|
ACCEPTED PAPERS
- Codes of length 2 correcting single errors of limited size
Torleiv Kløve University of Bergen
- Soft distance metric decoding of polar codes
Monica C. Liberatori; Leonardo J. Arnone; Jorge Castiñeira Moreira; Patrick G. Farrell Electronics Department, Engineering School, Mar del Plata University, Argentina; Electronics Department, Engineering School, Mar del Plata University, Argentina; Electronics Department, Engineering School, Mar del Plata University, Argentina; University of Kent, Kent, UK
- Zero-Knowledge Interactive Proof Systems for New Lattice Problems
Claude Crépeau; Raza Ali Kazmi School of Computer Science, McGill University; School of Computer Science, McGill University
- A New Approach To Efficient Revocable Attribute-Based Anonymous Credentials
David Derler; Christian Hanser; Daniel Slamanig IAIK, Graz University of Technology; IAIK, Graz University of Technology; IAIK, Graz University of Technology
- Security Against Related Randomness Attacks via Reconstructive Extractors
Kenneth G. Paterson; Jacob C. N. Schuldt; Dale L. Sibborn; Hoeteck Wee Royal Holloway, University of London; Research Center for Information Security, AIST; Royal Holloway, University of London; ENS, Paris
- On the diffusion property of iterated functions
Jian Liu; Sihem Mesnager; Lusheng Chen School of Computer Software, Tianjin University, Tianjin 300072, P. R. China and CNRS, UMR 7539, LAGA, Paris, France; Department of Mathematics, University of Paris VIII, University of Paris XIII, CNRS, UMR 7539 LAGA and Telecom ParisTech, Paris, France; School of Mathematical Sciences, Nankai University, Tianjin 300071, P. R. China
- Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange
Janaka Alawatugoda; Douglas Stebila; Colin Boyd Queensland University of Technology; Queensland University of Technology; Norwegian University of Science and Technology
- A Leakage Resilient MAC
Daniel P. Martin; Elisabeth Oswald; Martijn Stam; Marcin Wójcik University of Bristol; University of Bristol; University of Bristol; University of Bristol
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Christian Badertscher; Christian Matt; Ueli Maurer; Phillip Rogaway; Björn Tackmann ETH Zurich; ETH Zurich; ETH Zurich; UC Davis; UC San Diego
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
Giuseppe Ateniese; Antonio Faonio; Seny Kamara Sapienza Univ. of Rome and John Hopkins University; Aarhus University; Microsoft Research
- Bent and semi-bent functions via linear translators
Neşe Koçak; Sihem Mesnager; Ferruh Özbudak ASELSAN Inc. Ankara, Turkey; University of Paris VIII, University of Paris XIII, CNRS and Telecom ParisTech, France; Middle East Technical University, Ankara, Turkey
- Tweak-Length Extension for Tweakable Block Ciphers
Kazuhiko Minematsu; Tetsu Iwata NEC Corporation; Nagoya University
- Comparison of cube attacks over different vector spaces
Richard Winter; Ana Salagean; Raphael C.W. Phan Loughborough University; Loughborough University; Multimedia University
- MI-T-HFE, a New Multivariate Signature Scheme
Wenbin Zhang; Chik How Tan Temasek Laboratories, National University of Singapore; Temasek Laboratories, National University of Singapore
- Rogue decryption failures: reconciling AE robustness notions
Guy Barwell; Daniel Page; Martijn Stam University of Bristol; University of Bristol; University of Bristol
- Shannon Entropy versus Renyi Entropy from a Cryptographic Viewpoint
Maciej Skorski University of Warsaw
- On the Doubly Sparse Compressed Sensing Problem
Grigory Kabatiansky; Serge Vladuts; Cedric Tavernier Kharkevich Institute for Information Transmission Problems, Russian Academy of Sciences, Moscow, Russia (IITP RAS); IITP RAS and
Aix-Marseille Universite, IML, Marseille, France; Assystems AEOS, France
- A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Shota Goto; Junji Shikata Yokohama National University in Japan; Yokohama National University in Japan
|