crypto 2017 Aug. 20, 2017 to Aug. 24, 2017, santa barbara,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks Shweta Agrawal N/A
Generic Transformations of Predicate Encodings: Constructions and Applications Benedikt Schmidt , Gilles Barthe , Miguel Ambrona N/A
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption Dario Catalano , Dario Fiore , Romain Gay , Carmen Elisabetta , Zaira Baltico N/A
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme Itai Dinur , Niv Nadler N/A
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners Lei Wang , Dawu Gu , Jian Guo , Zhenzhen Bao N/A
Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak Jian Guo , Ling Song , Guohong Liao N/A
Memory-Tight Reductions David Cash , Eike Kiltz , Manuel Fersch , Benedikt Auerbach N/A
Be Adaptive, Avoid Overcommitting Krzysztof Pietrzak , Daniel Wichs , Zahra Jafargholi , Ilan Komargodski , Chethan Kamath , Karen Klein N/A
Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time Daniele Micciancio , Michael Walter N/A
LPN Decoded Alexander May , Andre Esser , Robert Kübler N/A
Prospects for a Quantum Factoring Machine John Martinis N/A
The TinyTable protocol for 2-Party Secure Computation, or: Gate-scrambling Revisited Jesper buus Nielsen , Michael Nielsen , Ivan Damgård , Samuel Ranellucci N/A
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic Arpita Patra , Yashvanth Kondi N/A
Secure Arithmetic Computation with Constant Computational Overhead Michael Nielsen , Yuval Ishai , Benny Applebaum , Ivan Damgård , Lior Zichron N/A
Encryption switching protocols revisited: switching modulo p Fabien Laguillaumie , Guilhem Castagnos , Laurent Imbert N/A
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample Willy Susilo , Yi Mu , Fuchun Guo , Rongmao Chen , Jianchang Yang N/A
Compact Structure-preserving Signatures with Almost Tight Security Masayuki Abe , Miyako Ohkubo , Ryo Nishimaki , Dennis Hofheinz , Jiaxin Pan N/A
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs Jens Groth , Mary Maller N/A
Fast Secure Two-Party ECDSA Signing Yehuda Lindell N/A
The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay , Aggelos Kiayias , Nikos Leonardos N/A
Bitcoin as a Transaction Ledger: A Composable Treatment Ueli Maurer , Daniel Tschudi , Vassilis Zikas , Christian Badertscher N/A
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol Aggelos Kiayias , Bernardo David , Alexander Russell , Roman Oliynykov N/A
Proving Resistance against Invariant Attacks: How to Choose the Round Constants Anne Canteaut , Gregor Leander , Yann Rotella , Christof Beierle N/A
Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains Serge Vaudenay , F. Betül Durak N/A
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security Bart Mennink N/A
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion Fabrice Benhamouda , Hugo Krawczyk , Tal Rabin N/A
The Price of Low Communication in Secure Multi-Party Computation Juan A. Garay , Rafail Ostrovsky , Yuval Ishai , Vassilis Zikas N/A
Topology-Hiding Computation on All Graphs Tal Moran , Adi Akavia , Rio Lavigne N/A
A New Approach to Round-Optimal Secure Multiparty Computation Abhishek Jain , Prabhanjan Ananth , Arka Rai Choudhuri N/A
Boosting Authenticated Encryption Robustness With Minimal Modifications Tomer Ashur , Orr Dunkelman , Atul Luykx N/A
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Tetsu Iwata , Yannick Seurin , Thomas Peyrin , Kazuhiko Minematsu N/A
Message Franking via Committing Authenticated Encryption Thomas Ristenpart , Paul Grubbs , Jiahui Lu N/A
Key Rotation for Authenticated Encryption Thomas Ristenpart , Kenneth g. Paterson , Adam Everspaugh , Sam Scott N/A
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions David J. Wu , Sam Kim N/A
Identity-Based Encryption from the Diffie-Hellman Assumption Sanjam Garg , Nico Döttling N/A
The first collision for full SHA-1 Elie Bursztein , Ange ( ange4771 ) Albertini , Pierre Karpman , Marc Stevens , Yarik Markov N/A
