Time-Specific Encryption / Kenneth G. Paterson ; Elizabeth A. QuagliaEncryption I: |
Public-Key Encryption with Efficient Amortized Updates / Nishanth Chandran ; Rafail Ostrovsky ; William E. Skeith III |
Generic Constructions of Parallel Key-Insulated Encryption / Goichiro Hanaoka ; Jian Weng |
Invited Talk |
Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk) / Chris Peikert |
Cryptanalysis |
Differential Fault Analysis of LEX / Jianyong Huang ; Willy Susilo ; Jennifer Seberry |
Generalized RC4 Key Collisions and Hash Collisions / Jiageng Chen ; Atsuko Miyaji |
Hash Functions |
On the Indifferentiability of the Grøstl Hash Function / Elena Andreeva ; Bart Mennink ; Bart Preneel |
Side Channel Attacks and Leakage Resilience |
Algorithmic Tamper-Proof Security under Probing Attacks / Feng-Hao Liu ; Anna Lysyanskaya |
Leakage-Resilient Storage / Francesco Davi ; Stefan Dziembowski ; Daniele Venturi |
Searching Keywords with Wildcards on Encrypted Data / Saeed Sedghi ; Peter van Liesdonk ; Svetla Nikova ; Pieter Hartel ; Willem JonkerEncryption II: |
Threshold Attribute-Based Signcryption / Martin Gagné ; Shivaramakrishnan Narayan ; Reihaneh Safavi-Naini |
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption / Kaoru Kurosawa ; Ryo Nojima ; Le Trieu PhongCryptographic Protocols I: |
Improved Primitives for Secure Multiparty Integer Computation / Octavian Catrina ; Sebastiaan de Hoogh |
How to Pair with a Human |
Authentication and Key Agreement |
A New Security Model for Authenticated Key Agreement / Augustin P. Sarr ; Philippe Elbaz-Vincent ; Jean-Claude Bajard |
A Security Enhancement and Proof for Authentication and Key Agreement (AKA) / Vladimir Kolesnikov |
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model / Stanistaw Jarecki ; Nitesh Saxena |
Cryptographic Primitives and Schemes |
Kleptography from Standard Assumptions and Applications / Adam Young ; Moti Yung |
Provably Secure Convertible Undeniable Signatures with Unarnbiguity / Wakaha Ogata |
History-Free Aggregate Message Authentication Codes / Oliver Eikemeier ; Marc Fischlin ; Jens-Fabian Götzmann ; Anja Lehmann ; Dominique Schröder ; Peter Schröder ; Daniel Wagner |
Lattice-Based Cryptography |
Recursive Lattice Reduction / Thomas Plantard |
Adaptively Secure Identity-Based Identification from Lattices without Random Oracles / Markus Rückert |
Groups Signatures and Authentication |
The Fiat-Shamir Transform for Group and Ring Signature Schemes / Ming Feng Lee ; Nigel P. Smart ; Bogdan Warinschi |
Get Shorty via Group Signatures without Encryption / Patrik Bichsel ; Jan Camenisch ; Gregory Neven |
Group Message Authentication / Bartosz Przydatek ; Douglas Wikström |
Fast Secure Computation of Set Intersection / Xiaomin LiuCryptographic Protocols II: |
Distributed Private-Key Generators for Identity-Based Cryptography / Aniket Kate ; Ian Goldberg |
Anonymity |
Solving Revocation with Efficient Update of Anonymous Credentials / Markulf Kohlweiss ; Claudio Soriente |
Author Index |
Time-Specific Encryption / Kenneth G. Paterson ; Elizabeth A. QuagliaEncryption I: |
Public-Key Encryption with Efficient Amortized Updates / Nishanth Chandran ; Rafail Ostrovsky ; William E. Skeith III |
Generic Constructions of Parallel Key-Insulated Encryption / Goichiro Hanaoka ; Jian Weng |
Invited Talk |
Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk) / Chris Peikert |
Cryptanalysis |