CRYPTO 2016:
Matthew J. B. Robshaw and Jonathan Katz (Eds.):
Advances in Cryptology - CRYPTO 2016
36th Annual International Cryptology Conference
Santa Barbara, CA, USA,
August 14-18, 2016,
Proceedings, Parts I-III
CRYPTO 2016, Vol. I
CRYPTO 2016, Vol. II
CRYPTO 2016, Vol. III
Organizational Committee
Program Chairs : | Matthew J. B. Robshaw and Jonathan Katz | |
General Chair : | Brian A. LaMacchia |
Program Committee
Alex Biryukov |
Anne Canteaut |
Dario Catalano |
Nishanth Chandran |
Melissa Chase |
Joan Daemen |
Marten van Dijk |
Itai Dinur |
Pierre-Alain Fouque |
Steven D. Galbraith |
Sanjam Garg |
S. Dov Gordon |
Jens Groth |
Sorina Ionica |
Tetsu Iwata |
Aggelos Kiayias |
Gregor Leander |
Alexander May |
Willi Meier |
Payman Mohassel |
Elke De Mulder |
Steven Myers |
Phong Q. Nguyen |
Kaisa Nyberg |
Kenneth G. Paterson |
Thomas Peyrin |
Benny Pinkas |
David Pointcheval |
Manoj Prabhakaran |
Bart Preneel |
Mariana Raykova |
Christian Rechberger |
Mike Rosulek |
Reihaneh Safavi-Naini |
Alessandra Scafuro |
Patrick Schaumont |
Dominique Schröder |
Jae Hong Seo |
Yannick Seurin |
Abhi Shelat |
Nigel P. Smart |
Ron Steinfeld |
Mehdi Tibouchi |
External Referees
- Volume I
-
Provable Security for Symmetric Cryptography}
-
Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
, 3-32,
Stefano Tessaro
,
Viet Tung Hoang
bib info -
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
, 33-63,
Thomas Peyrin
,
Yannick Seurin
bib info , video -
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
, 64-94,
Bart Mennink
bib info -
Indifferentiability of 8-Round Feistel Networks
, 95-120,
John P. Steinberger
,
Yuanxi Dai
bib info -
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
, 121-149,
Yannick Seurin
,
Benoît Cogliati
bib info , video
-
Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
, 3-32,
Stefano Tessaro
,
Viet Tung Hoang
-
Asymmetric Cryptography and Cryptanalysis I
-
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes
, 153-178,
Martin R. Albrecht
,
Léo Ducas
,
Shi Bai
bib info , video -
A Practical Cryptanalysis of the Algebraic Eraser
, 179-189,
Simon R. Blackburn
,
Boaz Tsaban
,
Adi Ben-Zvi
bib info , video -
Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts
, 190-213,
Zvika Brakerski
,
Renen Perlman
bib info -
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
, 214-243,
Jiang Zhang
,
Yu Yu
bib info , video
-
A Subfield Lattice Attack on Overstretched NTRU Assumptions - Cryptanalysis of Some FHE and Graded Encoding Schemes
, 153-178,
Martin R. Albrecht
,
Léo Ducas
,
Shi Bai
-
Cryptography in Theory and Practice
-
The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
, 247-276,
Mihir Bellare
,
Björn Tackmann
bib info -
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
, 277-307,
Thomas Shrimpton
,
Martijn Stam
,
Bogdan Warinschi
bib info -
Encryption Switching Protocols
, 308-338,
David Pointcheval
,
Thomas Peters
,
Geoffroy Couteau
bib info , video
-
The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
, 247-276,
Mihir Bellare
,
Björn Tackmann
-
Compromised Systems
-
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines
, 341-372,
Ilya Mironov
,
Yevgeniy Dodis
,
Noah Stephens-Davidowitz
bib info -
Big-Key Symmetric Encryption: Resisting Key Exfiltration
, 373-402,
Mihir Bellare
,
Phillip Rogaway
,
Daniel Kane
bib info , video -
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
, 403-432,
Kenneth G. Paterson
,
Jacob C. N. Schuldt
,
Jean Paul Degabriele
,
Joanne Woodage
bib info , video
-
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines
, 341-372,
Ilya Mironov
,
Yevgeniy Dodis
,
Noah Stephens-Davidowitz
- Symmetric Cryptanalysis
- Crypto 2016 Award Papers
- Algorithmic Number Theory
-
Symmetric Primitives
-
New Insights on AES-Like SPN Ciphers
, 605-624,
Vincent Rijmen
,
Longjiang Qu
,
Jian Guo
,
Bing Sun
,
Meicheng Liu
bib info -
