
Structure and Applications . . . . . . . ??
Yunwen Liu and
Zhongfeng Niu and
Siwei Sun and
Chao Li and
Lei Hu Rotational Differential--Linear
Cryptanalysis Revisited . . . . . . . . ??
David Pointcheval and
Nigel Paul Smart Topical Collection on Computing on
Encrypted Data . . . . . . . . . . . . . ??
Benny Applebaum and
Yoni Moses Correction: Locally Computable UOWHF
with Linear Shrinkage . . . . . . . . . ??
Pratish Datta and
Ilan Komargodski and
Brent Waters Decentralized Multi-authority ABE for $
{\sf NC}^1 $ from BDH . . . . . . . . . ??
Gilad Asharov and
Ilan Komargodski and
Wei-Kai Lin and
Elaine Shi Oblivious RAM with Worst-Case
Logarithmic Overhead . . . . . . . . . . ??
Jonathan Takeshita and
Ryan Karl and
Ting Gong and
Taeho Jung SLAP: Simpler, Improved Private Stream
Aggregation from Ring Learning with
Errors . . . . . . . . . . . . . . . . . ??
Susumu Kiyoshima No-Signaling Linear PCPs . . . . . . . . ??
Christian Mouchet and
Elliott Bertrand and
Jean-Pierre Hubaux An Efficient Threshold Access-Structure
for RLWE-Based Multiparty Homomorphic
Encryption . . . . . . . . . . . . . . . ??
Ran Cohen and
Abhi Shelat and
Daniel Wichs Adaptively Secure MPC with Sublinear
Communication Complexity . . . . . . . . ??
Robin Geelen and
Frederik Vercauteren Bootstrapping for BGV and BFV Revisited ??
Ashish Choudhury and
Arpita Patra On the Communication Efficiency of
Statistically Secure Asynchronous MPC
with Optimal Resilience . . . . . . . . ??
Fuyuki Kitagawa and
Takahiro Matsuda and
Takashi Yamakawa NIZK from SNARGs . . . . . . . . . . . . ??
Koji Chida and
Koki Hamada and
Dai Ikarashi and
Ryo Kikuchi and
Daniel Genkin and
Yehuda Lindell and
Ariel Nof Fast Large-Scale Honest-Majority MPC for
Malicious Adversaries . . . . . . . . . ??
Ananya Appan and
Anirudh Chandramouli and
Ashish Choudhury Revisiting the Efficiency of
Asynchronous MPC with Optimal Resilience
Against General Adversaries . . . . . . ??
Cyril Bouvier and
Guilhem Castagnos and
Laurent Imbert and
Fabien Laguillaumie I Want to Ride My BICYCL: BICYCL
Implements CryptographY in CLass Groups ??
Murilo Coutinho and
Iago Passos and
Juan C. Grados Vásquez and
Santanu Sarkar and
Fábio L. L. de Mendonça and
Rafael T. de Sousa and
Fábio Borges Latin Dances Reloaded: Improved
Cryptanalysis Against Salsa and ChaCha,
and the Proposal of Forró . . . . . . . . ??
Sayandeep Saha and
Manaar Alam and
Arnab Bag and
Debdeep Mukhopadhyay and
Pallab Dasgupta Learn from Your Faults: Leakage
Assessment in Fault Attacks Using Deep
Learning . . . . . . . . . . . . . . . . ??
Elette Boyle and
Ran Cohen and
Deepesh Data and
Pavel Hubá\vcek Must the Communication Graph of MPC
Protocols be an Expander? . . . . . . . ??
Jun Furukawa and
Yehuda Lindell and
Ariel Nof and
Or Weinstein High-Throughput Secure Three-Party
Computation with an Honest Majority . . ??
Nishat Koti and
Shravani Patil and
Arpita Patra and
Ajith Suresh MPClan: Protocol Suite for
Privacy-Conscious Computations . . . . . ??
Beno\^\it Libert and
San Ling and
Khoa Nguyen and
Huaxiong Wang Zero-Knowledge Arguments for
Lattice-Based Accumulators:
Logarithmic-Size Ring Signatures and
Group Signatures Without Trapdoors . . . ??
Bar Alon and
Eran Omri Almost-Optimally Fair Multiparty
Coin-Tossing with Nearly Three-Quarters
Malicious . . . . . . . . . . . . . . . ??
Bar Alon and
Ran Cohen and
Eran Omri and
Tom Suad On the Power of an Honest Majority in
Three-Party Computation Without
Broadcast . . . . . . . . . . . . . . . ??
Carmit Hazay and
Yuval Ishai and
Muthuramakrishnan Venkitasubramaniam Actively Secure Garbled Circuits with
Constant Communication Overhead in the
Plain Model . . . . . . . . . . . . . . ??
