11 – 15 May 2014
Copenhagen, Denmark

Accepted Papers

  • Higher Order Masking of Look-up Tables

    Jean-Sebastien Coron (University of Luxembourg, Luxembourg)
  • Efficient Round Optimal Blind Signatures

    Sanjam Garg (IBM Research, USA) and Divya Gupta (UCLA, USA)
  • A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing

    Himanshu Tyagi (University of California, San Diego, USA) and Shun Watanabe (University of Tokushima, Japan and University of Maryland, College Park, USA)
  • Deja Q: Using Dual Systems to Revisit q-Type Assumptions

    Melissa Chase (MSR Redmond, USA) and Sarah Meiklejohn (UC San Diego, USA)
  • Faster Compact Diffie-Hellman: Endomorphisms on the x-line

    Craig Costello (Microsoft Research, USA) and Huseyin Hisil (Yasar University, Turkey) and Benjamin Smith (Ecole Polytechnique and INRIA, France)
  • Reconsidering Generic Composition

    Chanathip Namprempre (Thammasat University, Thailand) and Phillip Rogaway (University of California, Davis, USA) and Thomas Shrimpton (Portland State University, USA)
  • Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time

    Ben Morris (University of California, Davis, USA) and Phillip Rogaway (University of California, Davis, USA)
  • Honey Encryption: Security Beyond the Brute-Force Bound

    Ari Juels (USA) and Thomas Ristenpart (University of Wisconsin - Madison, USA)
  • Generic Universal Forgery Attack on Iterative Hash-based MACs

    Thomas Peyrin and Lei Wang (Nanyang Technological University, Singapore)
  • Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions

    Kazuhiko Minematsu (NEC Corporation, Japan)
  • Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption

    Morten Dahl and Ivan Damgård (Department of Computer Science, Aarhus University, Denmark)
  • Unifying leakage models: from probing attacks to noisy leakage

    Alexandre Duc (Ecole Polytechnique Fédérale de Lausanne, Switzerland) and Stefan Dziembowski (Warsaw University, Poland and Rome La Sapienza, Italy) and Sebastian Faust (Ecole Polytechnique Fédérale de Lausanne, Switzerland)
  • Tight Security Bounds for Key-Alternating Ciphers

    Shan Chen and John Steinberger (Tsinghua University, China)
  • On the Complexity of UC Commitments

    Juan A. Garay (Yahoo Labs, USA) and Yuval Ishai (Technion, Israel) and Ranjit Kumaresan (Technion, Israel) and Hoeteck Wee (CNRS and ENS, France)
  • Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More

    Nuttapong Attrapadung (AIST, Japan)
  • Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig

    Mihir Bellare (UCSD, USA), Sarah Meiklejohn (UCSD, USA), Susan Thomson (University of Bristol, UK)
  • Protecting Obfuscation Against Algebraic Attacks

    Boaz Barak (Microsoft Research, USA) and Sanjam Garg (IBM Research, USA) and Yael Tauman Kalai (Microsoft Research, USA) and Omer Paneth (Boston University, USA) and Amit Sahai (University of California Los Angeles, USA)
  • Symmetrized summation polynomials: using small order torsion points to speed up elliptic curve index calculus

    Jean-Charles Faugère (INRIA Paris-Rocquencourt PolSys Project, Sorbonne Universités UPMC Univ Paris 06, CNRS UMR 7606, LIP6, France), Louise Huot (Sorbonne Universités UPMC Univ Paris 06, INRIA Paris-Rocquencourt PolSys Project, CNRS UMR 7606, LIP6, France), Antoine Joux (CryptoExperts, Fondation UPMC, LIP6, France), Guénaël Renault (Sorbonne Universités UPMC Univ Paris 06, INRIA Paris-Rocquencourt PolSys Project, CNRS UMR 7606, LIP6, France), Vanessa Vitse (Institut Fourier, Université de Grenoble, France).
  • Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits

    Sebastian Faust (EPFL, Switzerland) and Pratyay Mukherjee (Aarhus University, Denmark) and Daniele Venturi (Sapienza University, Italy) and Daniel Wichs (Northeastern, USA)
  • Key Derivation Without Entropy Waste

    Yevgeniy Dodis (NYU, USA) and Krzysztof Pietrzak (IST, Austria) and Daniel Wichs (Northeastern, USA)
  • Distributed Point Functions and Their Applications