Soft Merge between Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs and Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs Huijia Lin , Stefano Tessaro N/A
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives Sanjam Garg , Mohammad Mahmoody , Ameer Mohammed N/A
Structure vs Hardness through the Obfuscation Lens Vinod Vaikuntanathan , Nir Bitansky , Akshay Degwekar N/A
Kurosawa-Desmedt Meets Tight Security Dennis Hofheinz , Romain Gay , Lisa Kohl N/A
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques Shota Yamada N/A
Identity-based Encryption from Codes with Rank Metric Duong hieu Phan , Jean-pierre Tillich , Philippe Gaborit , Adrien Hauteville N/A
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations Benny Applebaum , Pavel Raykov , Barak Arkis , Prashant Nalini Vasudevan N/A
Conditional Disclosure of Secrets via Non-Linear Reconstruction Vinod Vaikuntanathan , Hoeteck Wee , Tianren Liu N/A
Degree Evaluation of NFSR-Based Cryptosystems Meicheng Liu N/A
Cube Attacks on Non-Blackbox Polynomials Based on Division Property Takanori Isobe , Willi Meier , Yosuke Todo , Yonglin Hao N/A
Deploying cryptographically-verified components for the HTTPS ecosystem Cedric Fournet N/A
Secure Computation based on Leaky Correlations: High Resilience Setting Hemanta K. Maji , Alexander R. Block , Hai H. Nguyen N/A
Laconic Oblivious Transfer and its Applications Antigoni Polychroniadou , Sanjam Garg , Divya Gupta , Nico Döttling , Peihan Miao , Chongwon Cho N/A
Black-Box Parallel Garbled RAM Rafail Ostrovsky , Steve Lu N/A
Middle-Product Learning With Errors Damien Stehlé , Ron Steinfeld , Miruna Rosca , Amin Sakzad N/A
Soft merge between All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE and All-But-Many Lossy Trapdoor Functions from Lattices and Applications Xavier Boyen , Qinyi Li , Benoit Libert , Damien Stehlé , Ron Steinfeld , Amin Sakzad N/A
Amortization with Fewer Equations for Proving Knowledge of Small Secrets Vadim Lyubashevsky , Rafael Del Pino N/A
Non-Malleable Codes for Space-Bounded Tampering Sebastian Faust , Pratyay Mukherjee , Daniele Venturi , Kristina Hostakova N/A
Four-Round Concurrent Non-Malleable Commitments from One-Way Functions Rafail Ostrovsky , Ivan Visconti , Michele Ciampi , Luisa Siniscalchi N/A
Distinguisher-Dependent Simulation in Two Rounds and Its Applications Abhishek Jain , Yael Tauman Kalai , Dakshita Khurana , Ron D. Rothblum N/A
Private Multiplication over Finite Fields Sonia Belaid , Fabrice Benhamouda , Emmanuel Prouff , Alain Passelègue , Adrian Thillard , Damien Vergnaud N/A
Anonymous Attestation with Subverted TPMs Jan Camenisch , Anja Lehmann , Manu Drijvers N/A
Hedging Public-Key Encryption in the Real World Thomas Shrimpton , Alexandra Boldyreva , Christopher Patton N/A
Incremental Program Obfuscation Sanjam Garg , Omkant Pandey N/A
From Obfuscation to the Security of Fiat-Shamir for Proofs Guy n. Rothblum , Yael Tauman Kalai , Ron D. Rothblum N/A
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization Abhishek Jain , Amit Sahai , Prabhanjan Ananth N/A
Information-theoretic Indistinguishability via the Chi-squared Method Viet tung Hoang , Stefano Tessaro , Wei Dai N/A
Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient Yannick Seurin , John Steinberger , Yuanxi Dai , Aishwarya Thiruvengadam N/A
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory Bart Mennink , Samuel Neves N/A
Quantum Security of NMAC and Related Constructions Aaram Yun , Fang Song N/A
Quantum non-malleability and authentication Gorjan Alagic , Christian Majenz N/A
New security notions and feasibility results for authentication of quantum data Mark Zhandry , Sumegha Garg , Henry Yuen N/A
A Formal Treatment of Multi-key Channels Felix Günther , Sogol Mazaheri N/A
Ratcheted Encryption and Key Exchange: The Security of Messaging Mihir Bellare , Joseph Jaeger , Igors Stepanovs , Asha Camper Singh , Maya Nyayapati N/A
PRF-ODH: Relations, Instantiations, and Impossibility Results Marc Fischlin , Felix Günther , Jacqueline Brendel , Christian Janson N/A