Zvika Brakerski and
Nico Döttling and
Sanjam Garg and
Giulio Malavolta Candidate iO from Homomorphic Encryption
Schemes . . . . . . . . . . . . . . . . ??
Loris Bergerat and
Anas Boudi and
Quentin Bourgerie and
Ilaria Chillotti and
Damien Ligier and
Jean-Baptiste Orfila and
Samuel Tap Parameter Optimization and Larger
Precision for (T)FHE . . . . . . . . . . ??
Uddipana Dowerah and
Subhranil Dutta and
Aikaterini Mitrokotsa and
Sayantan Mukherjee and
Tapas Pal Unbounded Predicate Inner Product
Functional Encryption from Pairings . . ??
Arpita Patra and
Divya Ravi Beyond Honest Majority: The Round
Complexity of Fair and Robust
Multi-party Computation . . . . . . . . ??
Mariya Georgieva Belorgey and
Sergiu Carpov and
Kevin Deforth and
Dimitar Jetchev and
Abson Sae-Tang and
Marius Vuille and
Nicolas Gama and
Jon Katz and
Iraklis Leontiadis and
Mohsen Mohammadi Manticore: A Framework for Efficient
Multiparty Computation Supporting Real
Number and Boolean Arithmetic . . . . . ??
Song Tian Cover Attacks for Elliptic Curves over
Cubic Extension Fields . . . . . . . . . ??
Yuval Ishai and
Alexis Korb and
Paul Lou and
Amit Sahai Beyond the Csiszár--Körner Bound:
Best--Possible Wiretap Coding via
Obfuscation . . . . . . . . . . . . . . ??
Elette Boyle and
Ran Cohen and
Aarushi Goel Breaking the $ O(\sqrt {n}) $-Bit
Barrier: Byzantine Agreement with
Polylog Bits Per Party . . . . . . . . . ??
Nir Drucker and
Guy Moshkowich and
Tomer Pelleg and
Hayim Shaul BLEACH: Cleaning Errors in Discrete
Computations Over CKKS . . . . . . . . . ??
Jiang Zhang and
Yu Chen and
Zhenfeng Zhang Lattice-Based Programmable Hash
Functions and Applications . . . . . . . ??
Gilles Barthe and
Sonia Bela\"\id and
Thomas Espitau and
Pierre-Alain Fouque and
Benjamin Grégoire and
Mélissa Rossi and
Mehdi Tibouchi Masking the GLP Lattice-Based Signature
Scheme at Any Order . . . . . . . . . . ??
Gabrielle De Micheli and
Pierrick Gaudry and
Cécile Pierrot Lattice Enumeration and Automorphisms
for Tower NFS: a 521-Bit Discrete
Logarithm Computation . . . . . . . . . ??
Daniel J. Bernstein Cryptographic Competitions . . . . . . . ??
Valerio Cini and
Sebastian Ramacher and
Daniel Slamanig and
Christoph Striecks and
Erkan Tairi (Inner-Product) Functional Encryption
with Updatable Ciphertexts . . . . . . . ??
Marc Fischlin and
Felix Günther and
Christian Janson Robust Channels: Handling Unreliable
Networks in the Record Layers of QUIC
and DTLS 1.3 . . . . . . . . . . . . . . ??
Akshima and
Siyao Guo and
Qipeng Liu Time-Space Lower Bounds for Finding
Collisions in Merkle--Damgård Hash
Functions . . . . . . . . . . . . . . . ??
Dmitrii Koshelev Hashing to Elliptic Curves Through
Cipolla--Lehmer--Müller's Square Root
Algorithm . . . . . . . . . . . . . . . ??
Dennis Hofheinz and
Jessica Koch and
Christoph Striecks Identity-Based Encryption with (Almost)
Tight Security in the Multi-instance,
Multi-ciphertext Setting . . . . . . . . ??
David Lubicz and
Viktor Fischer Entropy Computation for Oscillator-based
Physical Random Number Generators . . . ??
Ron D. Rothblum and
Prashant Nalini Vasudevan Collision Resistance from
Multi-collision Resistance . . . . . . . ??
Elena Andreeva and
Andrey Bogdanov and
Nilanjan Datta and
Atul Luykx and
Bart Mennink and
Mridul Nandi and
Elmar Tischhauser and
Kan Yasuda The COLM Authenticated Encryption Scheme ??
Jeremiah Blocki and
Peiyuan Liu and
Ling Ren and
Samson Zhou Bandwidth-Hard Functions: Reductions and
Lower Bounds . . . . . . . . . . . . . . ??
Aggelos Kiayias and
Feng-Hao Liu and
Yiannis Tselekounis (Continuous) Non-malleable Codes for
Partial Functions with Manipulation
Detection and Light Updates . . . . . . ??
Christian Badertscher and
Ueli Maurer and
Daniel Tschudi and
Vassilis Zikas Bitcoin as a Transaction Ledger: a
Composable Treatment . . . . . . . . . . ??