    Niv Gilboa (Ben-Gurion University, Israel) and Yuval Ishai (Technion, Israel)
  • Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation

    Susan Hohenberger (Johns Hopkins University, USA) and Amit Sahai (UCLA, USA) and Brent Waters (University of Texas at Austin, USA)
  • A Full Characterization of Completeness for Two-party Randomized Function Evaluation

    Daniel Kraschewski (Technion, Israel) and Hemanta K. Maji (UCLA, USA) and Manoj Prabhakaran (UIUC, USA) and Amit Sahai (UCLA, USA)
  • GGHLite: More Efficient Multilinear Maps from Ideal Lattices

    Adeline Langlois (ENS de Lyon, France) and Damien Stehle (ENS de Lyon, France) and Ron Steinfeld (Monash University, Australia)
  • Polynomial Time Attack on Wild McEliece Over Quadratic Extensions

    Alain Couvreur (INRIA and LIX, France) and Ayoub Otmani (Normandie Univ, France) and Jean-Pierre Tillich (INRIA, France)
  • How to Certify the Leakage of a Chip?

    François Durvaux (UCL Crypto Group, Belgium) and François-Xavier Standaert (UCL Crypto Group, Belgium) and Nicolas Veyrat-Charvillon (IRISA-CAIRN, France)
  • Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack

    Junzuo Lai (Jinan Unversity, China) and Robert H. Deng (Singapore Management University, Singapore) and Shengli Liu (Shanghai Jiao Tong University, China) Jian Weng (Jinan Unversity, China) and Yunlei Zhao (Fudan University, China)
  • Why Proving HIBE Systems Secure is Difficult

    Allison Bishop Lewko (Columbia University, USA) and Brent Waters (University of Texas at Austin, USA)
  • Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures

    Benoît Libert (Technicolor, France) and Thomas Peters (Université catholique de Louvain, Belgium) and Marc Joye (Technicolor, France) and Moti Yung (Google and Columbia University, USA)
  • The Locality of Searchable Symmetric Encryption

    David Cash (Rutgers University, USA) and Stefano Tessaro (University of California, Santa Barbara, USA)
  • Salvaging Indifferentiability in a Multi-stage Setting

    Arno Mittelbach (Technische Universität Darmstadt / CASED, Germany)
  • Non-Interactive Secure Computation Based on Cut-and-Choose

    Arash Afshar (University of Calgary, Canada) and Payman Mohassel (University of Calgary, Canada) and Benny Pinkas (Bar Ilan University, Israel) and Ben Riva (Tel Aviv University, Israel)
  • A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic

    Razvan Barbulescu (Université de Lorraine, France) and Pierrick Gaudry (CNRS Nancy, France) and Antoine Joux (CryptoExperts and Fondation Université Paris 6, France) and Emmanuel Thomé (INRIA Nancy, France)
  • Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities

    Céline Blondeau and Kaisa Nyberg (Department of Information and Computer Science, Aalto University School of Science, Finland)
  • Revocable quantum timed-release encryption

    Dominique Unruh (University of Tartu, Estonia)
  • Garbled RAM Revisited

    Craig Gentry (IBM, USA) and Shai Halevi (IBM, USA) and Steve Lu (UCLA, USA) and Rafail Ostrovsky (UCLA, USA) and Mariana Raykova (SRI, USA) and Daniel Wichs (Northeastern Univ., USA)
  • Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

    Dan Boneh (Stanford, USA) and Craig Gentry (IBM, USA) and Sergey Gorbunov (MIT, USA) and Shai Halevi (IBM, USA) and Valeria Nikolaenko (Stanford, USA) and Gil Segev (Hebrew University, Isarel) and Vinod Vaikuntanathan (MIT, USA) and Dhinakaran Vinayagamurthy (University of Toronto, Canada)
  • Multi-Input Functional Encryption

    Shafi Goldwasser (MIT, USA and Weizmann, Israel) and S. Dov Gordon (Applied Communication Sciences) and Vipul Goyal (MSR India, India) and Abhishek Jain (MIT and BU, USA) and Jonathan Katz (University of Maryland, USA) and Feng-Hao Liu (University of Maryland, USA) and Amit Sahai (UCLA, USA) and Elaine Shi (University of Maryland, USA) and Hong-Sheng Zhou (Virginia Commonwealth University, USA)