Quantum-Secure Message Authentication Codes (English)
- New search for: Boneh, Dan
- New search for: Zhandry, Mark
- New search for: Boneh, Dan
- New search for: Zhandry, Mark
In:
Advances in Cryptology, EUROCRYPT, Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2013
;
592-608
;
2013
-
ISSN:
- Conference paper / Print
-
Title:Quantum-Secure Message Authentication Codes
-
Contributors:Boneh, Dan ( author ) / Zhandry, Mark ( author )
-
Published in:Lecture Notes in Computer Science ; 7881 ; 592-608
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013
-
Size:17 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Candidate Multilinear Maps from Ideal LatticesGarg, S. / Gentry, C. / Halevi, S. et al. | 2013
- 18
-
Lossy Codes and a New Variant of the Learning-With-Errors ProblemDottling, N. / Muller-Quade, J. et al. | 2013
- 35
-
A Toolkit for Ring-LWE CryptographyLyubashevsky, V. / Peikert, C. / Regev, O. et al. | 2013
- 55
-
Regularity of Lossy RSA on Subdomains and Its ApplicationsLewko, M. / O Neill, A. / Smith, A. et al. | 2013
- 76
-
Efficient Cryptosystems from 2^k-th Power Residue SymbolsJoye, M. / Libert, B. et al. | 2013
- 93
-
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext DistributionsRaghunathan, A. / Segev, G. / Vadhan, S. et al. | 2013
- 111
-
How to Watermark Cryptographic FunctionsNishimaki, R. et al. | 2013
- 126
-
Security Evaluations beyond Computing Power: How to Analyze Side-Channel Attacks You Cannot Mount?Veyrat-Charvillon, N. / Gerard, B. / Standaert, F.-X. et al. | 2013
- 142
-
Masking against Side-Channel Attacks: A Formal Security ProofProuff, E. / Rivain, M. et al. | 2013
- 160
-
Leakage-Resilient Cryptography from Minimal AssumptionsHazay, C. / Lopez-Alt, A. / Wee, H. / Wichs, D. et al. | 2013
- 177
-
Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite FieldsJoux, A. et al. | 2013
- 194
-
Fast Cryptography in Genus 2Bos, J.W. / Costello, C. / Hisil, H. / Lauter, K. et al. | 2013
- 211
-
Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' ProblemBouillaguet, C. / Fouque, P.-A. / Veber, A. et al. | 2013
- 228
-
Cryptanalysis of Full RIPEMD-128Landelle, F. / Peyrin, T. et al. | 2013
- 245
-
New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision AnalysisStevens, M. et al. | 2013
- 262
-
Improving Local Collisions: New Attacks on Reduced SHA-256Mendel, F. / Nad, T. / Schlaffer, M. et al. | 2013
- 279
-
Dynamic Proofs of Retrievability via Oblivious RAMCash, D. / Kupcu, A. / Wichs, D. et al. | 2013
- 296
-
Message-Locked Encryption and Secure DeduplicationBellare, M. / Keelveedhi, S. / Ristenpart, T. et al. | 2013
- 313
-
KeccakBertoni, G. / Daemen, J. / Peeters, M. / Van Assche, G. et al. | 2013
- 315
-
Batch Fully Homomorphic Encryption over the IntegersCheon, J.H. / Coron, J.-S. / Kim, J. / Lee, M.S. / Lepoint, T. / Tibouchi, M. / Yun, A. et al. | 2013
- 336
-
Practical Homomorphic MACs for Arithmetic CircuitsCatalano, D. / Fiore, D. et al. | 2013
- 353
-
Streaming Authenticated Data StructuresPapamanthou, C. / Shi, E. / Tamassia, R. / Yi, K. et al. | 2013
- 371
-
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key SettingDerbez, P. / Fouque, P.-A. / Jean, J. et al. | 2013
- 388
-
New Links between Differential and Linear CryptanalysisBlondeau, C. / Nyberg, K. et al. | 2013
- 405
-
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade EncryptionLee, J. et al. | 2013
- 426
-
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash FunctionsBaecher, P. / Farshim, P. / Fischlin, M. / Stam, M. et al. | 2013
- 444
-
Limitations of the Meta-reduction Technique: The Case of Schnorr SignaturesFischlin, M. / Fleischhacker, N. et al. | 2013
- 461
-
Practical Signatures from Standard AssumptionsBohl, F. / Hofheinz, D. / Jager, T. / Koch, J. / Seo, J.H. / Striecks, C. et al. | 2013
- 486
-
Locally Computable UOWHF with Linear ShrinkageApplebaum, B. / Moses, Y. et al. | 2013
- 503
-
Amplification of Chosen-Ciphertext SecurityLin, H. / Tessaro, S. et al. | 2013
- 520
-
Circular Chosen-Ciphertext Security with Compact CiphertextsHofheinz, D. et al. | 2013
- 537
-
MiniLEGO: Efficient Secure Two-Party Computation from General AssumptionsFrederiksen, T.K. / Jakobsen, T.P. / Nielsen, J.B. / Nordholt, P.S. / Orlandi, C. et al. | 2013
- 557
-
How to Hide Circuits in MPC an Efficient Framework for Private Function EvaluationMohassel, P. / Sadeghian, S. et al. | 2013
- 575
-
Multi-party Computation of Polynomials and Branching Programs without Simultaneous InteractionGordon, S.D. / Malkin, T. / Rosulek, M. / Wee, H. et al. | 2013
- 592
-
Quantum-Secure Message Authentication CodesBoneh, D. / Zhandry, M. et al. | 2013
- 609
-
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy GamesTomamichel, M. / Fehr, S. / Kaniewski, J. / Wehner, S. et al. | 2013
- 626
-
Quadratic Span Programs and Succinct NIZKs without PCPsGennaro, R. / Gentry, C. / Parno, B. / Raykova, M. et al. | 2013
- 646
-
Zero-Knowledge Argument for Polynomial Evaluation with Application to BlacklistsBayer, S. / Groth, J. et al. | 2013
- 664
-
Resource-Restricted IndifferentiabilityDemay, G. / Gazi, P. / Hirt, M. / Maurer, U. et al. | 2013
- 684
-
On Concurrently Secure Computation in the Multiple Ideal Query ModelGoyal, V. / Jain, A. et al. | 2013
- 702
-
Universally Composable Secure Computation with (Malicious) Physically Uncloneable FunctionsOstrovsky, R. / Scafuro, A. / Visconti, I. / Wadia, A. et al. | 2013
- 719
-
How to Garble RAM Programs?Lu, S. / Ostrovsky, R. et al. | 2013