Qianqian Yang and
Ling Song and
Nana Zhang and
Danping Shi and
Libo Wang and
Jiahao Zhao and
Lei Hu and
Jian Weng Optimizing Rectangle and Boomerang
Attacks: a Unified and Generic Framework
for Key Recovery . . . . . . . . . . . . ??
Morten Òygarden and
Patrick Felke and
Håvard Raddum Analysis of Multivariate Encryption
Schemes: Application to Dob and $ C^* $ ??
Mihir Bellare and
Anna Lysyanskaya Symmetric and Dual PRFs from Standard
Assumptions: a Generic Validation of a
Prevailing Assumption . . . . . . . . . ??
Ran Cohen and
Jack Doerner and
Yashvanth Kondi and
Abhi Shelat Guaranteed Output in $ O(\sqrt {n}) $
Rounds for Round-Robin Sampling
Protocols . . . . . . . . . . . . . . . ??
Jung Hee Cheon and
Wonhee Cho and
Jiseung Kim Improved Universal Thresholdizer from
Iterative Shamir Secret Sharing . . . . ??
Matteo Campanelli and
Dario Fiore and
Rosario Gennaro Natively Compatible Super-Efficient
Lookup Arguments and How to Apply Them ??
Agathe Beaugrand and
Guilhem Castagnos and
Fabien Laguillaumie Efficient Succinct Zero-Knowledge
Arguments in the CL Framework . . . . . ??
Jianwei Li and
Phong Q. Nguyen A Complete Analysis of the BKZ Lattice
Reduction Algorithm . . . . . . . . . . ??
Chaya Ganesh and
Claudio Orlandi and
Mahak Pancholi and
Akira Takahashi and
Daniel Tschudi Fiat--Shamir Bulletproofs are
Non-malleable (in the Random Oracle
Model) . . . . . . . . . . . . . . . . . ??
Dung Bui and
Haotian Chu and
Geoffroy Couteau and
Xiao Wang and
Chenkai Weng and
Kang Yang and
Yu Yu An Efficient ZK Compiler from SIMD
Circuits to General Circuits . . . . . . ??
Gildas Avoine and
Lo\"\ic Ferreira Decrypting Without Keys: The Case of the
GlobalPlatform SCP02 Protocol . . . . . ??
Chris Brzuska and
Geoffroy Couteau On Building Fine-Grained One-Way
Functions from Strong Average-Case
Hardness . . . . . . . . . . . . . . . . ??
Gennaro Avitabile and
Vincenzo Botta and
Daniele Friolo and
Daniele Venturi and
Ivan Visconti Compact Proofs of Partial Knowledge for
Overlapping CNF Formulae . . . . . . . . ??
Valeh Farzaliyev and
Calvin Pärn and
Heleen Saarse and
Jan Willemson Lattice-Based Zero-Knowledge Proofs in
Action: Applications to Electronic
Voting . . . . . . . . . . . . . . . . . ??
Adi Akavia and
Craig Gentry and
Shai Halevi and
Margarita Vald Achievable CCA2 Relaxation for
Homomorphic Encryption . . . . . . . . . ??
Alexander R. Block and
Albert Garreta and
Pratyush Ranjan Tiwari and
Micha\l Zaj\kac On Soundness Notions for Interactive
Oracle Proofs . . . . . . . . . . . . . ??
Jorge Chávez-Saab and
Francisco Rodríguez-Henríquez and
Mehdi Tibouchi SwiftEC: Shallue--van de Woestijne
Indifferentiable Function To Elliptic
Curves . . . . . . . . . . . . . . . . . ??
Gaëtan Leurent and
Clara Pernot New Representations of the AES Key
Schedule . . . . . . . . . . . . . . . . ??
Carmit Hazay and
Muthuramakrishnan Venkitasubramaniam and
Mor Weiss Protecting Distributed Primitives
Against Leakage: Equivocal Secret
Sharing and more . . . . . . . . . . . . ??
Xinxin Fan and
Veronika Kuchta and
Francesco Sica and
Lei Xu Speeding Up Multi-scalar Multiplications
for Pairing-Based zkSNARKs . . . . . . . ??
Claude Carlet Two Generalizations of Almost Perfect
Nonlinearity . . . . . . . . . . . . . . ??
Hongrui Cui and
Xiao Wang and
Kang Yang and
Yu Yu Actively Secure Half-Gates with Minimum
Overhead under Duplex Networks . . . . . ??
Jianwei Li and
Phong Q. Nguyen Correction to: A Complete Analysis of
the BKZ Lattice Reduction Algorithm . . ??
Tianyi Liu and
Zhenfei Zhang and
Yuncong Zhang and
Wenqing Hu and
Ye Zhang \pkgCeno: Non-uniform, Segment and
Parallel Zero-Knowledge Virtual Machine ??