Accepted Papers
- On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Mridul Nandi - Efficient Fully Structure-Preserving Signatures for Large Messages
Jens Groth - Optimized Interpolation Attacks on LowMC
Itai Dinur & Yunwen Liu & Willi Meier & Qingju Wang - Property Preserving Symmetric Encryption Revisited
Sanjit Chatterjee & M. Prem Laxman Das - QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions
Alonso González & Alejandro Hevia & Carla Ràfols - Multiple Discrete Logarithm Problems with Auxiliary Inputs
Taechan Kim - An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Takahiro Matsuda & Goichiro Hanaoka - Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Martin R. Albrecht & Catalin Cocis & Fabien Laguillaumie & Adeline Langlois - Computing Individual Discrete Logarithms Faster in GF(p^n) with the NFS-DL Algorithm
Aurore Guillevic - Dual-System Simulation-Soundness with Applications to UC-PAKE and More
Charanjit S. Jutla & Arnab Roy - Riding on Asymmetry: Efficient ABE for Branching Programs
Sergey Gorbunov & Dhinakaran Vinayagamurthy - Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger & Venkata Koppula & Brent Waters - The Tower Number Field Sieve
Razvan Barbulescu & Pierrick Gaudry & Thorsten Kleinjung - A Provably Secure Group Signature Scheme from Code-Based Assumptions
Martianus Frederic Ezerman & Hyung Tae Lee & San Ling & Khoa Nguyen & Huaxiong Wang - ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Vincent Grosso & François-Xavier Standaert - A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers
Chun Guo & Dongdai Lin - Type 2 Structure-Preserving Signature Schemes Revisited
Sanjit Chatterjee & Alfred Menezes - Analysis of SHA-512/224 and SHA-512/256
Christoph Dobraunig & Maria Eichlseder & Florian Mendel - Refinements of the k-tree Algorithm for the Generalized Birthday Problem
Ivica Nikolić & Yu Sasaki - Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance
Shi Bai & Adeline Langlois & Tancrède Lepoint & Damien Stehlé & Ron Steinfeld - Solving Linear Equations Modulo Unknown Divisors: Revisited
Yao Lu & Rui Zhang & Liqiang Peng & Dongdai Lin - Another Tradeoff Attack on Sprout-like Stream Ciphers
Bin Zhang & Xinxin Gong - Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Benoît Cogliati & Yannick Seurin - Design Principles for HFEv- based Multivariate Signature Schemes
Albrecht Petzoldt & Ming-Shing Chen & Bo-Yin Yang & Chengdong Tao & Jintai Ding - Counting Keys in Parallel After a Side Channel Attack
Daniel P. Martin & Jonathan O'Connell & Elisabeth Oswald & Martijn Stam - Idealizing Identity-Based Encryption
Dennis Hofheinz & Christian Matt & Ueli Maurer - On Black-Box Complexity of Universally Composable Security in the CRS model
Carmit Hazay & Muthuramakrishnan Venkitasubramaniam - Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink & Reza Reyhanitabar & Damian Vizár - On the Impact of Known-Key Attacks on Hash Functions
Bart Mennink & Bart Preneel - A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks
Liwei Zhang & A. Adam Ding & Yunsi Fei & Pei Luo - Tradeoff Cryptanalysis of Memory-Hard Functions
Alex Biryukov & Dmitry Khovratovich - How to Sequentialize Independent Parallel Attacks?
Sonia Bogos & Serge Vaudenay - Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
Christoph Dobraunig & Maria Eichlseder & Florian Mendel - Generic Security of NMAC and HMAC with Input Whitening
Peter Gaži & Krzysztof Pietrzak & Stefano Tessaro - Selective Opening Security for Receivers
Carmit Hazay & Arpita Patra & Bogdan Warinschi - Reverse-engineering of the cryptanalytic attack used in the Flame super-malware
Max Fillinger & Marc Stevens - An Inverse-free Single Keyed Tweakable Enciphering Scheme
Ritam Bhaumik & Mridul Nandi - Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Benoît Libert & Thomas Peters & Marc Joye & Moti Yung - Optimally Secure Block Ciphers from Ideal Primitives
Stefano Tessaro - A Unified Approach to MPC with Preprocessing using OT
Tore Kasper Frederiksen & Marcel Keller & Emmanuela Orsini & Peter Scholl - How Secure is AES under Leakage
Andrey Bogdanov & Takanori Isobe - New Circular Security Counterexamples from Decision Linear and Learning with Errors
Allison Bishop & Susan Hohenberger & Brent Waters - Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch & Maria Dubovitskaya & Kristiyan Haralambiev & Markulf Kohlweiss - Secret Sharing and Statistical Zero Knowledge
Vinod Vaikuntanathan & Prashant N. Vasudevan - Key-Recovery Attacks on ASASA
Brice Minaud & Patrick Derbez & Pierre-Alain Fouque & Pierre Karpman - Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
Dana Dachman-Soled & Chang Liu & Charalampos Papamanthou & Elaine Shi & Uzi Vishkin - Secure Computation from Millionaire
abhi shelat & Muthuramakrishnan Venkitasubramaniam - Midori: A Block Cipher for Low Energy
Subhadeep Banik & Andrey Bogdanov & Takanori Isobe & Kyoji Shibutani & Harunaga Hiwatari & Toru Akishita & Francesco Regazzoni - New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto & Krzysztof Pietrzak & Brent Waters & Daniel Wichs - On Cut-and-Choose Oblivious Transfer and Its Variants
Vladimir Kolesnikov & Ranjit Kumaresan - Public Verifiability in the Covert Model (Almost) for Free
Vladimir Kolesnikov & Alex J. Malozemoff - Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble
Thomas Fuhr & Gaëtan Leurent & Valentin Suder - Function-Hiding Inner Product Encryption
Allison Bishop & Abhishek Jain & Lucas Kowalczyk - Multi-Input Functional Encryption for Unbounded Arity Functions
Saikrishna Badrinarayanan & Divya Gupta & Abhishek Jain & Amit Sahai - Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung & Goichiro Hanaoka & Shota Yamada - Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla & Fabrice Benhamouda & Alain Passelègue - A Framework for Identity-Based Encryption with Almost Tight Security
Nuttapong Attrapadung & Goichiro Hanaoka & Shota Yamada - Garbling Scheme for Formulas with Constant Size of Garbled Gates
Carmen Kempka & Ryo Kikuchi & Susumu Kiyoshima & Koutarou Suzuki - Limits of Extractability Assumptions with Distributional Auxiliary Input
Elette Boyle & Rafael Pass - FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime
Craig Costello & Patrick Longa - Multi-Party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
Dakshita Khurana & Vanishree Rao & Amit Sahai - Card-based Cryptographic Protocols using a Minimal Number of Cards
Alexander Koch & Stefan Walzer & Kevin Härtel - Three-Party ORAM for Secure Computation
Sky Faber & Stanislaw Jarecki & Sotirios Kentros & Boyang Wei - Pure Differential Privacy for Rectangle Queries via Private Partitions
Cynthia Dwork & Moni Naor & Omer Reingold & Guy Rothblum