Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_30
Yoshinori Aono, Yuntao Wang, Takuya Hayashi, T. Takagi
{"title":"Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator","authors":"Yoshinori Aono, Yuntao Wang, Takuya Hayashi, T. Takagi","doi":"10.1007/978-3-662-49890-3_30","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_30","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125861263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_31
Marshall Ball, D. Dachman-Soled, Mukul Kulkarni, T. Malkin
{"title":"Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits","authors":"Marshall Ball, D. Dachman-Soled, Mukul Kulkarni, T. Malkin","doi":"10.1007/978-3-662-49896-5_31","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_31","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_21
Yu-pu Hu, Huiwen Jia
{"title":"Cryptanalysis of GGH Map","authors":"Yu-pu Hu, Huiwen Jia","doi":"10.1007/978-3-662-49890-3_21","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_21","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_12
L. Ducas, D. Stehlé
{"title":"Sanitization of FHE Ciphertexts","authors":"L. Ducas, D. Stehlé","doi":"10.1007/978-3-662-49890-3_12","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_12","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114710438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_27
S. Badrinarayanan, Eric Miles, A. Sahai, Mark Zhandry
{"title":"Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits","authors":"S. Badrinarayanan, Eric Miles, A. Sahai, Mark Zhandry","doi":"10.1007/978-3-662-49896-5_27","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_27","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123459665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_19
Nicolas Gama, Malika Izabachène, Phong Q. Nguyen, Xiang Xie
{"title":"Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems","authors":"Nicolas Gama, Malika Izabachène, Phong Q. Nguyen, Xiang Xie","doi":"10.1007/978-3-662-49896-5_19","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_19","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_14
G. Leurent
{"title":"Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning","authors":"G. Leurent","doi":"10.1007/978-3-662-49890-3_14","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_14","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114984797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-01DOI: 10.1007/978-3-662-49896-5_17
S. Fehr, M. Fillinger
{"title":"On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments","authors":"S. Fehr, M. Fillinger","doi":"10.1007/978-3-662-49896-5_17","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_17","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-26DOI: 10.1007/978-3-662-46800-5_22
Xianhui Lu, Bao Li, Dingding Jia
{"title":"KDM-CCA Security from RKA Secure Authenticated Encryption","authors":"Xianhui Lu, Bao Li, Dingding Jia","doi":"10.1007/978-3-662-46800-5_22","DOIUrl":"https://doi.org/10.1007/978-3-662-46800-5_22","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128762763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-26DOI: 10.1007/978-3-662-46800-5_29
M. A. Abdelraheem, Peter Beelen, A. Bogdanov, Elmar Tischhauser
{"title":"Twisted Polynomials and Forgery Attacks on GCM","authors":"M. A. Abdelraheem, Peter Beelen, A. Bogdanov, Elmar Tischhauser","doi":"10.1007/978-3-662-46800-5_29","DOIUrl":"https://doi.org/10.1007/978-3-662-46800-5_29","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128235982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}