| Title/Authors | Title | Research Artifacts
									 
										[?]  A research
											artifact is any by-product of a research project that is not
											directly included in the published research paper. In Computer
											Science research this is often source code and data sets, but
											it could also be media, documentation, inputs to proof
											assistants, shell-scripts to run experiments, etc. 
									 
								 | 
								Details | 
|---|
| 
									 The First Collision for Full SHA-1 Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov  | 
								
								
									 The First Collision for Full SHA-1 Details | 
								
									 Author Comments:
									 
									
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Robust Non-interactive Multiparty Computation Against Constant-Size Collusion Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin  | 
								
								
									 Robust Non-interactive Multiparty Computation Against Constant-Size Collusion Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									
									 Benny Applebaum, Barak Arkis, Pavel Raykov, Prashant Nalini Vasudevan  | 
								
								Details | 
									 | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced no artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							
| 
									 Conditional Disclosure of Secrets via Non-linear Reconstruction Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee  | 
								
								
									 Conditional Disclosure of Secrets via Non-linear Reconstruction Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs Huijia Lin  | 
								
								
									 Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Author has
										not verified
										information
									 
									
								 | 
							
| 
									 Be Adaptive, Avoid Overcommitting Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs  | 
								
								
									 Be Adaptive, Avoid Overcommitting Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 The Bitcoin Backbone Protocol with Chains of Variable Difficulty Juan A. Garay, Aggelos Kiayias, Nikos Leonardos  | 
								
								
									 The Bitcoin Backbone Protocol with Chains of Variable Difficulty Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Structure vs. Hardness Through the Obfuscation Lens Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan  | 
								
								
									 Structure vs. Hardness Through the Obfuscation Lens Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Watermarking Cryptographic Functionalities from Standard Lattice Assumptions Sam Kim, David J. Wu  | 
								
								
									 Watermarking Cryptographic Functionalities from Standard Lattice Assumptions Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									
									 Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz  | 
								
								Details | 
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic Yashvanth Kondi, Arpita Patra  | 
								
								
									 Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 A New Approach to Round-Optimal Secure Multiparty Computation Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain  | 
								
								
									 A New Approach to Round-Optimal Secure Multiparty Computation Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Encryption Switching Protocols Revisited: Switching Modulo p Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie  | 
								
								
									 Encryption Switching Protocols Revisited: Switching Modulo p Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption Carmen Elisabetta Zaira Baltico, Dario Catalano, Dario Fiore, Romain Gay  | 
								
								
									 Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Generic Transformations of Predicate Encodings: Constructions and Applications Miguel Ambrona, Gilles Barthe, Benedikt Schmidt  | 
								
								
									 Generic Transformations of Predicate Encodings: Constructions and Applications Details | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited Ivan Damgård, Jesper Buus Nielsen, Michael Nielsen, Samuel Ranellucci  | 
								
								
									 The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Identity-Based Encryption from the Diffie-Hellman Assumption Nico Döttling, Sanjam Garg  | 
								
								
									 Identity-Based Encryption from the Diffie-Hellman Assumption Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives Sanjam Garg, Mohammad Mahmoody, Ameer Mohammed  | 
								
								
									 Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks Shweta Agrawal  | 
								
								
									 Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Author has
										not verified
										information
									 
									
								 | 
							
| 
									 Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol Aggelos Kiayias, Alexander Russell, Bernardo David, Roman Oliynykov  | 
								
								
									 Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs Huijia Lin, Stefano Tessaro  | 
								
								
									 Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Secure Arithmetic Computation with Constant Computational Overhead Benny Applebaum, Ivan Damgård, Yuval Ishai, Michael Nielsen, Lior Zichron  | 
								
								
									 Secure Arithmetic Computation with Constant Computational Overhead Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Bitcoin as a Transaction Ledger: A Composable Treatment Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas  | 
								
								
									 Bitcoin as a Transaction Ledger: A Composable Treatment Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 The Price of Low Communication in Secure Multi-party Computation Juan A. Garay, Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas  | 
								
