Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76578-5_13
Daniel Hart, Dohoon Kim, Giacomo Micheli, Guillermo Pascual-Perez, C. Petit, Yuxuan Quek
{"title":"A Practical Cryptanalysis of WalnutDSA TM","authors":"Daniel Hart, Dohoon Kim, Giacomo Micheli, Guillermo Pascual-Perez, C. Petit, Yuxuan Quek","doi":"10.1007/978-3-319-76578-5_13","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_13","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76581-5_14
Benedikt Auerbach, Bertram Poettering
{"title":"Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli","authors":"Benedikt Auerbach, Bertram Poettering","doi":"10.1007/978-3-319-76581-5_14","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_14","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129950334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76581-5_21
Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz
{"title":"New (and Old) Proof Systems for Lattice Problems","authors":"Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz","doi":"10.1007/978-3-319-76581-5_21","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_21","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116074607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76581-5_6
G. Fuchsbauer, Romain Gay
{"title":"Weakly Secure Equivalence-Class Signatures from Standard Assumptions","authors":"G. Fuchsbauer, Romain Gay","doi":"10.1007/978-3-319-76581-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_6","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76581-5_15
Stanislaw Jarecki, H. Krawczyk, Maliheh Shirvanian, Nitesh Saxena
{"title":"Two-Factor Authentication with End-to-End Password Security","authors":"Stanislaw Jarecki, H. Krawczyk, Maliheh Shirvanian, Nitesh Saxena","doi":"10.1007/978-3-319-76581-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_15","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128691860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76578-5_6
F. Giacon, Eike Kiltz, Bertram Poettering
{"title":"Hybrid Encryption in a Multi-user Setting, Revisited","authors":"F. Giacon, Eike Kiltz, Bertram Poettering","doi":"10.1007/978-3-319-76578-5_6","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_6","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115429359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76581-5_16
J. Garay, A. Kiayias, Nikos Leonardos, Giorgos Panagiotakos
{"title":"Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup","authors":"J. Garay, A. Kiayias, Nikos Leonardos, Giorgos Panagiotakos","doi":"10.1007/978-3-319-76581-5_16","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_16","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76578-5_8
David Derler, S. Krenn, T. Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
{"title":"Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications","authors":"David Derler, S. Krenn, T. Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks","doi":"10.1007/978-3-319-76578-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_8","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76581-5_11
Brandon Broadnax, Valerie Fetzer, J. Müller-Quade, Andy Rupp
{"title":"Non-malleability vs. CCA-Security: The Case of Commitments","authors":"Brandon Broadnax, Valerie Fetzer, J. Müller-Quade, Andy Rupp","doi":"10.1007/978-3-319-76581-5_11","DOIUrl":"https://doi.org/10.1007/978-3-319-76581-5_11","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-25DOI: 10.1007/978-3-319-76578-5_22
Stanislaw Jarecki
{"title":"Efficient Covert Two-Party Computation","authors":"Stanislaw Jarecki","doi":"10.1007/978-3-319-76578-5_22","DOIUrl":"https://doi.org/10.1007/978-3-319-76578-5_22","url":null,"abstract":"","PeriodicalId":436208,"journal":{"name":"International Conference on Theory and Practice of Public Key Cryptography","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}