Pub Date : 2016-12-22DOI: 10.1007/978-3-319-56617-7_13
A. Chailloux, Anthony Leverrier
{"title":"Relativistic (or 2-Prover 1-Round) Zero-Knowledge Protocol for mathsf NP Secure Against Quantum Adversaries","authors":"A. Chailloux, Anthony Leverrier","doi":"10.1007/978-3-319-56617-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_13","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-18DOI: 10.1007/978-3-319-56617-7_11
S. Fehr, L. Salvail
{"title":"Quantum Authentication and Encryption with Key Recycling - Or: How to Re-use a One-Time Pad Even if P=NP - Safely & Feasibly","authors":"S. Fehr, L. Salvail","doi":"10.1007/978-3-319-56617-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_11","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130890087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-04DOI: 10.1007/978-3-319-56617-7_3
G. Alagic, A. Russell
{"title":"Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts","authors":"G. Alagic, A. Russell","doi":"10.1007/978-3-319-56617-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-56617-7_3","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-21DOI: 10.1007/978-3-319-56620-7_17
R. Cramer, I. Damgård, C. Xing, Chen Yuan
{"title":"Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack","authors":"R. Cramer, I. Damgård, C. Xing, Chen Yuan","doi":"10.1007/978-3-319-56620-7_17","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_17","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124432395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-08DOI: 10.1007/978-3-319-56620-7_12
R. Cramer, L. Ducas, B. Wesolowski
{"title":"Short Stickelberger Class Relations and Application to Ideal-SVP","authors":"R. Cramer, L. Ducas, B. Wesolowski","doi":"10.1007/978-3-319-56620-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-56620-7_12","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116433302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_4
Peter Gazi, Stefano Tessaro
{"title":"Provably Robust Sponge-Based PRNGs and KDFs","authors":"Peter Gazi, Stefano Tessaro","doi":"10.1007/978-3-662-49890-3_4","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_4","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_6
W. Castryck, Ilia Iliashenko, F. Vercauteren
{"title":"Provably Weak Instances of Ring-LWE Revisited","authors":"W. Castryck, Ilia Iliashenko, F. Vercauteren","doi":"10.1007/978-3-662-49890-3_6","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_6","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127546567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_13
J. Alwen, Binyi Chen, Chethan Kamath, V. Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro
{"title":"On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model","authors":"J. Alwen, Binyi Chen, Chethan Kamath, V. Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro","doi":"10.1007/978-3-662-49896-5_13","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_13","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123939689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_2
Shota Yamada
{"title":"Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters","authors":"Shota Yamada","doi":"10.1007/978-3-662-49896-5_2","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_2","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121914011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_23
Atul Luykx, B. Preneel, Alan Szepieniec, K. Yasuda
{"title":"On the Influence of Message Length in PMAC's Security Bounds","authors":"Atul Luykx, B. Preneel, Alan Szepieniec, K. Yasuda","doi":"10.1007/978-3-662-49890-3_23","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_23","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}