								
									 The Price of Low Communication in Secure Multi-party Computation Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Topology-Hiding Computation on All Graphs Adi Akavia, Rio LaVigne, Tal Moran  | 
								
								
									 Topology-Hiding Computation on All Graphs Details | 
								
									 | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced no artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							
| 
									 Secure Computation Based on Leaky Correlations: High Resilience Setting Alexander R. Block, Hemanta K. Maji, Hai H. Nguyen  | 
								
								
									 Secure Computation Based on Leaky Correlations: High Resilience Setting Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Distinguisher-Dependent Simulation in Two Rounds and its Applications Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum  | 
								
								
									 Distinguisher-Dependent Simulation in Two Rounds and its Applications Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Black-Box Parallel Garbled RAM Steve Lu, Rafail Ostrovsky  | 
								
								
									 Black-Box Parallel Garbled RAM Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Four-Round Concurrent Non-Malleable Commitments from One-Way Functions Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti  | 
								
								
									 Four-Round Concurrent Non-Malleable Commitments from One-Way Functions Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Proving Resistance Against Invariant Attacks: How to Choose the Round Constants Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella  | 
								
								
									 Proving Resistance Against Invariant Attacks: How to Choose the Round Constants Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Laconic Oblivious Transfer and Its Applications Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou  | 
								
								
									 Laconic Oblivious Transfer and Its Applications Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Incremental Program Obfuscation Sanjam Garg, Omkant Pandey  | 
								
								
									 Incremental Program Obfuscation Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time Daniele Micciancio, Michael Walter  | 
								
								
									 Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization Prabhanjan Ananth, Abhishek Jain, Amit Sahai  | 
								
								
									 Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 New Security Notions and Feasibility Results for Authentication of Quantum Data Sumegha Garg, Henry Yuen, Mark Zhandry  | 
								
								
									 New Security Notions and Feasibility Results for Authentication of Quantum Data Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu  | 
								
								
									 Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Non-Malleable Codes for Space-Bounded Tampering Sebastian Faust, Kristina Hostáková, Pratyay Mukherjee, Daniele Venturi  | 
								
								
									 Non-Malleable Codes for Space-Bounded Tampering Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Quantum Non-malleability and Authentication Gorjan Alagic, Christian Majenz  | 
								
								
									 Quantum Non-malleability and Authentication Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme Itai Dinur, Niv Nadler  | 
								
								
									 Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 From Obfuscation to the Security of Fiat-Shamir for Proofs Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum  | 
								
								
									 From Obfuscation to the Security of Fiat-Shamir for Proofs Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Compact Structure-Preserving Signatures with Almost Tight Security Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan  | 
								
								
									 Compact Structure-Preserving Signatures with Almost Tight Security Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Fast Secure Two-Party ECDSA Signing Yehuda Lindell  | 
								
								
									 Fast Secure Two-Party ECDSA Signing Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Author has
										not verified
										information
									 
									
								 | 
							
| 
									 Breaking the FF3 Format-Preserving Encryption Standard over Small Domains F. Betül Durak, Serge Vaudenay  | 
								
								
									 Breaking the FF3 Format-Preserving Encryption Standard over Small Domains Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu  | 
								
								
									 Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak Ling Song, Guohong Liao, Jian Guo  | 
								
								
									 Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									
									 Andre Esser, Robert Kübler, Alexander May  | 
								
								Details | 
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security Bart Mennink  | 
								
								
									 Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Author has
										not verified
										information
									 
									
								 | 
							
| 
									 Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks Fang Song, Aaram Yun  | 
								
								
									 Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks Details | 
								
									 | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced no artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							
| 
									 Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs Jens Groth, Mary Maller  | 
								
								
									 Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Boosting Authenticated Encryption Robustness with Minimal Modifications Tomer Ashur, Orr Dunkelman, Atul Luykx  | 
								
								
									 Boosting Authenticated Encryption Robustness with Minimal Modifications Details | 
								
									 | 
								
									 Author Comments:
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced no artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							
| 
									 Hedging Public-Key Encryption in the Real World Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton  | 
								
