{"title":"Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem","authors":"G. Leurent, Ferdinand Sibleyras","doi":"10.1007/978-3-030-26951-7_8","DOIUrl":"https://doi.org/10.1007/978-3-030-26951-7_8","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114922093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benoît Cogliati, Y. Dodis, Jonathan Katz, Jooyoung Lee, J. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang
{"title":"Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks","authors":"Benoît Cogliati, Y. Dodis, Jonathan Katz, Jooyoung Lee, J. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang","doi":"10.1007/978-3-319-96884-1_24","DOIUrl":"https://doi.org/10.1007/978-3-319-96884-1_24","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"242 1‐2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma
{"title":"IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited","authors":"Haodong Jiang, Zhenfeng Zhang, Long Chen, Hong Wang, Zhi Ma","doi":"10.1007/978-3-319-96878-0_4","DOIUrl":"https://doi.org/10.1007/978-3-319-96878-0_4","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124131925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nuttapong Attrapadung, Takahiro Matsuda, R. Nishimaki, Shota Yamada, Takashi Yamakawa
{"title":"Constrained PRFs for mathrmNC^1 in Traditional Groups","authors":"Nuttapong Attrapadung, Takahiro Matsuda, R. Nishimaki, Shota Yamada, Takashi Yamakawa","doi":"10.1007/978-3-319-96881-0_19","DOIUrl":"https://doi.org/10.1007/978-3-319-96881-0_19","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem","authors":"J. Cheon, Minki Hhan, Jiseung Kim, Changmin Lee","doi":"10.1007/978-3-319-96878-0_7","DOIUrl":"https://doi.org/10.1007/978-3-319-96878-0_7","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis via Algebraic Spans","authors":"Adi Ben-Zvi, A. Kalka, B. Tsaban","doi":"10.1007/978-3-319-96884-1_9","DOIUrl":"https://doi.org/10.1007/978-3-319-96884-1_9","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114843056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Dodis, Paul Grubbs, T. Ristenpart, Joanne Woodage
{"title":"Fast Message Franking: From Invisible Salamanders to Encryptment","authors":"Y. Dodis, Paul Grubbs, T. Ristenpart, Joanne Woodage","doi":"10.1007/978-3-319-96884-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-96884-1_6","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combiners for Backdoored Random Oracles","authors":"B. Bauer, P. Farshim, Sogol Mazaheri","doi":"10.1007/978-3-319-96881-0_10","DOIUrl":"https://doi.org/10.1007/978-3-319-96881-0_10","url":null,"abstract":"","PeriodicalId":173822,"journal":{"name":"Annual International Cryptology Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}