What a lovely hat
Is it made out of
tin foil
?
International Association for Cryptologic Research
International Association
for Cryptologic Research
IACR
Events
All IACR events
Asiacrypt
Crypto
Eurocrypt
CHES
FSE
PKC
TCC
RWC
Cryptology Schools
In cooperation with IACR
Publications
All IACR Publications
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on CHES
Communications in Cryptology
Cryptology ePrint Archive
Artifact Archive
Access IACR Publications
Museum of Historic Papers
Publication Statistics
News
All News
Awards
Elections
Petitions & Statements
Services
Jobs
CryptoDB
Calendar of Events
Videos
Members
How to Join
Update Membership Information
Access IACR Publications
Subscribe to News Updates
About
About IACR
Board of Directors
Committees
Documents
Privacy Policy
Suggestions from
local search
as you type. Hit enter to search with Google.
Search
Suggestions from
local search
as you type. Hit enter to search with Google.
CryptoDB
General
About CryptoDB
Report errors
Publications
Awards
Invited talks/papers
By year
By venue
With video
Acceptance rates
BibTeX
People
Most publications
Coauthor statistics
All Program committees
Most Program committees
Papers from PKC 2013
Year
Venue
Title
2013
PKC
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger
Brent Waters
2013
PKC
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
Keita Emura
Goichiro Hanaoka
Takahiro Matsuda
Go Ohtake
Shota Yamada
2013
PKC
Combined Attack on CRT-RSA - Why Public Verification Must Not Be Public ?
Guillaume Barbu
Alberto Battistello
Guillaume Dabosville
Christophe Giraud
Guénaël Renault
Soline Renner
Rina Zeitoun
2013
PKC
Cryptography Using CAPTCHA Puzzles
Abishek Kumarasubramanian
Rafail Ostrovsky
Omkant Pandey
Akshay Wadia
2013
PKC
Decentralized Attribute-Based Signatures
Tatsuaki Okamoto
Katsuyuki Takashima
2013
PKC
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures
Nuttapong Attrapadung
Benoît Libert
Thomas Peters
2013
PKC
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Fabrice Benhamouda
Olivier Blazy
Céline Chevalier
David Pointcheval
Damien Vergnaud
2013
PKC
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
Seung Geol Choi
Jonathan Katz
Hoeteck Wee
Hong-Sheng Zhou
2013
PKC
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
Jonathan Katz
Aishwarya Thiruvengadam
Hong Sheng Zhou
2013
PKC
Functional Encryption: Origins and Recent Developments
★
Invited paper
Brent Waters
2013
PKC
Improved (Hierarchical) Inner-Product Encryption from Lattices
Keita Xagawa
2013
PKC
Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications
San Ling
Khoa Nguyen
Damien Stehlé
Huaxiong Wang
2013
PKC
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited
Takahiro Matsuda
Goichiro Hanaoka
2013
PKC
New Constructions and Applications of Trapdoor DDH Groups
Yannick Seurin
2013
PKC
Non-Interactive Key Exchange
Eduarda S.V. Freire
Dennis Hofheinz
Eike Kiltz
Kenneth G. Paterson
2013
PKC
On the Connection between Leakage Tolerance and Adaptive Security
Jesper Buus Nielsen
Daniele Venturi
Angela Zottarel
2013
PKC
On the semantic security of functional encryption schemes
Manuel Barbosa
Pooya Farshim
2013
PKC
Packed Ciphertexts in LWE-based Homomorphic Encryption
Zvika Brakerski
Craig Gentry
Shai Halevi
2013
PKC
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings
2013
PKC
Rate-Limited Secure Function Evaluation: Definitions and Constructions
Özgür Dagdelen
Payman Mohassel
Daniele Venturi
2013
PKC
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru Kunihiro
Naoyuki Shinohara
Tetsuya Izu
2013
PKC
Revocable Identity-Based Encryption Revisited: Security Model and Construction
Jae Hong Seo
Keita Emura
2013
PKC
Robust Encryption, Revisited
Pooya Farshim
Benoît Libert
Kenneth G. Paterson
Elizabeth A. Quaglia
2013
PKC
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
Zhengan Huang
Shengli Liu
Baodong Qin
2013
PKC
Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies
Kwangsu Lee
Dong Hoon Lee
Moti Yung
2013
PKC
Tagged One-Time Signatures: Tight Security and Optimal Tag Size
Masayuki Abe
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2013
PKC
Techniques for Efficient Secure Computation Based on Yao's Protocol
★
Invited paper
Yehuda Lindell
2013
PKC
Tighter Reductions for Forward-Secure Signature Schemes
Michel Abdalla
Fabrice Benhamouda
David Pointcheval
2013
PKC
Vector Commitments and their Applications
Dario Catalano
Dario Fiore
2013
PKC
Verifiable Elections That Scale for Free
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Sarah Meiklejohn
2013
PKC
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Ryo Nishimaki
Keita Xagawa