Advances in Cryptology – EUROCRYPT 2020最新文献

筛选
英文 中文
Correction to: Optimal Merging in Quantum k-xor and k-sum Algorithms 修正:量子k-xor和k-sum算法的最优合并
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-05-01 DOI: 10.1007/978-3-030-45724-2_29
M. Naya-Plasencia, A. Schrottenloher
{"title":"Correction to: Optimal Merging in Quantum k-xor and k-sum Algorithms","authors":"M. Naya-Plasencia, A. Schrottenloher","doi":"10.1007/978-3-030-45724-2_29","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_29","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123789543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Succinct Non-interactive Secure Computation 简洁的非交互安全计算
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_8
Andrew Morgan, R. Pass, Antigoni Polychroniadou
{"title":"Succinct Non-interactive Secure Computation","authors":"Andrew Morgan, R. Pass, Antigoni Polychroniadou","doi":"10.1007/978-3-030-45724-2_8","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_8","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122655592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Two-Round Oblivious Transfer from CDH or LPN 从CDH或LPN进行两轮无关转移
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_26
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, D. Wichs
{"title":"Two-Round Oblivious Transfer from CDH or LPN","authors":"Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, D. Wichs","doi":"10.1007/978-3-030-45724-2_26","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_26","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130401933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Efficient Constructions for Almost-Everywhere Secure Computation 几乎无处不在的安全计算的高效结构
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_6
S. Jayanti, Srinivasan Raghuraman, Nikhil Vyas
{"title":"Efficient Constructions for Almost-Everywhere Secure Computation","authors":"S. Jayanti, Srinivasan Raghuraman, Nikhil Vyas","doi":"10.1007/978-3-030-45724-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_6","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PSI from PaXoS: Fast, Malicious Private Set Intersection 来自PaXoS的PSI:快速,恶意私有集交集
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_25
Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
{"title":"PSI from PaXoS: Fast, Malicious Private Set Intersection","authors":"Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai","doi":"10.1007/978-3-030-45724-2_25","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_25","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Hardness of LWE on General Entropic Distributions 一般熵分布下LWE的硬度
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_19
Zvika Brakerski, Nico Döttling
{"title":"Hardness of LWE on General Entropic Distributions","authors":"Zvika Brakerski, Nico Döttling","doi":"10.1007/978-3-030-45724-2_19","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_19","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115859595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
On the Streaming Indistinguishability of a Random Permutation and a Random Function 随机排列与随机函数的流不可区分性
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_15
Itai Dinur
{"title":"On the Streaming Indistinguishability of a Random Permutation and a Random Function","authors":"Itai Dinur","doi":"10.1007/978-3-030-45724-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_15","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115352028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the Memory-Tightness of Hashed ElGamal 散列ElGamal的记忆紧性
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_2
Ashrujit Ghoshal, Stefano Tessaro
{"title":"On the Memory-Tightness of Hashed ElGamal","authors":"Ashrujit Ghoshal, Stefano Tessaro","doi":"10.1007/978-3-030-45724-2_2","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_2","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation 适合阈值实现的轻量级认证加密模式
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_24
Yusuke Naito, Yu Sasaki, T. Sugawara
{"title":"Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation","authors":"Yusuke Naito, Yu Sasaki, T. Sugawara","doi":"10.1007/978-3-030-45724-2_24","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_24","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125351350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
The Price of Active Security in Cryptographic Protocols 加密协议中主动安全的代价
Advances in Cryptology – EUROCRYPT 2020 Pub Date : 2020-03-25 DOI: 10.1007/978-3-030-45724-2_7
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
{"title":"The Price of Active Security in Cryptographic Protocols","authors":"Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss","doi":"10.1007/978-3-030-45724-2_7","DOIUrl":"https://doi.org/10.1007/978-3-030-45724-2_7","url":null,"abstract":"","PeriodicalId":166848,"journal":{"name":"Advances in Cryptology – EUROCRYPT 2020","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116976091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信