In Cooperation
with IACR


ACCEPTED PAPERS

  1. Codes of length 2 correcting single errors of limited size
    Torleiv Kløve
    University of Bergen
  2. Soft distance metric decoding of polar codes
    Monica C. Liberatori; Leonardo J. Arnone; Jorge Castiñeira Moreira; Patrick G. Farrell
    Electronics Department, Engineering School, Mar del Plata University, Argentina; Electronics Department, Engineering School, Mar del Plata University, Argentina; Electronics Department, Engineering School, Mar del Plata University, Argentina; University of Kent, Kent, UK
  3. Zero-Knowledge Interactive Proof Systems for New Lattice Problems
    Claude Crépeau; Raza Ali Kazmi
    School of Computer Science, McGill University; School of Computer Science, McGill University
  4. A New Approach To Efficient Revocable Attribute-Based Anonymous Credentials
    David Derler; Christian Hanser; Daniel Slamanig
    IAIK, Graz University of Technology; IAIK, Graz University of Technology; IAIK, Graz University of Technology
  5. Security Against Related Randomness Attacks via Reconstructive Extractors
    Kenneth G. Paterson; Jacob C. N. Schuldt; Dale L. Sibborn; Hoeteck Wee
    Royal Holloway, University of London; Research Center for Information Security, AIST; Royal Holloway, University of London; ENS, Paris
  6. On the diffusion property of iterated functions
    Jian Liu; Sihem Mesnager; Lusheng Chen
    School of Computer Software, Tianjin University, Tianjin 300072, P. R. China and CNRS, UMR 7539, LAGA, Paris, France; Department of Mathematics, University of Paris VIII, University of Paris XIII, CNRS, UMR 7539 LAGA and Telecom ParisTech, Paris, France; School of Mathematical Sciences, Nankai University, Tianjin 300071, P. R. China
  7. Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
    Janaka Alawatugoda; Douglas Stebila; Colin Boyd
    Queensland University of Technology; Queensland University of Technology; Norwegian University of Science and Technology
  8. A Leakage Resilient MAC
    Daniel P. Martin; Elisabeth Oswald; Martijn Stam; Marcin Wójcik
    University of Bristol; University of Bristol; University of Bristol; University of Bristol
  9. Robust Authenticated Encryption and the Limits of Symmetric Cryptography
    Christian Badertscher; Christian Matt; Ueli Maurer; Phillip Rogaway; Björn Tackmann
    ETH Zurich; ETH Zurich; ETH Zurich; UC Davis; UC San Diego
  10. Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
    Giuseppe Ateniese; Antonio Faonio; Seny Kamara
    Sapienza Univ. of Rome and John Hopkins University; Aarhus University; Microsoft Research
  11. Bent and semi-bent functions via linear translators
    Neşe Koçak; Sihem Mesnager; Ferruh Özbudak
    ASELSAN Inc. Ankara, Turkey; University of Paris VIII, University of Paris XIII, CNRS and Telecom ParisTech, France; Middle East Technical University, Ankara, Turkey
  12. Tweak-Length Extension for Tweakable Block Ciphers
    Kazuhiko Minematsu; Tetsu Iwata
    NEC Corporation; Nagoya University
  13. Comparison of cube attacks over different vector spaces
    Richard Winter; Ana Salagean; Raphael C.W. Phan
    Loughborough University; Loughborough University; Multimedia University
  14. MI-T-HFE, a New Multivariate Signature Scheme
    Wenbin Zhang; Chik How Tan
    Temasek Laboratories, National University of Singapore; Temasek Laboratories, National University of Singapore
  15. Rogue decryption failures: reconciling AE robustness notions
    Guy Barwell; Daniel Page; Martijn Stam
    University of Bristol; University of Bristol; University of Bristol
  16. Shannon Entropy versus Renyi Entropy from a Cryptographic Viewpoint
    Maciej Skorski
    University of Warsaw
  17. On the Doubly Sparse Compressed Sensing Problem
    Grigory Kabatiansky; Serge Vladuts; Cedric Tavernier
    Kharkevich Institute for Information Transmission Problems, Russian Academy of Sciences, Moscow, Russia (IITP RAS); IITP RAS and Aix-Marseille Universite, IML, Marseille, France; Assystems AEOS, France
  18. A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
    Shota Goto; Junji Shikata
    Yokohama National University in Japan; Yokohama National University in Japan