crypto 2014 Aug. 17, 2014 to Aug. 21, 2014, california,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening remarks, Sasha Boldyreva N/A
Security of Symmetric Encryption against Mass Surveillance Mihir Bellare , Phillip Rogaway , Kenneth g. Paterson N/A
The Security of Multiple Encryption in the Ideal Cipher Model Jooyoung Lee , Bart Mennink , John Steinberger , Yuanxi Dai N/A
Minimizing the Two-Round Even-Mansour Cipher Rodolphe Lampe , Yannick Seurin , Jooyoung Lee , Shan Chen , John P. Steinberger N/A
Block Ciphers - Focus On The Linear Layer (feat. PRIDE) Christof Paar , Benedikt Driessen , Elif bilge Kavun , Gregor Leander , Martin R. Albrecht , Tolga Yalcin N/A
Related Key Security for Pseudorandom Functions Beyond the Linear Barrier Kenneth g. Paterson , Michel Abdalla , Fabrice Benhamouda , Alain Passelègue N/A
Automated Analysis of Cryptographic Assumptions in Generic Group Models John C. Mitchell , Dario Fiore , Benedikt Schmidt , Gilles Barthe , Edvard Fagerholm , Andre Scedrov N/A
Caught in between Theory and Practice Mihir Bellare N/A
The Exact PRF-Security of NMAC and HMAC Krzysztof Pietrzak , Peter Gazi , Michal Rybár N/A
Updates on Generic Attacks against HMAC and NMAC Yu Sasaki , Lei Wang , Thomas Peyrin , Jian Guo N/A
Improved Generic Attacks Against Hash-based MACs and HAIFA Itai Leurent N/A
Cryptography from Compression Functions: The UCE Bridge to the ROM Mihir Bellare , Sriram Keelveedhi , Viet tung Hoang N/A
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources Christina Brzuska , Pooya Farshim , Arno Mittelbach N/A
Low Overhead Broadcast Encryption from Multilinear Maps Dan Boneh , Brent Waters , Mark Zhandry N/A
Security Analysis of Multilinear Maps over the Integers Jae hong Seo , Hyung Tae Lee N/A
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups Masayuki Abe , Miyako Ohkubo , Jens Groth , Takeya Tango N/A
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations Andy Rupp , Gottfried Herold , Julia Hesse , Dennis Hofheinz , Carla Ràfols Salvador N/A
Revisiting the Gentry-Szydlo Algorithm Hendrik W. Lenstra , Alice Silverberg N/A
Faster Bootstrapping with Polynomial Error Chris Peikert , Jacob Alperin-sheriff N/A
Hardness of k-LWE and Applications in Traitor Tracing Duong hieu Phan , San Ling , Damien Stehlé , Ron Steinfeld N/A
Improved Short Lattice Signatures in the Standard Model Daniele Micciancio , Leo Ducas N/A
New and Improved Key-Homomorphic Pseudorandom Functions Abhishek Banerjee , Chris Peikert N/A
Homomorphic Signatures with Efficient Verification for Polynomial Functions Dario Catalano , Dario Fiore , Bogdan Warinschi N/A
Structure-Preserving Signatures from Type II Pairings Masayuki Abe , Miyako Ohkubo , Mehdi Tibouchi , Jens Groth N/A
(Hierarchical) Identity-Based Encryption from Affine Message Authentication Eike Kiltz , Olivier Blazy , Jiaxin Pan N/A
Witness Encryption from Instance Independent Assumptions Brent Waters , Craig Gentry , Allison B. Lewko N/A
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis Adi Shamir , Daniel Genkin , Eran Tromer N/A
On the Impossibility of Cryptography with Tamperable Randomness Rafael Pass , Kai-min Chung , Per Austrin , Mohammad Mahmoody , Karn Seth N/A
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Dan Boneh , Mark Zhandry N/A
Indistinguishability Obfuscation from Semantically-Secure Multi-linear Encodings Rafael Pass , Karn Seth , Sidharth Telang N/A
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input Shai Halevi , Craig Gentry , Daniel Wichs , Sanjam Garg N/A
