Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Main menu
Environmental Topics
Laws & Regulations
About EPA
Health & Environmental Research Online (HERO)
Contact Us
Print
Feedback
Export to File
Search:
This record has one attached file:
Add More Files
Attach File(s):
Display Name for File*:
Save
Citation
Tags
HERO ID
8464931
Reference Type
Journal Article
Title
39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020
Year
2020
Publisher
Springer
Volume
12106 LNCS
Language
English
Abstract
The proceedings contain 82 papers. The special focus in this conference is on Theory and Applications of Cryptographic Techniques. The topics include: Implementing Grover Oracles for Quantum Key Search on AES and LowMC; optimal Merging in Quantum k-xor and k-xor-sum Algorithms; on the Quantum Complexity of the Continuous Hidden Subgroup Problem; formalizing Data Deletion in the Context of the Right to Be Forgotten; OptORAMa: Optimal Oblivious RAM; on the Streaming Indistinguishability of a Random Permutation and a Random Function; He Gives C-Sieves on the CSIDH; Quantum Security Analysis of CSIDH; rational Isogenies from Irrational Endomorphisms; Hardness of LWE on General Entropic Distributions; on the Memory-Tightness of Hashed ElGamal; Key-Homomorphic Pseudorandom Functions from LWE with Small Modulus; integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats; TNT: How to Tweak a Block Cipher; On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy; lightweight Authenticated Encryption Mode Suitable for Threshold Implementation; PSI from PaXoS: Fast, Malicious Private Set Intersection; Two-Round Oblivious Transfer from CDH or LPN; private Aggregation from Fewer Anonymous Messages; Broadcast-Optimal Two-Round MPC; blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model; on Instantiating the Algebraic Group Model from Falsifiable Assumptions; Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era; efficient Constructions for Almost-Everywhere Secure Computation; the Price of Active Security in Cryptographic Protocols; succinct Non-interactive Secure Computation.
Editor(s)
Ishai, Y.
Home
Learn about HERO
Using HERO
Search HERO
Projects in HERO
Risk Assessment
Transparency & Integrity