{"title":"Conditional Cube Attack on Reduced-Round Keccak Sponge Function","authors":"Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao","doi":"10.1007/978-3-319-56614-6_9","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_9","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"154 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116507920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_9
Peter Rindal, Mike Rosulek
{"title":"Improved Private Set Intersection Against Malicious Adversaries","authors":"Peter Rindal, Mike Rosulek","doi":"10.1007/978-3-319-56620-7_9","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_9","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126754153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_7
T. Kleinjung, C. Diem, A. Lenstra, C. Priplata, C. Stahlke
{"title":"Computation of a 768-Bit Prime Field Discrete Logarithm","authors":"T. Kleinjung, C. Diem, A. Lenstra, C. Priplata, C. Stahlke","doi":"10.1007/978-3-319-56620-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_7","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133028823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56617-7_1
J. Alwen, Jeremiah Blocki, Krzysztof Pietrzak
{"title":"Depth-Robust Graphs and Their Cumulative Memory Complexity","authors":"J. Alwen, Jeremiah Blocki, Krzysztof Pietrzak","doi":"10.1007/978-3-319-56617-7_1","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_1","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_16
R. Canetti, Yilei Chen
{"title":"Constraint-Hiding Constrained PRFs for NC1 from LWE","authors":"R. Canetti, Yilei Chen","doi":"10.1007/978-3-319-56620-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_16","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130866851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_17
Paul Grubbs, T. Ristenpart, Y. Yarom
{"title":"Modifying an Enciphering Scheme After Deployment","authors":"Paul Grubbs, T. Ristenpart, Y. Yarom","doi":"10.1007/978-3-319-56614-6_17","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_17","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_23
D. Kohel
{"title":"Twisted μ4-Normal Form for Elliptic Curves","authors":"D. Kohel","doi":"10.1007/978-3-319-56620-7_23","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_23","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116719095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_22
R. Pass, Lior Seeman, Abhi Shelat
{"title":"Analysis of the Blockchain Protocol in Asynchronous Networks","authors":"R. Pass, Lior Seeman, Abhi Shelat","doi":"10.1007/978-3-319-56614-6_22","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_22","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_10
Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
{"title":"A New Structural-Differential Property of 5-Round AES","authors":"Lorenzo Grassi, Christian Rechberger, Sondre Rønjom","doi":"10.1007/978-3-319-56614-6_10","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_10","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123541010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_21
A. Chiesa, M. Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra
{"title":"Decentralized Anonymous Micropayments","authors":"A. Chiesa, M. Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra","doi":"10.1007/978-3-319-56614-6_21","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_21","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}