Lightweight Multiplication in GF(2
n
) with Applications to MDS Matrices
, 625-653,
Gregor Leander
,
Thorsten Kranz
,
Christof Beierle
bib info -
Another View of the Division Property
, 654-682,
Anne Canteaut
,
Christina Boura
bib info , video
-
New Insights on AES-Like SPN Ciphers
, 605-624,
Vincent Rijmen
,
Longjiang Qu
,
Jian Guo
,
Bing Sun
,
Meicheng Liu
- Volume II
-
Cryptanalytic Tools
-
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
, 3-32,
Goichiro Hanaoka
,
Noboru Kunihiro
,
Shota Yamada
,
Takashi Yamakawa
bib info , video -
Optimal Security Proofs for Signatures from Identification Schemes
, 33-61,
Eike Kiltz
,
Daniel Masny
,
Jiaxin Pan
bib info -
FHE Circuit Privacy Almost for Free
, 62-89,
Hoeteck Wee
,
Florian Bourse
,
Rafaël Del Pino
,
Michele Minelli
bib info , video -
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem
, 93-122,
Alex Biryukov
,
Léo Perrin
,
Aleksei Udovenko
bib info , video -
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
, 123-153,
Gregor Leander
,
Thomas Peyrin
,
Yu Sasaki
,
Amir Moradi
,
Jérémy Jean
,
Stefan Kölbl
,
Pascal Sasdrich
,
Christof Beierle
,
Siang Meng Sim
bib info -
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
, 157-184,
Pierre-Alain Fouque
,
Patrick Derbez
bib info , video -
Breaking Symmetric Cryptosystems Using Quantum Period Finding
, 207-237,
Gaëtan Leurent
,
Maríia Naya-Plasencia
,
Marc Kaplan
,
Anthony Leverrier
bib info , video
-
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
, 3-32,
Goichiro Hanaoka
,
Noboru Kunihiro
,
Shota Yamada
,
Takashi Yamakawa
-
Hardware-Oriented Cryptography
-
Efficiently Computing Data-Independent Memory-Hard Functions
, 241-271,
Joël Alwen
,
Jeremiah Blocki
bib info , video -
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems
, 272-301,
François-Xavier Standaert
,
Stefan Dziembowski
,
Sebastian Faust
,
Gottfried Herold
,
Daniel Masny
,
Anthony Journault
bib info CRYPTO2016-papers.html: -
ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
, 302-332,
Amir Moradi
,
Tim Güneysu
,
Tobias Schneider
bib info
-
Efficiently Computing Data-Independent Memory-Hard Functions
, 241-271,
Joël Alwen
,
Jeremiah Blocki
-
Secure Computation and Protocols I
-
Network-Hiding Communication and Applications to Multi-party Protocols
, 335-365,
Ueli M. Maurer
,
Martin Hirt
,
Vassilis Zikas
,
Daniel Tschudi
bib info , video -
Network Oblivious Transfer
, 366-396,
Ranjit Kumaresan
,
Srinivasan Raghuraman
,
Adam Sealfon
bib info , video -
On the Power of Secure Two-Party Computation
, 397-429,
Carmit Hazay
,
Muthuramakrishnan Venkitasubramaniam
bib info -
Secure Protocol Transformations
, 430-458,
Amit Sahai
,
Eyal Kushilevitz
,
Yuval Ishai
,
Manoj Prabhakaran
,
Ching-Hua Yu
bib info -
On the Communication Required for Unconditionally Secure Multiplication
, 459-488,
Ivan Damgård
,
Jesper Buus Nielsen
,
Antigoni Polychroniadou
,
Michael Raskin
bib info
-
Network-Hiding Communication and Applications to Multi-party Protocols
, 335-365,
Ueli M. Maurer
,
Martin Hirt
,
Vassilis Zikas
,
Daniel Tschudi
-
Obfuscation
-
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
, 491-520,
Moni Naor
,
Amit Sahai
,
Prabhanjan Ananth
,
Eylon Yogev
,
Aayush Jain
bib info , video -
Obfuscation Combiners
, 521-550,
Marc Fischlin
,
Amir Herzberg
,
Haya Shulman
,
Hod Bin Noon
bib info , video -
On Statistically Secure Obfuscation with Approximate Correctness
, 551-578,
Zvika Brakerski
,
Christina Brzuska
,
Nils Fleischhacker
bib info -
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
, 579-604,
Omkant Pandey
,
Sanjam Garg
,
Akshayaram Srinivasan
bib info
-
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
, 491-520,
Moni Naor
,
Amit Sahai
,
Prabhanjan Ananth
,
Eylon Yogev
,
Aayush Jain
-
Asymmetric Cryptography and Cryptanalysis II
-
Cryptanalysis of GGH15 Multilinear Maps
, 607-628,
Jean-Sébastien Coron
,
Moon Sung Lee
