Pub Date : 2019-05-19DOI: 10.1007/978-3-030-17656-3_6
Joanne Woodage, D. Shumow
{"title":"An Analysis of NIST SP 800-90A","authors":"Joanne Woodage, D. Shumow","doi":"10.1007/978-3-030-17656-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-17656-3_6","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128517758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-19DOI: 10.1007/978-3-030-17653-2_7
Shweta Agrawal
{"title":"Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation","authors":"Shweta Agrawal","doi":"10.1007/978-3-030-17653-2_7","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_7","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"413 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132380986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-29DOI: 10.1007/978-3-319-78381-9_8
Vadim Lyubashevsky, Gregor Seiler
{"title":"Short, Invertible Elements in Partially Splitting Cyclotomic Rings and Applications to Lattice-Based Zero-Knowledge Proofs","authors":"Vadim Lyubashevsky, Gregor Seiler","doi":"10.1007/978-3-319-78381-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-78381-9_8","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127147388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-29DOI: 10.1007/978-3-319-78375-8_3
B. David, Peter Gazi, A. Kiayias, A. Russell
{"title":"Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain","authors":"B. David, Peter Gazi, A. Kiayias, A. Russell","doi":"10.1007/978-3-319-78375-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-78375-8_3","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123179314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-29DOI: 10.1007/978-3-319-78372-7_13
Pierre-Alain Dupont, Julia Hesse, D. Pointcheval, L. Reyzin, Sophia Yakoubov
{"title":"Fuzzy Password-Authenticated Key Exchange","authors":"Pierre-Alain Dupont, Julia Hesse, D. Pointcheval, L. Reyzin, Sophia Yakoubov","doi":"10.1007/978-3-319-78372-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-78372-7_13","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131675091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-29DOI: 10.1007/978-3-319-78372-7_10
Marshall Ball, Elette Boyle, T. Malkin, T. Moran
{"title":"Exploring the Boundaries of Topology-Hiding Computation","authors":"Marshall Ball, Elette Boyle, T. Malkin, T. Moran","doi":"10.1007/978-3-319-78372-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-78372-7_10","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131887957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-29DOI: 10.1007/978-3-319-78372-7_20
Marshall Ball, D. Dachman-Soled, Mukul Kulkarni, T. Malkin
{"title":"Non-malleable Codes from Average-Case Hardness: $${mathsf {A}}{mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering","authors":"Marshall Ball, D. Dachman-Soled, Mukul Kulkarni, T. Malkin","doi":"10.1007/978-3-319-78372-7_20","DOIUrl":"https://doi.org/10.1007/978-3-319-78372-7_20","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-29DOI: 10.1007/978-3-319-78372-7_11
Kirsten Eisenträger, Sean Hallgren, K. Lauter, T. Morrison, C. Petit
{"title":"Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions","authors":"Kirsten Eisenträger, Sean Hallgren, K. Lauter, T. Morrison, C. Petit","doi":"10.1007/978-3-319-78372-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-78372-7_11","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122000119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-04-29DOI: 10.1007/978-3-319-78375-8_17
Fabrice Benhamouda, Huijia Lin
{"title":"k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits","authors":"Fabrice Benhamouda, Huijia Lin","doi":"10.1007/978-3-319-78375-8_17","DOIUrl":"https://doi.org/10.1007/978-3-319-78375-8_17","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-10DOI: 10.1007/978-3-030-45727-3_27
G. Alagic, Christian Majenz, A. Russell, F. Song
{"title":"Quantum-Access-Secure Message Authentication via Blind-Unforgeability","authors":"G. Alagic, Christian Majenz, A. Russell, F. Song","doi":"10.1007/978-3-030-45727-3_27","DOIUrl":"https://doi.org/10.1007/978-3-030-45727-3_27","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115865335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}