| EUROCRYPT 2017 
            List of Accepted Papers
	Best Paper Award : Scrypt is Maximally Memory-HardJoel Alwen (IST Austria), Binyi Chen (UCSB), Krzysztof Pietrzak (IST Austria), Leonid Reyzin (Boston University), Stefano Tessaro (UCSB)
Faster Secure Two-Party Computation in the Single-Execution SettingXiao Wang (University of Maryland), Alex J. Malozemoff (Galois), Jonathan Katz (University of Maryland)
Quantum Authentication and Encryption with Key RecyclingSerge Fehr (CWI Amsterdam), Louis Salvail (University of Montreal)
Depth-Robust Graphs and Their Cumulative Memory ComplexityJoël Alwen (IST Austria), Jeremiah Blocki (Purdue University), Krzysztof Pietrzak (IST Austria)
Computational integrity with a public random string from quasi-linear PCPsEli Ben-Sasson (Technion), Iddo Ben-Tov (Cornell), Alessandro Chiesa (UC Berkeley), Ariel Gabizon (Technion), Daniel Genkin (U Penn), Matan Hamilis (Technion), Evgenya Pergament (Technion), Michael Riabzev (Technion), Mark Silberstein (Technion), Eran Tromer (Tel-Aviv University), Madars Virza (MIT)
Short Stickelberger Class Relations and application to Ideal-SVPRonald Cramer (CWI, Amsterdam, and Leiden University, The Netherlands), Léo Ducas (CWI, Amsterdam, The Netherlands), Benjamin Wesolowski (EPFL, Lausanne, Switzerland)
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest MajorityJun Furukawa (NEC Israel Research Center), Yehuda Lindell (Bar-Ilan University), Ariel Nof (Bar-Ilan University), Or Weinstein (Bar-Ilan University)
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackRonald Cramer (CWI, Amsterdam, and Leiden University, The Netherlands), Ivan Damgård (Aarhus University, Denmark), Chaoping Xing (NTU, Singapore), Chen Yuan (NTU, Singapore)
Concurrently composable security with shielded super-polynomial simulatorsBrandon Broadnax (Karlsruhe Institute of Technology, Germany), Nico Döttling (University of California Berkeley), Gunnar Hartung (Karlsruhe Institute of Technology, Germany), Jörn Müller-Quade (Karlsruhe Institute of Technology, Germany), Matthias Nagel (Karlsruhe Institute of Technology, Germany)
Improved Private Set Intersection against Malicious AdversariesPeter Rindal (Oregon State University), Mike Rosulek (Oregon State University)
Non-Interactive Secure 2PC in the Offline/Online and Batch SettingsPayman Mohassel (Visa Research), Mike Rosulek (Oregon State University)
Computation of a 768-bit prime field discrete logarithmThorsten Kleinjung (EPFL, Univ Leipzig), Claus Diem (Univ Leipzig), Arjen K. Lenstra (EPFL), Christine Priplata (Univ Leipzig), Colin Stahlke (Univ Leipzig)
A kilobit hidden SNFS discrete logarithm computationJoshua Fried (University of Pennsylvania), Pierrick Gaudry (CNRS, INRIA, Université de Lorraine), Nadia Heninger (University of Pennsylvania), Emmanuel Thomé (INRIA, CNRS, Université de Lorraine)
Patchable Indistinguishability Obfuscation: iO for Evolving SoftwarePrabhanjan Ananth (UCLA), Abhishek Jain (Johns Hopkins University), Amit Sahai (UCLA)
Random Sampling Revisited: Lattice Enumeration with Discrete PruningYoshinori Aono (NICT, Japan), Phong Q. Nguyen (Inria, France and CNRS/JFLI/Univ. of Tokyo, Japan)
Adaptive partitioningDennis Hofheinz (Karlsruhe Institute of Technology)
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelGilles Barthe (IMDEA, Spain), François Dupressoir (Univ. Surrey, UK), Sebastian Faust (Univ. Bochum, Germany), Benjamin Grégoire (INRIA, Nice, France), François-Xavier Standaert (UCL, Belgium), Pierre-Yves Strub (Ecole Polytechnique, France)
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEALMartin R. Albrecht (Royal Holloway, University of London)
How Fast Can Higher-Order Masking Be in Software?Dahmun Goudarzi (CryptoExperts, ENS), Matthieu Rivain (CryptoExperts)
Conditional Cube Attack on Reduced-Round Keccak Sponge FunctionSenyang Huang (Institute for Advanced Study, Tsinghua University, Beijing, China), Xiaoyun Wang (Institute for Advanced Study, Tsinghua University, Beijing, China, Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China; School of Mathematics, Shandong University, Jinan, China), Guangwu Xu (Dept. of EE & CS, University of Wisconsin-Milwaukee), Meiqin Wang (Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China; School of Mathematics, Shandong University, Jinan, China), Jingyuan Zhao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Removing the Strong RSA Assumption from Arguments over the IntegersGeoffroy Couteau (ENS, CNRS, INRIA), Thomas Peters (Université catholique de Louvain), David Pointcheval (ENS, CNRS, INRIA)
