EUROCRYPT Best Papers CollectingEurocrypt 2020 is the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Eurocrypt is one of the three flagship conferences of the International Association for Cryptologic Research (IACR).
Shweta Agrawal, Shota Yamada
IACR Cryptology ePrint Archive, (2020): 228
Cited by0BibtexViews32Links
0
0
IACR Cryptology ePrint Archive, (2019): 1075
Cited by0BibtexViews47Links
0
0
Benjamin Wesolowski
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, (2018): 379-407
We construct a verifiable delay function (VDF). A VDF is a function whose evaluation requires running a given number of sequential steps, yet the result can be efficiently verified. They have applications in decentralised systems, such as the generation of trustworthy public rand...
Cited by59BibtexViews32Links
0
0
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, (2017): 408-438
Public key quantum money can be seen as a version of the quantum no-cloning theorem that holds even when the quantum states can be verified by the adversary. In this work, we investigate quantum lightning where no-cloning holds even when the adversary herself generates the quantu...
Cited by19BibtexViews33Links
0
0
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, (2015): 3-12
These promising applications were only day-dreaming exercises, as no realization of such multilinear maps was known. This was changed about ten years later, as Garg, Gentry and Halevi proposed the first approximation to multilinear maps. They introduced the concept of graded enco...
Cited by255BibtexViews101Links
0
0
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, (2015): 15-44
The reader may have noticed that there is no distinction in the RAE security definition between the nonce N and associated data A
Cited by136BibtexViews87Links
0
0
Anne Canteaut, Joëlle Roué
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, (2015): 45-74
For the Sboxes with multiplicative-invariant derivatives or Walsh transform, we can compute a lower bound on MEDP2 and MELP2 independently of the choice of the MDS diffusion layer
Cited by30BibtexViews56Links
0
0
EUROCRYPT, no. 1 (2014): 423-440
Unifying Leakage Models: From Probing Attacks to Noisy Leakage 425 leakage resilient cryptography the security analysis of Prouff and Rivain relies on so-called leak-free gates
Cited by6BibtexViews85Links
0
0
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, (2013): 1-17
The security of the multilinear-DDH problem in our constructions relies on new hardness assumptions, and we provide an extensive cryptanalysis to validate these assumptions
Cited by647BibtexViews65Links
0
0
J. Cryptology, no. 4 (2011): 1238-1275
Our first contribution is a two-round authentication protocol which we prove secure against active attacks assuming the hardness of the learning parity with noise problem
Cited by9BibtexViews54Links
0
0
Journal of Cryptology, no. 4 (2010): 601-639
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area
Cited by599BibtexViews59Links
0
0
Theory and Application of Cryptographic Techniques, no. 1 (2008): 97-139
We demonstrate that fuzzy extractors can be built out of secure sketches by utilizing strong randomness extractors, such as, for example, pairwise-independent hash functions
Cited by1318BibtexViews54Links
0
0
Lecture Notes in Computer Science, (2005): 457-473
We introduced the concept of Fuzzy Identity Based Encryption, which allows for error-tolerance between the identity of a private key and the public key used to encrypt a ciphertext
Cited by3632BibtexViews65Links
0
0