{"title":"A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case","authors":"Thomas Shrimpton, Martijn Stam, B. Warinschi","doi":"10.1007/978-3-662-53018-4_11","DOIUrl":"https://doi.org/10.1007/978-3-662-53018-4_11","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices","authors":"Christof Beierle, Thorsten Kranz, G. Leander","doi":"10.1007/978-3-662-53018-4_23","DOIUrl":"https://doi.org/10.1007/978-3-662-53018-4_23","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131305217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials","authors":"Melissa Chase, C. Ganesh, Payman Mohassel","doi":"10.1007/978-3-662-53015-3_18","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_18","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens","authors":"J. Camenisch, M. Dubovitskaya, A. Rial","doi":"10.1007/978-3-662-53015-3_8","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_8","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121368068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming","authors":"Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo","doi":"10.1007/978-3-662-53015-3_14","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_14","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"41 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133077038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium","authors":"Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan","doi":"10.1007/978-3-662-53008-5_20","DOIUrl":"https://doi.org/10.1007/978-3-662-53008-5_20","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122959120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linicrypt: A Model for Practical Cryptography","authors":"Brent Carmer, Mike Rosulek","doi":"10.1007/978-3-662-53015-3_15","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_15","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124812252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michele Ciampi, R. Ostrovsky, Luisa Siniscalchi, Ivan Visconti
{"title":"Concurrent Non-Malleable Commitments (and More) in 3 Rounds","authors":"Michele Ciampi, R. Ostrovsky, Luisa Siniscalchi, Ivan Visconti","doi":"10.1007/978-3-662-53015-3_10","DOIUrl":"https://doi.org/10.1007/978-3-662-53015-3_10","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}