Relativistic (or 2-prover 1-round) zero-knowledge protocol for NP secure against quantum adversariesChailloux André (Inria Paris), Leverrier Anthony (Inria Paris)
The Multi-User Security of Double EncryptionViet Tung Hoang (Florida State University), Stefano Tessaro (UC Santa Barbara)
Decentralized Anonymous MicropaymentsAlessandro Chiesa (UC Berkeley), Matthew Green (Johns Hopkins University), Jingcheng Liu (UC Berkeley), Peihan Miao (UC Berkeley), Ian Miers (Johns Hopkins University), Pratyush Mishra (UC Berkeley)
0-RTT Key Exchange with Full Forward SecrecyFelix Günther (TU Darmstadt), Britta Hale (NTNU, Norwegian University of Science and Technology), Tibor Jager (Ruhr-University Bochum), Sebastian Lauer (Ruhr-University Bochum)
Breaking the Sub-Exponential Barrier in ObfustopiaSanjam Garg (University of California, Berkeley), Omkant Pandey (Stony Brook University), Akshayaram Srinivasan (University of California, Berkeley), Mark Zhandry (Princeton University)
Analysis of the Blockchain Protocol in Asynchronous NetworksRafael Pass (Cornell), Lior Seeman (Cornell, Harvard), Abhi Shelat (Northeastern)
Public-Seed Pseudorandom PermutationsPratik Soni (UCSB), Stefano Tessaro (UCSB)
Quantum-Secure Symmetric-Key Cryptography Based on Hidden ShiftsGorjan Alagic (University of Copenhagen), Alexander Russell (University of Connecticut)
Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security NotionsMohammad Hajiabadi (University College London), Bruce M. Kapron (University of Victoria)
Twisted μ4-normal form for elliptic curvesDavid Kohel (Aix Marseille Univ, CNRS, Centrale Marseille, I2M, Marseille, France)
Modifying an Enciphering Scheme after DeploymentPaul Grubbs (Cornell Tech), Thomas Ristenpart (Cornell Tech), Yuval Yarom (University of Adelaide and Data61, CSIRO)
A New Structural-Differential Property of 5-Round AESLorenzo Grassi (IAIK, Graz University of Technology, Austria), Christian Rechberger (IAIK, Graz University of Technology, Austria), Sondre Rønjom (Nasjonal sikkerhetsmyndighet, Norway)
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear ComplexitySeny Kamara (Brown University), Tarik Moataz (Brown University)
Lattice-Based SNARGs and Their Application to More Efficient ObfuscationDan Boneh (Stanford University), Yuval Ishai (Technion and UCLA), Amit Sahai (UCLA), David J. Wu (Stanford University)
Functional Encryption: Deterministic to Randomized Functions from Simple AssumptionsShashank Agrawal (Visa Research), David Wu (Stanford University)
A Note on Perfect Correctness by DerandomizationNir Bitansky (MIT), Vinod Vaikuntanathan (MIT)
Efficient compression of SIDH public keysCraig Costello (Microsoft Research), David Jao (University of Waterloo), Patrick Longa (Microsoft Research), Michael Naehrig (Microsoft Research), Joost Renes (Radboud University Nijmegen), David Urbanik (University of Waterloo)
Formal Abstractions for Attested Execution Secure ProcessorsRafael Pass (Cornell Tech), Elaine Shi (Cornell), Florian Tramèr (Stanford)
Cryptanalyses of Candidate Branching Program ObfuscatorsYilei Chen (Boston University), Craig Gentry (IBM Research), Shai Halevi (IBM Research)
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionRishab Goyal (University of Texas at Austin), Venkata Koppula (University of Texas at Austin), Brent Waters (University of Texas at Austin)
Cryptography with UpdatesPrabhanjan Ananth (UCLA), Aloni Cohen (MIT), Abhishek Jain (Johns Hopkins University)
Robust transforming combiners from indistinguishability obfuscation to functional encryptionPrabhanjan Ananth (UCLA), Aayush Jain (UCLA), Amit Sahai (UCLA)
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFsSaikrishna Badrinarayanan (UCLA, USA), Dakshita Khurana (UCLA, USA), Rafail Ostrovsky (UCLA, USA), Ivan Visconti (University of Salerno, Italy)
