


default search action
36th CRYPTO 2016: Santa Barbara, CA, USA - Part I
- Matthew Robshaw, Jonathan Katz:

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9814, Springer 2016, ISBN 978-3-662-53017-7
Provable Security for Symmetric Cryptography
- Viet Tung Hoang, Stefano Tessaro:

Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security. 3-32 - Thomas Peyrin

, Yannick Seurin:
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. 33-63 - Bart Mennink:

XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. 64-94 - Yuanxi Dai, John P. Steinberger:

Indifferentiability of 8-Round Feistel Networks. 95-120 - Benoît Cogliati, Yannick Seurin:

EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. 121-149
Asymmetric Cryptography and Cryptanalysis I
- Martin R. Albrecht, Shi Bai, Léo Ducas:

A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes. 153-178 - Adi Ben-Zvi, Simon R. Blackburn, Boaz Tsaban:

A Practical Cryptanalysis of the Algebraic Eraser. 179-189 - Zvika Brakerski, Renen Perlman:

Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts. 190-213 - Yu Yu, Jiang Zhang

:
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN. 214-243
Cryptography in Theory and Practice
- Mihir Bellare, Björn Tackmann:

The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3. 247-276 - Thomas Shrimpton, Martijn Stam, Bogdan Warinschi:

A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case. 277-307 - Geoffroy Couteau

, Thomas Peters, David Pointcheval
:
Encryption Switching Protocols. 308-338
Compromised Systems
- Yevgeniy Dodis, Ilya Mironov

, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. 341-372 - Mihir Bellare, Daniel Kane, Phillip Rogaway:

Big-Key Symmetric Encryption: Resisting Key Exfiltration. 373-402 - Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:

Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. 403-432
Symmetric Cryptanalysis
- Achiya Bar-On, Nathan Keller:

A 2^70 Attack on the Full MISTY1. 435-456 - Sébastien Duval

, Virginie Lallemand, Yann Rotella:
Cryptanalysis of the FLIP Family of Stream Ciphers. 457-475
Crypto 2016 Award Papers
- Mark Zhandry

:
The Magic of ELFs. 479-508 - Elette Boyle, Niv Gilboa

, Yuval Ishai:
Breaking the Circuit Size Barrier for Secure Computation Under DDH. 509-539
Algorithmic Number Theory
- Taechan Kim

, Razvan Barbulescu:
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case. 543-571 - Craig Costello

, Patrick Longa, Michael Naehrig:
Efficient Algorithms for Supersingular Isogeny Diffie-Hellman. 572-601
Symmetric Primitives
- Bing Sun, Meicheng Liu, Jian Guo

, Longjiang Qu, Vincent Rijmen
:
New Insights on AES-Like SPN Ciphers. 605-624 - Christof Beierle

, Thorsten Kranz, Gregor Leander
:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. 625-653 - Christina Boura, Anne Canteaut:

Another View of the Division Property. 654-682

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