,
Mehdi Tibouchi
,
Tancrède Lepoint
bib info , video -
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
, 629-658,
Amit Sahai
,
Eric Miles
,
Mark Zhandry
bib info , video -
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
, 659-680,
Chris Peikert
,
Navid Alamati
bib info -
Circular Security Separations for Arbitrary Length Cycles from LWE
, 681-700,
Brent Waters
,
Venkata Koppula
bib info
-
Cryptanalysis of GGH15 Multilinear Maps
, 607-628,
Jean-Sébastien Coron
,
Moon Sung Lee
,
Mehdi Tibouchi
,
Tancrède Lepoint
- Volume III
-
Quantum Techniques
-
Quantum Homomorphic Encryption for Polynomial-Sized Circuits
, 3-32,
Christian Schaffner
,
Yfke Dulek
,
Florian Speelman
bib info -
Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications
, 33-59,
Serge Fehr
,
Louis Salvail
,
Frédéric Dupuis
,
Philippe Lamontagne
bib info , video -
Semantic Security and Indistinguishability in the Quantum World
, 60-89,
Christian Schaffner
,
Tommaso Gagliardoni
,
Andreas Hülsing
bib info
-
Quantum Homomorphic Encryption for Polynomial-Sized Circuits
, 3-32,
Christian Schaffner
,
Yfke Dulek
,
Florian Speelman
- Spooky Encryption
-
Secure Computation and Protocols II
-
Adaptively Secure Garbled Circuits from One-Way Functions
, 149-178,
Rafail Ostrovsky
,
Brett Hemenway
,
Daniel Wichs
,
Alessandra Scafuro
,
Zahra Jafargholi
bib info , video -
Rate-1, Linear Time and Additively Homomorphic UC Commitments
, 179-207,
Ivan Damgård
,
Jesper Buus Nielsen
,
Ignacio Cascudo
,
Nico Döttling
,
Bernardo David
bib info -
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
, 208-239,
Jan Camenisch
,
Alfredo Rial
,
Maria Dubovitskaya
bib info -
Probabilistic Termination and Composability of Cryptographic Protocols
, 240-269,
Juan A. Garay
,
Vassilis Zikas
,
Sandro Coretti
,
Ran Cohen
bib info -
Concurrent Non-Malleable Commitments (and More) in 3 Rounds
, 270-299,
Ivan Visconti
,
Rafail Ostrovsky
,
Michele Ciampi
,
Luisa Siniscalchi
bib info , video
-
Adaptively Secure Garbled Circuits from One-Way Functions
, 149-178,
Rafail Ostrovsky
,
Brett Hemenway
,
Daniel Wichs
,
Alessandra Scafuro
,
Zahra Jafargholi
-
IBE, ABE, and Functional Encryption
-
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
, 303-332,
Jiang Zhang
,
Zhenfeng Zhang
,
Yu Chen
bib info -
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
, 333-362,
Benoît Libert
,
Damien Stehlé
,
Shweta Agrawal
bib info -
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
, 363-384,
Vinod Vaikuntanathan
,
Zvika Brakerski
bib info
-
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
, 303-332,
Jiang Zhang
,
Zhenfeng Zhang
,
Yu Chen
- Automated Tools and Synthesis
-
Zero Knowledge
-
On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings
, 449-477,
Benny Applebaum
,
Pavel Raykov
bib info -
How to Prove Knowledge of Small Secrets
, 478-498,
Ivan Damgård
,
Carsten Baum
,
Kasper Green Larsen
,
Michael Nielsen
bib info , video -
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials
, 499-530,
Payman Mohassel
,
Melissa Chase
,
Chaya Ganesh
bib info , video
-
On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings
, 449-477,
Benny Applebaum
,
Pavel Raykov
-
Theory
-
Fin-Grained Cryptography
, 533-562,
Vinod Vaikuntanathan
,
Prashant Nalini Vasudevan
,
Akshay Degwekar
bib info , video -
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
, 563-592,
Payman Mohassel
,
Sanjam Garg
,
Charalampos Papamanthou
bib info -
Bounded Indistinguishability and the Complexity of Recovering Secrets
, 593-618,
Yuval Ishai
,
Emanuele Viola
,
Andrej Bogdanov
,
Christopher Williamson
bib info , video -
Two-Message, Oblivious Evaluation of Cryptographic Functionalities
, 619-648,
Dominique Schröder
,
Nico Döttling
,
Nils Fleischhacker
,
Johannes Krupp
bib info
-
Fin-Grained Cryptography
, 533-562,
Vinod Vaikuntanathan
,
Prashant Nalini Vasudevan
,
Akshay Degwekar