								
									 Hedging Public-Key Encryption in the Real World Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Message Franking via Committing Authenticated Encryption Paul Grubbs, Jiahui Lu, Thomas Ristenpart  | 
								
								
									 Message Franking via Committing Authenticated Encryption Details | 
								
									 | 
								
									 Author Comments:
										The ePrint paper is the full version.
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced no artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							
| 
									 All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE Benoît Libert, Amin Sakzad, Damien Stehlé, Ron Steinfeld  | 
								
								
									 All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 All-But-Many Lossy Trapdoor Functions from Lattices and Applications Xavier Boyen, Qinyi Li  | 
								
								
									 All-But-Many Lossy Trapdoor Functions from Lattices and Applications Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Kurosawa-Desmedt Meets Tight Security Romain Gay, Dennis Hofheinz, Lisa Kohl  | 
								
								
									 Kurosawa-Desmedt Meets Tight Security Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 A Formal Treatment of Multi-key Channels Felix Günther, Sogol Mazaheri  | 
								
								
									 A Formal Treatment of Multi-key Channels Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin  | 
								
								
									 ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									
									 Yuanxi Dai, Yannick Seurin, John P. Steinberger, Aishwarya Thiruvengadam  | 
								
								Details | 
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Private Multiplication over Finite Fields Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud  | 
								
								
									 Private Multiplication over Finite Fields Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Middle-Product Learning with Errors Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld  | 
								
								
									 Middle-Product Learning with Errors Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Amortization with Fewer Equations for Proving Knowledge of Small Secrets Rafaël del Pino, Vadim Lyubashevsky  | 
								
								
									 Amortization with Fewer Equations for Proving Knowledge of Small Secrets Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart  | 
								
								
									 A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Anonymous Attestation with Subverted TPMs Jan Camenisch, Manu Drijvers, Anja Lehmann  | 
								
								
									 Anonymous Attestation with Subverted TPMs Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Identity-Based Encryption from Codes with Rank Metric Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich  | 
								
								
									 Identity-Based Encryption from Codes with Rank Metric Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Cube Attacks on Non-Blackbox Polynomials Based on Division Property Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier  | 
								
								
									 Cube Attacks on Non-Blackbox Polynomials Based on Division Property Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Information-Theoretic Indistinguishability via the Chi-Squared Method Wei Dai, Viet Tung Hoang, Stefano Tessaro  | 
								
								
									 Information-Theoretic Indistinguishability via the Chi-Squared Method Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 PRF-ODH: Relations, Instantiations, and Impossibility Results Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson  | 
								
								
									 PRF-ODH: Relations, Instantiations, and Impossibility Results Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									
									 Shota Yamada  | 
								
								Details | 
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Author has
										not verified
										information
									 
									
								 | 
							
| 
									 Key Rotation for Authenticated Encryption Adam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott  | 
								
								
									 Key Rotation for Authenticated Encryption Details | 
								
									 Author Comments:
										The original version of this work that appeared at Advances in Cryptology – Crypto 2017 had a number of flaws. While the majority of the core concepts remain unaltered, the eprint version constitutes a significant rewrite. We highlight the most significant changes with footnotes throughout the paper.
									 
									Discussion Comments:
										0
									 
									
										Sharing:
										Research produced artifacts
									 
									
										Verification:
										Authors have
										verified
										information
									 
									
								 | 
							|
| 
									 Degree Evaluation of NFSR-Based Cryptosystems Meicheng Liu  | 
								
								
									 Degree Evaluation of NFSR-Based Cryptosystems Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Author has
										not verified
										information
									 
									
								 | 
							
| 
									 Ratcheted Encryption and Key Exchange: The Security of Messaging Mihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs  | 
								
								
									 Ratcheted Encryption and Key Exchange: The Security of Messaging Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory Bart Mennink, Samuel Neves  | 
								
								
									 Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 |