E-Book, Englisch, Band 11692, 771 Seiten, eBook
39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I
E-Book, Englisch, Band 11692, 771 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-030-26948-7
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Award Papers.-
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.- Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE.- Fully Secure Attribute-Based Encryption for t-CNF from LWE.-
Lattice-Based ZK.-
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors.- Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.- Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.- Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs.-
Symmetric Cryptography.-
Seedless Fruit is the Sweetest: Random Number Generation, Revisited.- Nonces are Noticed: AEAD Revisited.- How to Build Pseudorandom Functions From Public Random Permutations.-
Mathematical Cryptanalysis.-
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.- On the Shortness of Vectors to be found bythe Ideal-SVP Quantum Algorithm.-
Proofs of Storage.-
Proofs of Replicated Storage Without Timing Assumptions.- Simple Proofs of Space-Time and Rational Proofs of Storage.-
Non-Malleable Codes.-
Non-Malleable Codes for Decision Trees.- Explicit Rate-1 Non-malleable Codes for Local Tampering.- Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space.-
SNARKs and Blockchains.-
Synchronous, with a Chance of Partition Tolerance.- Subvector Commitments with Application to Succinct Arguments.- Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.-
Homomorphic Cryptography.-
On the Plausibility of Fully Homomorphic Encryption for RAMs.- Homomorphic Time-Lock Puzzles and Applications.- Symmetric Primitives with Structured Secrets.-
Leakage Models and Key Reuse.-
Unifying Leakage Models on a Rényi Day.- Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations.- Security inthe Presence of Key Reuse: Context-Separable Interfaces and their Applications.