|
Lattice-Based Cryptography |
|
|
|
Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing |
|
|
3 | (20) |
|
|
Coded-BKW: Solving LWE Using Lattice Codes |
|
|
23 | (20) |
|
|
|
|
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices |
|
|
43 | (20) |
|
|
|
Provably Weak Instances of Ring-LWE |
|
|
63 | (32) |
|
|
|
|
|
|
|
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis |
|
|
95 | (21) |
|
|
|
|
|
|
|
|
|
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure |
|
|
116 | (25) |
|
|
|
Capacity and Data Complexity in Multidimensional Linear Attack |
|
|
141 | (20) |
|
|
|
|
|
Observations on the SIMON Block Cipher Family |
|
|
161 | (28) |
|
|
|
|
|
|
Tweaking Even-Mansour Ciphers |
|
|
189 | (20) |
|
|
|
|
Multi-key Security: The Even-Mansour Construction Revisited |
|
|
209 | (15) |
|
|
|
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations |
|
|
224 | (23) |
|
|
|
|
|
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations |
|
|
247 | (20) |
|
|
|
|
|
|
|
|
|
|
New Multilinear Maps Over the Integers |
|
|
267 | (20) |
|
|
|
|
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation |
|
|
287 | (21) |
|
|
|
|
Indistinguishability Obfuscation from Compact Functional Encryption |
|
|
308 | (21) |
|
|
|
|
|
Efficient Pseudorandom Functions via On-the-Fly Adaptation |
|
|
329 | (22) |
|
|
|
The Iterated Random Permutation Problem with Applications to Cascade Encryption |
|
|
351 | (17) |
|
|
|
The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC |
|
|
368 | (20) |
|
|
|
|
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security |
|
|
388 | (25) |
|
|
|
|
Block Cipher Cryptanalysis |
|
|
|
Integral Cryptanalysis on Full MISTY1 |
|
|
413 | (20) |
|
|
New Attacks on Feistel Structures with Improved Memory Complexities |
|
|
433 | (22) |
|
|
|
|
|
Known-Key Distinguisher on Full PRESENT |
|
|
455 | (20) |
|
|
|
|
Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-Boxes |
|
|
475 | (18) |
|
|
|
|
|
|
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance |
|
|
493 | (25) |
|
|
|
|
|
Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More |
|
|
518 | (20) |
|
|
|
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations |
|
|
538 | (23) |
|
|
|
|
|
|
|
|
Cryptanalysis of the Co-ACD Assumption |
|
|
561 | (20) |
|
|
|
|
|
Last Fall Degree, HFE, and Weil Descent Attacks on ECDLP |
|
|
581 | (20) |
|
|
|
|
A Quasipolynomial Reduction for Generalized Selective Decryption on Trees |
|
|
601 | (22) |
|
|
|
|
Hash Functions and Stream Cipher Cryptanalysis |
|
|
|
Practical Free-Start Collision Attacks on 76-step SHA-1 |
|
|
623 | (20) |
|
|
|
|
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 |
|
|
643 | (20) |
|
|
|
|
Cryptanalysis of Full Sprout |
|
|
663 | (20) |
|
|
|
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE |
|
|
683 | (22) |
|
|
|
|
|
|
Decaf: Eliminating Cofactors Through Point Compression |
|
|
705 | (19) |
|
|
Actively Secure OT Extension with Optimal Overhead |
|
|
724 | (18) |
|
|
|
|
Algebraic Decomposition for Probing Security |
|
|
742 | (22) |
|
|
|
|
|
Consolidating Masking Schemes |
|
|
764 | (21) |
|
|
|
|
|
Author Index |
|
785 | |