EuroCrypt 2014 May 11, 2014 to May 15, 2014, copenhagen,denmark

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic Antoine Joux , Razvan Barbulescu , Pierrick Gaudry , Emmanuel Thomé N/A
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur , Ayoub Otmani , Jean-pierre Tillich N/A
Symmetrized summation polynomials: using small order torsion points to speed up elliptic curve index calculus Antoine Joux , Jean-charles Faugère , Louise Huot , Guénaël Renault , Vanessa Vitse N/A
Why Proving HIBE Systems Secure is Difficult Brent Waters , Allison Bishop Lewko N/A
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Robert h. Deng , Junzuo Lai , Yunlei Zhao , Shengli Liu , Jian Weng N/A
A mathematical history of NTRU and some related cryptosystems Jeff Hoffstein N/A
Key Derivation Without Entropy Waste Krzysztof Pietrzak , Daniel Wichs , Yevgeniy Dodis N/A
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits Sebastian Faust , Pratyay Mukherjee , Daniele Venturi , Daniel Wichs N/A
Revocable quantum timed-release encryption Dominique Unruh N/A
Generic Universal Forgery Attack on Iterative Hash-based MACs Lei Wang , Thomas Peyrin N/A
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities Kaisa Nyberg , Céline Blondeau N/A
Faster Compact Diffie-Hellman: Endomorphisms on the x-line Benjamin Smith , Craig Costello , Huseyin Hisil N/A
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation Brent Waters , Amit Sahai , Susan Hohenberger N/A
Protecting Obfuscation Against Algebraic Attacks Amit Sahai , Boaz Barak , Sanjam Garg , Yael Tauman Kalai , Omer Paneth N/A
GGHLite: More Efficient Multilinear Maps from Ideal Lattices Adeline Langlois , Damien Stehlé , Ron Steinfeld N/A
Reconsidering Generic Composition Phillip Rogaway , Thomas Shrimpton , Chanathip Namprempre N/A
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions Kazuhiko Minematsu N/A
The Security and Privacy of Bitcoin Transactions N/a Adi Shamir
Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels , Thomas Ristenpart N/A
Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time Phillip Rogaway , Ben Morris N/A
Tight Security Bounds for Key-Alternating Ciphers Shan Chen , John Steinberger N/A
The Locality of Searchable Symmetric Encryption David Cash , Stefano Tessaro N/A
Post-Snowden Cryptography Moti Yung , Adi Shamir , Panelists: Bart Preneel , Nigel Smart N/A
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing Himanshu Tyagi , Shun Watanabe N/A
Non-Interactive Secure Computation Based on Cut-and-Choose Benny Pinkas , Ben Riva , Payman Mohassel , Arash Afshar N/A
Garbled RAM Revisited Shai Halevi , Mariana Raykova , Rafail Ostrovsky , Craig Gentry , Daniel Wichs , Steve Lu N/A
Unifying Leakage Models: from Probing Attacks to Noisy Leakage Sebastian Faust , Stefan Dziembowski , Alexandre Duc N/A
Higher Order Masking of Look-up Tables Jean-sebastien Coron N/A
How to Certify the Leakage of a Chip? Nicolas Veyrat-charvillon , Francois-xavier Standaert , François Durvaux N/A
Efficient Round Optimal Blind Signatures Sanjam Garg , Divya Gupta N/A
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig Sarah Meiklejohn , Mihir Bellare , Susan Thomson N/A
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures Moti Yung , Benoit Libert , Thomas Peters , Marc Joye N/A
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits Dan Boneh , Shai Halevi , Dhinakaran Vinayagamurthy , Craig Gentry , Gil Segev , Vinod Vaikuntanathan , Sergey Gorbunov , Valeria Nikolaenko N/A
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More Nuttapong Attrapadung N/A
Multi-Input Functional Encryption Jonathan Katz , Elaine Shi , Abhishek Jain , Vipul Goyal , Amit Sahai , Hong-sheng Zhou , Shafi Goldwasser , S. Dov Gordon , Feng-hao Liu N/A
Salvaging Indifferentiability in a Multi-stage Setting Arno Mittelbach N/A
Deja Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn , Melissa Chase N/A
Distributed Point Functions and their Applications Niv Gilboa , Yuval Ishai N/A
A Full Characterization of Completeness for Two-party Randomized Function Evaluation Amit Sahai , Daniel Kraschewski , Hemanta K. Maji , Manoj Prabhakaran N/A
On the Complexity of UC Commitments Juan A. Garay , Yuval Ishai , Ranjit Kumaresan , Hoeteck Wee N/A