Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_4
Martin R. Albrecht
{"title":"On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL","authors":"Martin R. Albrecht","doi":"10.1007/978-3-319-56614-6_4","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_4","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_2
Shashank Agrawal, David J. Wu
{"title":"Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions","authors":"Shashank Agrawal, David J. Wu","doi":"10.1007/978-3-319-56614-6_2","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_2","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":" 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_24
Craig Costello, David Jao, P. Longa, M. Naehrig, Joost Renes, D. Urbanik
{"title":"Efficient Compression of SIDH Public Keys","authors":"Craig Costello, David Jao, P. Longa, M. Naehrig, Joost Renes, D. Urbanik","doi":"10.1007/978-3-319-56620-7_24","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_24","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127671145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_3
Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, P. Kirchner
{"title":"Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L|Δ𝕂|(½) and Application to the Cryptanalysis of a FHE Scheme","authors":"Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, P. Kirchner","doi":"10.1007/978-3-319-56620-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_3","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123034747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56620-7_10
R. Pass, E. Shi, Florian Tramèr
{"title":"Formal Abstractions for Attested Execution Secure Processors","authors":"R. Pass, E. Shi, Florian Tramèr","doi":"10.1007/978-3-319-56620-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_10","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125158462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_13
V. Hoang, Stefano Tessaro
{"title":"The Multi-user Security of Double Encryption","authors":"V. Hoang, Stefano Tessaro","doi":"10.1007/978-3-319-56614-6_13","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_13","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56617-7_5
P. Ananth, Abhishek Jain, A. Sahai
{"title":"Patchable Indistinguishability Obfuscation: iO for Evolving Software","authors":"P. Ananth, Abhishek Jain, A. Sahai","doi":"10.1007/978-3-319-56617-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_5","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131606367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56614-6_6
Elette Boyle, N. Gilboa, Y. Ishai
{"title":"Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation","authors":"Elette Boyle, N. Gilboa, Y. Ishai","doi":"10.1007/978-3-319-56614-6_6","DOIUrl":"https://doi.org/10.1007/978-3-319-56614-6_6","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134437340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56617-7_2
J. Alwen, Binyi Chen, Krzysztof Pietrzak, L. Reyzin, Stefano Tessaro
{"title":"Scrypt Is Maximally Memory-Hard","authors":"J. Alwen, Binyi Chen, Krzysztof Pietrzak, L. Reyzin, Stefano Tessaro","doi":"10.1007/978-3-319-56617-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_2","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-04-30DOI: 10.1007/978-3-319-56617-7_15
Payman Mohassel, Mike Rosulek
{"title":"Non-interactive Secure 2PC in the Offline/Online and Batch Settings","authors":"Payman Mohassel, Mike Rosulek","doi":"10.1007/978-3-319-56617-7_15","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_15","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}