Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_20
R. Cramer, L. Ducas, Chris Peikert, O. Regev
{"title":"Recovering Short Generators of Principal Ideals in Cyclotomic Rings","authors":"R. Cramer, L. Ducas, Chris Peikert, O. Regev","doi":"10.1007/978-3-662-49896-5_20","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_20","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128781813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_10
François Durvaux, François-Xavier Standaert
{"title":"From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces","authors":"François Durvaux, François-Xavier Standaert","doi":"10.1007/978-3-662-49890-3_10","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_10","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127650356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_8
Dakshita Khurana, Daniel Kraschewski, H. K. Maji, M. Prabhakaran, A. Sahai
{"title":"All Complete Functionalities are Reversible","authors":"Dakshita Khurana, Daniel Kraschewski, H. K. Maji, M. Prabhakaran, A. Sahai","doi":"10.1007/978-3-662-49896-5_8","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_8","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121330308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_1
Romain Gay, D. Hofheinz, Eike Kiltz, H. Wee
{"title":"Tightly CCA-Secure Encryption Without Pairings","authors":"Romain Gay, D. Hofheinz, Eike Kiltz, H. Wee","doi":"10.1007/978-3-662-49890-3_1","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_1","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128799223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_29
Miguel Ambrona, G. Barthe, Benedikt Schmidt
{"title":"Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model","authors":"Miguel Ambrona, G. Barthe, Benedikt Schmidt","doi":"10.1007/978-3-662-49896-5_29","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_29","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129095826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_24
Y. Dodis, Martijn Stam, J. Steinberger, Tianren Liu
{"title":"Indifferentiability of Confusion-Diffusion Networks","authors":"Y. Dodis, Martijn Stam, J. Steinberger, Tianren Liu","doi":"10.1007/978-3-662-49896-5_24","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_24","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114432450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_8
Bing Sun, Meicheng Liu, Jian Guo, V. Rijmen, Ruilin Li
{"title":"Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis","authors":"Bing Sun, Meicheng Liu, Jian Guo, V. Rijmen, Ruilin Li","doi":"10.1007/978-3-662-49890-3_8","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_8","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_31
Daniele Micciancio, Michael Walter
{"title":"Practical, Predictable Lattice Basis Reduction","authors":"Daniele Micciancio, Michael Walter","doi":"10.1007/978-3-662-49890-3_31","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_31","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49890-3_3
Allison Bishop, Valerio Pastro, R. Rajaraman, D. Wichs
{"title":"Essentially Optimal Robust Secret Sharing with Maximal Corruptions","authors":"Allison Bishop, Valerio Pastro, R. Rajaraman, D. Wichs","doi":"10.1007/978-3-662-49890-3_3","DOIUrl":"https://doi.org/10.1007/978-3-662-49890-3_3","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-08DOI: 10.1007/978-3-662-49896-5_15
I. Damgård, J. Nielsen, R. Ostrovsky, A. Rosén
{"title":"Unconditionally Secure Computation with Reduced Interaction","authors":"I. Damgård, J. Nielsen, R. Ostrovsky, A. Rosén","doi":"10.1007/978-3-662-49896-5_15","DOIUrl":"https://doi.org/10.1007/978-3-662-49896-5_15","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}