Private Puncturable PRFs From Standard Lattice AssumptionsDan Boneh (Stanford University), Sam Kim (Stanford University), Hart Montgomery (Fujitsu Laboratories of America)
Ad Hoc PSM Protocols: Secure Computation without CoordinationAmos Beimel (Ben-Gurion University), Yuval Ishai (Technion, UCLA), Eyal Kushilevitz (Technion)
Hashing Garbled Circuits for FreeXiong Fan (Cornell University), Chaya Ganesh (NYU), Vladimir Kolesnikov (Bell Labs)
On the Exact Round Complexity of Self-Composable Two-Party ComputationSanjam Garg (University of California, Berkeley), Susumu Kiyoshima (NTT Secure Platform Laboratories), Omkant Pandey (Stony Brook University)
Simplifying Design and Analysis of Complex Predicate Encryption SchemesShashank Agrawal (Visa Research), Melissa Chase (Microsoft Research)
Revisiting Lattice Attacks on overstretched NTRU parametersPaul Kirchner (ENS and IRISA), Pierre-Alain Fouque (Universite de Rennes and IRISA)
Multi-Input Inner-Product Functional Encryption from PairingsMichel Abdalla (ENS), Romain Gay (ENS), Mariana Raykova (Yale University), Hoeteck Wee (ENS)
Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, RevisitedYevgeniy Dodis (New York University), Siyao Guo (Simons Institute for the Theory of Computing), Jonathan Katz (University of Maryland)
Constraint-hiding constrained PRFs for NC1 from LWERan Canetti (Boston University and Tel Aviv University), Yilei Chen (Boston University)
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps Prabhanjan Ananth (UCLA), Amit Sahai (UCLA)
From Minicrypt to Obfustopia via Private-Key Functional EncryptionIlan Komargodski (Weizmann Institute of Science), Gil Segev (Hebrew University of Jerusalem)
New Impossible Differential Search Tool from Design and Cryptanalysis AspectsYu Sasaki (NTT Secure Platform Laboratories), Yosuke Todo (NTT Secure Platform Laboratories)
On Removing Graded Encodings from Functional EncryptionNir Bitansky (MIT), Huijia Lin (UCSB), Omer Paneth (MIT)
Topology-Hiding Computation Beyond Logarithmic DiameterAdi Akavia (MTA Tel-Aviv Jaffa), Tal Moran (IDC Herzliya)
Quantum authentication with key recyclingChristopher Portmann (ETH Zurich)
Sublinear Zero-Knowledge Arguments for RAM ProgramsPayman Mohassel (Visa Research), Mike Rosulek (Oregon State University), Alessandra Scafuro (NCSU)
New Collision Attacks on Round-Reduced KeccakKexin Qiao (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Nanyang Technological University, Singapore), Ling Song (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China, Nanyang Technological University, Singapore), Meicheng Liu (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China), Jian Guo (Nanyang Technological University, Singapore)
One-Shot Verifiable Encryption from LatticesVadim Lyubashevsky (IBM Research - Zurich), Gregory Neven (IBM Research - Zurich)
Small CRT-Exponent RSA RevisitedAtsushi Takayasu (The University of Tokyo, National Institute of Advanced Industrial Science and Technology), Yao Lu (The University of Tokyo), Liquiang Peng (Institute of Information Engineering, Chinese Academy of Sciences)
Magic Adversaries Versus Individual Reduction: Science Wins Either WayYi Deng (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, China)
Short generators without quantum computers: the case of multiquadraticsJens Bauch (Simon Fraser University), Daniel J. Bernstein (Technische Universiteit Eindhoven, University of Illinois at Chicago), Henry de Valence (Technische Universiteit Eindhoven), Tanja Lange (Technische Universiteit Eindhoven), Christine van Vredendaal (Technische Universiteit Eindhoven)
Group-Based Secure Computation: Optimizing Rounds, Communication, and ComputationElette Boyle (IDC Herzliya), Niv Gilboa (Ben Gurion University), Yuval Ishai (UCLA and Technion)
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE schemeJean-François Biasse (University of South Florida), Thomas Espitau (Sorbonne Universités, UPMC Paris 6, UMR 7606, LIP6, Paris, France), Pierre-Alain Fouque (Institut Universitaire de France, Paris, France), Alexandre Gélin (Sorbonne Universités, UPMC Paris 6, UMR 7606, LIP6, Paris, France), Paul Kirchner (Ecole Normale Supérieure)
 |