{"title":"Fast Reduction of Algebraic Lattices over Cyclotomic Fields","authors":"P. Kirchner, Thomas Espitau, Pierre-Alain Fouque","doi":"10.1007/978-3-030-56880-1_6","DOIUrl":"https://doi.org/10.1007/978-3-030-56880-1_6","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compressed $varSigma $-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics","authors":"T. Attema, R. Cramer","doi":"10.1007/978-3-030-56877-1_18","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_18","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134421301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust","authors":"Marshall Ball, D. Dachman-Soled, Mukul Kulkarni","doi":"10.1007/978-3-030-56877-1_24","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_24","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
{"title":"Fast and Secure Updatable Encryption","authors":"C. Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang","doi":"10.1007/978-3-030-56784-2_16","DOIUrl":"https://doi.org/10.1007/978-3-030-56784-2_16","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132763843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delegation with Updatable Unambiguous Proofs and PPAD-Hardness","authors":"Y. Kalai, Omer Paneth, Lisa Yang","doi":"10.1007/978-3-030-56877-1_23","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_23","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133836404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model","authors":"Sarvar Patel, G. Persiano, Kevin Yeo","doi":"10.1007/978-3-030-56784-2_15","DOIUrl":"https://doi.org/10.1007/978-3-030-56784-2_15","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"734 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121803827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Victoria de Quehen, Péter Kutas, Christopher Leonardi, C. Martindale, Lorenz Panny, C. Petit, Katherine E. Stange
{"title":"Improved Torsion-Point Attacks on SIDH Variants","authors":"Victoria de Quehen, Péter Kutas, Christopher Leonardi, C. Martindale, Lorenz Panny, C. Petit, Katherine E. Stange","doi":"10.1007/978-3-030-84252-9_15","DOIUrl":"https://doi.org/10.1007/978-3-030-84252-9_15","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134532376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-interactive zero-knowledge arguments for QMA, with preprocessing","authors":"Andrea Coladangelo, Thomas Vidick, Tina Zhang","doi":"10.1007/978-3-030-56877-1_28","DOIUrl":"https://doi.org/10.1007/978-3-030-56877-1_28","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123066362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}