↓ Skip to main content

Advances in Cryptology – EUROCRYPT 2014

Overview of attention for book
Advances in Cryptology – EUROCRYPT 2014
Springer Berlin Heidelberg

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Heuristic Quasi-Polynomial Algorithm for Discrete Logarithm in Finite Fields of Small Characteristic
  3. Altmetric Badge
    Chapter 2 Polynomial Time Attack on Wild McEliece over Quadratic Extensions
  4. Altmetric Badge
    Chapter 3 Symmetrized Summation Polynomials: Using Small Order Torsion Points to Speed Up Elliptic Curve Index Calculus
  5. Altmetric Badge
    Chapter 4 Why Proving HIBE Systems Secure Is Difficult
  6. Altmetric Badge
    Chapter 5 Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
  7. Altmetric Badge
    Chapter 6 Key Derivation without Entropy Waste
  8. Altmetric Badge
    Chapter 7 Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
  9. Altmetric Badge
    Chapter 8 Revocable Quantum Timed-Release Encryption
  10. Altmetric Badge
    Chapter 9 Generic Universal Forgery Attack on Iterative Hash-Based MACs
  11. Altmetric Badge
    Chapter 10 Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
  12. Altmetric Badge
    Chapter 11 Faster Compact Diffie–Hellman: Endomorphisms on the x-line
  13. Altmetric Badge
    Chapter 12 Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
  14. Altmetric Badge
    Chapter 13 Protecting Obfuscation against Algebraic Attacks
  15. Altmetric Badge
    Chapter 14 GGHLite: More Efficient Multilinear Maps from Ideal Lattices
  16. Altmetric Badge
    Chapter 15 Reconsidering Generic Composition
  17. Altmetric Badge
    Chapter 16 Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
  18. Altmetric Badge
    Chapter 17 Honey Encryption: Security Beyond the Brute-Force Bound
  19. Altmetric Badge
    Chapter 18 Sometimes-Recurse Shuffle
  20. Altmetric Badge
    Chapter 19 Tight Security Bounds for Key-Alternating Ciphers
  21. Altmetric Badge
    Chapter 20 The Locality of Searchable Symmetric Encryption
  22. Altmetric Badge
    Chapter 21 A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing
  23. Altmetric Badge
    Chapter 22 Non-Interactive Secure Computation Based on Cut-and-Choose
  24. Altmetric Badge
    Chapter 23 Garbled RAM Revisited
  25. Altmetric Badge
    Chapter 24 Unifying Leakage Models: From Probing Attacks to Noisy Leakage.
  26. Altmetric Badge
    Chapter 25 Higher Order Masking of Look-Up Tables
  27. Altmetric Badge
    Chapter 26 How to Certify the Leakage of a Chip?
  28. Altmetric Badge
    Chapter 27 Efficient Round Optimal Blind Signatures
  29. Altmetric Badge
    Chapter 28 Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
  30. Altmetric Badge
    Chapter 29 Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
  31. Altmetric Badge
    Chapter 30 Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
  32. Altmetric Badge
    Chapter 31 Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
  33. Altmetric Badge
    Chapter 32 Multi-input Functional Encryption
  34. Altmetric Badge
    Chapter 33 Salvaging Indifferentiability in a Multi-stage Setting
  35. Altmetric Badge
    Chapter 34 Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
  36. Altmetric Badge
    Chapter 35 Distributed Point Functions and Their Applications
  37. Altmetric Badge
    Chapter 36 A Full Characterization of Completeness for Two-Party Randomized Function Evaluation
  38. Altmetric Badge
    Chapter 37 On the Complexity of UC Commitments
  39. Altmetric Badge
    Chapter 38 Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption
Attention for Chapter 5: Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
Altmetric Badge

Citations

dimensions_citation
16 Dimensions

Readers on

mendeley
43 Mendeley