asiacrypt 2013 Dec. 1, 2013 to Dec. 5, 2013, Bengalore,India

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces (Best Paper Award) Arnab Roy , Charanjit Jutla N/A
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model Abhishek Jain , Vipul Goyal , Rafail Ostrovsky , Silas Richelson , Ivan Visconti N/A
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes Helger Lipmaa N/A
Families of fast elliptic curves from Q-curves Benjamin Smith N/A
Four-dimensional GLV via the Weil restriction Aurore Guillevic , Sorina Ionica N/A
Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shai Halevi , Shweta Agrawal , Craig Gentry , Amit Sahai N/A
New Insight into the Isomorphism of Polynomial Problem IP1S and its Use in Cryptography Gilles Macario-rat , Jérôme Plut , Henri Gilbert N/A
Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited Sandro Coretti , Ueli Maurer , Bjoern Tackmann N/A
Reset Indifferentiability and its Consequences Christina Brzuska , Paul Baecher , Arno Mittelbach N/A
Computational Fuzzy Extractors Leonid Reyzin , Benjamin Fuller , Xianrui Meng N/A
Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization Joseph M. Renes , Renato Renner , David Sutter N/A
SPHF-Friendly Non-Interactive Commitments David Pointcheval , Michel Abdalla , Fabrice Benhamouda , Olivier Blazy , Céline Chevalier N/A
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency Moti Yung , Kwangsu Lee , Seung Geol Choi , Dong Hoon Lee , Jong Hwan Park N/A
Function-Private Subspace-Membership Encryption and Its Applications Dan Boneh , Ananth Raghunathan , Gil Segev N/A
Random Projections, Graph Sparsification, and Differential Privacy Jalaj Upadhyay N/A
Notions of Black-Box Reductions, Revisited Marc Fischlin , Christina Brzuska , Paul Baecher N/A
Adaptive and Concurrent Secure Computation from New Adaptive, Non-Malleable Commitments Dana Dachman-soled , Tal Malkin , Mariana Raykova , Muthuramakrishnan Venkitasubramaniam N/A
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $mbox{AES}^{2}$ Orr Dunkelman , Adi Shamir , Itai Dinur , Nathan Keller N/A
Key Difference Invariant Bias in Block Ciphers Vincent Rijmen , Andrey Bogdanov , Meiqin Wang , Christina Boura , Long Wen , Jingyuan Zhao N/A
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE Wenling Wu , Hongjun Wu , Tao Huang , Shengbao Wu , Mingsheng Wang N/A
Block ciphers - past and present Lars r. Knudsen N/A
A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton , R. Seth Terashima N/A
Parallelizable and Authenticated Online Ciphers Andrey Bogdanov , Bart Mennink , Elena Andreeva , Atul Luykx , Elmar Tischhauser , Kan Yasuda N/A
How to Construct an Ideal Cipher from a Small Set of Public Permutations Rodolphe Lampe , Yannick Seurin N/A
Generic Key Recovery Attack on Feistel Scheme Takanori Isobe , Kyoji Shibutani N/A
Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests Marcin Wojcik , Luke Mather , Elisabeth Oswald , Joe Bandenburg N/A
Behind the Scene of Side Channel Attacks Thomas Roche , Victor Lomné , Emmanuel Prouff N/A
SCARE of Secret Ciphers with SPN Structures Matthieu Rivain , Thomas Roche N/A
New Generic Attacks Against Hash-based MACs Gaetan Leurent , Thomas Wang N/A
Cryptanalysis of HMAC/NMAC-Whirlpool Yu Sasaki , Lei Wang , Shuang Wu , Jian Guo N/A
Lattice-Based Group Signatures with Logarithmic Signature Size Benoit Libert , Fabien Laguillaumie , Adeline Langlois , Damien Stehlé N/A
The Fiat--Shamir Transformation in a Quantum World Marc Fischlin , Özgür Dagdelen , Tommaso Gagliardoni N/A
On the Security of One-Witness Blind Signature Schemes Anna Lysyanskaya , Foteini Baldimtsi N/A
Engineering Privacy-Friendly Computations George Danezis N/A
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions Ivan Damgaard , Alessandra Scafuro N/A
Functional Encryption from (Small) Hardware Tokens Jonathan Katz , Kai-min Chung , Hong-sheng Zhou N/A
Bounded Tamper Resilience: How to go beyond the Algebraic Barrier Sebastian Faust , Ivan Damgaard , Pratyay Mukherjee , Daniele Venturi N/A
Tamper Resilient Circuits: The Adversary at the Gates Aggelos Kiayias , Yiannis Tselekounis N/A
Efficient General-Adversary Multi-Party Computation Martin Hirt , Daniel Tschudi N/A
Fair and Efficient Secure Multiparty Computation with Reputation Systems Yehuda Lindell , Hila Zarosim , Gilad Asharov N/A
Between a Rock and a Hard Place: Interpolating Between MPC and FHE Ashish Choudhury , Jake Loftus , Emmanuela Orsini , Arpita Smart N/A
Building Lossy Trapdoor Functions from Lossy Encryption Rafail Ostrovsky , Brett Hemenway N/A
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters Yu Yu , Xiangxue Li , Jian Weng N/A
Constrained Pseudorandom Functions and Their Applications Dan Boneh , Brent Waters N/A
Fully Homomorphic Message Authenticators Rosario Gennaro , Daniel Wichs N/A
Non-uniform cracks in the concrete: the power of free precomputation Daniel J. Bernstein , Tanja Lange N/A
Naturally Rehearsing Passwords Anupam Datta , Jeremiah Blocki , Manuel Blum N/A
Factoring RSA keys from certified smart cards: Coppersmith in the wild Nadia Heninger , Daniel J. Bernstein , Chen-mou Cheng , Tanja Lange , Nicko van Someren , Yun-an Chang , Li-ping Chou N/A
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Baodong Qin , Shengli Liu N/A
On Continual Leakage of Discrete Log Representations Shweta Agrawal , Daniel Wichs , Yevgeniy Dodis , Vinod Vaikuntanathan N/A
Hiding the Input-Size in Secure Two-Party Computation Yehuda Lindell , Claudio Orlandi , Kobbi Nissim N/A
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique Luís Brandão N/A
A heuristic for finding compatible differential paths with application to HAS-160 Aleksandar Kircanski , Riham Altawy , Amr M. Youssef N/A
Improved Cryptanalysis of Reduced RIPEMD-160 Lei Wang , Florian Mendel , Shuang Wu , Thomas Peyrin , Martin Schläffer N/A
Limited-birthday Distinguishers for Hash Functions Collisions Beyond the Birthday Bound can be Meaningful Yu Sasaki , Thomas Peyrin , Mitsugu Iwamoto N/A