Maliciously Circuit-private FHE Rafail Ostrovsky , Anat Paskin-cherniavsky , Beni Paskin-cherniavsky N/A
Algorithms in HElib Shai Halevi , Victor Shoup N/A
Quantum position verification in the random oracle model Dominique Unruh N/A
Single-shot security for one-time memories in the isolated qubits model Yi-kai Liu N/A
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs Adi Shamir , Daniel Wichs , Yevgeniy Dodis , Noah Stephens-davidowitz N/A
Cryptography with Streaming Algorithms Periklis A. Papakonstantinou , Guang Yang N/A
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator Ran Canetti , Alon Rosen , Yael Tauman Kalai , Omer Paneth , Shafi Goldwasser , Nir Bitansky , Henry Cohn N/A
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications Goichiro Hanaoka , Noboru Kunihiro , Shota Yamada , Takashi Yamakawa N/A
On Virtual Grey Box Obfuscation for General Circuits Ran Canetti , Yael Tauman Kalai , Omer Paneth , Nir Bitansky N/A
Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in $F_{2^{4 cdot 1223}}$ and $F_{2^{12 cdot 367}}$) Thorsten Kleinjung , Robert Granger , Jens Zumbragel N/A
How to Delegate Computations: The Power of No-Signalling Proofs Yael Tauman Kalai N/A
Leakage-Tolerant Computation with Input-Independent Preprocessing Dana Dachman-soled , Huijia Lin , Nir Bitansky N/A
Interactive Proofs under Continual Memory Leakage Vipul Goyal , Prabhanjan Ananth , Omkant Pandey N/A
Amplifying Privacy in Privacy Amplification Leonid Reyzin , Yevgeniy Dodis , Divesh Aggarwal , Zahra Jafargholi , Eric Miles N/A
On the Communication Complexity of Secure Computation Deepesh Data , Manoj M. Prabhakaran , Vinod M. Prabhakaran N/A
Optimal Non-Perfect Uniform Secret Sharing Schemes Oriol Farràs , Torben Hansen , Tarik Kaced , Carles Padró N/A
Proving the TLS Handshake Secure (as it is) Markulf Kohlweiss , Cedric Fournet , Pierre-yves Strub , Karthikeyan Bhargavan , Alfredo Pironti , Santiago Zanella-béguelin N/A
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment Anna Lysyanskaya , Gregory Neven , Jan Camenisch , Anja Lehmann N/A
Scalable Zero Knowledge via Cycles of Elliptic Curves Alessandro Chiesa , Eran Tromer , Eli Ben-sasson , Madars Virza N/A
Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces Arnab Roy , Charanjit Jutla N/A
Physical Zero-Knowledge Proofs of Physical Properties Ben Fisch , Daniel Freund , Moni Naor N/A
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity Ran Canetti , Abhishek Jain , Omer Paneth N/A
Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima N/A
Secure Multi-Party Computation with Identifiable Abort Rafail Ostrovsky , Yuval Ishai , Vassilis Zikas N/A
Non-Interactive Secure Multiparty Computation Yuval Ishai , Anat Paskin-cherniavsky , Amos Beimel , Ariel Gabizon , Eyal Kushilevitz , Sigurd Meldgaard N/A
Feasibility and Infeasibility of Secure Computation with Malicious PUFs Anna Lysyanskaya , Jonathan Katz , Dana Dachman-soled , Nils Fleischhacker , Dominique Schröder N/A
How to Use Bitcoin to Design Fair Protocols Iddo Bentov , Ranjit Kumaresan N/A
FleXOR: Flexible garbling for XOR gates that beats free-XOR Payman Mohassel , Vladimir Kolesnikov , Mike Rosulek N/A
Amortizing Garbled Circuits Jonathan Katz , Yan Huang , Ranjit Kumaresan , Vladimir Kolesnikov , Alex J. Malozemoff N/A
Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings Ben Riva , Yehuda Lindell N/A
Dishonest Majority Multi-Party Computation for Binary Circuits Emmanuela Orsini , Enrique Larraia , Nigel P. Smart N/A