%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.02", %%% date = "14 October 2017", %%% time = "10:23:58 MDT", %%% filename = "lncs2014a.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "11383 641 2484 29540", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "BibTeX; bibliography; Lecture Notes in %%% Computer Science", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a bibliography of papers published in %%% Lecture Notes in Computer Science %%% (Springer-Verlag) for 2014 for volumes in %%% the range 8349--??. %%% %%% Bibliography entries below treat the series %%% as a journal, rather than as conference %%% proceedings. Article entries normally contain %%% DOI and/or URL values that lead to online %%% access to the article text, and book-DOI and/or %%% book-URL values that lead to the conference %%% proceedings volume, or monograph, in which the %%% article appears. %%% %%% The companion bibliography lncs.bib lists %%% just the individual volumes in the series, %%% and the lncswxyz*.bib files list individual %%% papers for specified volume ranges in year %%% wxyz. The large number of papers in this %%% collection, and limitations in TeX and %%% BibTeX, and in WWW HTTP transfer speeds, %%% necessitate the splitting of the papers %%% bibliographies into several separate files %%% for each year. %%% %%% At version 1.02, the year coverage looked %%% like this: %%% %%% 2014 ( 21) %%% %%% Article: 21 %%% %%% Total entries: 21 %%% %%% This bibliography has been constructed %%% primarily from the publisher Web site. %%% %%% Numerous errors in the sources noted above %%% have been corrected. Spelling has been %%% verified with the UNIX spell and GNU ispell %%% programs using the exception dictionary %%% stored in the companion file with extension %%% .sok. %%% %%% BibTeX citation tags are uniformly chosen as %%% name:year:abbrev, where name is the family %%% name of the first author or editor, year is a %%% 4-digit number, and abbrev is a 3-letter %%% condensation of important title words. %%% Citation labels were automatically generated %%% by software developed for the BibNet Project. %%% %%% In this bibliography, entries are sorted in %%% publication order, with the help of ``bibsort %%% -bypages''. The bibsort utility is available %%% at %%% %%% http://www.math.utah.edu/pub/bibsort %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\ifx \undefined \bbb \def \bbb #1{\mathbb{#1}} \fi" # "\ifx \undefined \circled \def \circled #1{(#1)}\fi" # "\ifx \undefined \k \let \k = \c \fi" # "\ifx \undefined \mathbb \def \mathbb #1{{\bf #1}}\fi" # "\ifx \undefined \mathcal \def \mathcal #1{{\cal #1}}\fi" # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" # "\ifx \undefined \ocirc \def \ocirc #1{{\accent'27#1}}\fi" # "\ifx \undefined \reg \def \reg {\circled{R}}\fi" # "\ifx \undefined \TM \def \TM {${}^{\sc TM}$} \fi" # "\hyphenation{ An-iso-tro-pic Ay-ka-nat Giun-chi-glia Lakh-neche Mal-er-ba Mart-el-li Reut-e-nau-er Thiel-sch-er Zheng-zhou }" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-LECT-NOTES-COMP-SCI = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Publisher abbreviations: @String{pub-SV = "Springer-Verlag Inc."} @String{pub-SV:adr = "New York, NY, USA"} %%% ==================================================================== %%% Series abbreviations: @String{ser-LNAI = "Lecture Notes in Artificial Intelligence"} @String{ser-LNCS = "Lecture Notes in Computer Science"} %%% ==================================================================== %%% Bibliography entries: entries are sorted in publication order with %%% `bibsort -bypages': @Article{Brakerski:2014:VBB, author = "Zvika Brakerski and Guy N. Rothblum", title = "Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "1--25", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_1", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_1/; http://link.springer.com/content/pdf/bfm:978-3-642-54242-8/1.pdf", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Barak:2014:OEF, author = "Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai", title = "Obfuscation for Evasive Functions", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "26--51", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_2", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_2/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Boyle:2014:EO, author = "Elette Boyle and Kai-Min Chung and Rafael Pass", title = "On Extractability Obfuscation", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "52--73", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_3", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_3/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Garg:2014:TRS, author = "Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova", title = "Two-Round Secure {MPC} from Indistinguishability Obfuscation", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "74--94", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_4", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_4/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Matsuda:2014:CCS, author = "Takahiro Matsuda and Goichiro Hanaoka", title = "Chosen Ciphertext Security via Point Obfuscation", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "95--120", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_5", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_5/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Ishai:2014:PCP, author = "Yuval Ishai and Mor Weiss", title = "Probabilistically Checkable Proofs of Proximity with Zero-Knowledge", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "121--145", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_6", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_6/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Pandey:2014:ACR, author = "Omkant Pandey", title = "Achieving Constant Round Leakage-Resilient Zero-Knowledge", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "146--166", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_7", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_7/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Orlandi:2014:SCN, author = "Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti", title = "Statistical Concurrent Non-malleable Zero Knowledge", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "167--191", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_8", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_8/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Chung:2014:RRS, author = "Kai-Min Chung and Rafail Ostrovsky and Rafael Pass and Muthuramakrishnan Venkitasubramaniam {\textellipsis}", title = "$4$-Round Resettably-Sound Zero Knowledge", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "192--216", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_9", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_9/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Dachman-Soled:2014:COF, author = "Dana Dachman-Soled and Mohammad Mahmoody and Tal Malkin", title = "Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "217--239", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_10", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_10/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Mahmoody:2014:PPK, author = "Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran", title = "On the Power of Public-Key Encryption in Secure Computation", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "240--264", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_11", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_11/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Matsuda:2014:IBP, author = "Takahiro Matsuda", title = "On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "265--290", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_12", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_12/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Asharov:2014:TCC, author = "Gilad Asharov", title = "Towards Characterizing Complete Fairness in Secure Two-Party Computation", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "291--316", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_13", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_13/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Beimel:2014:CCW, author = "Amos Beimel and Yuval Ishai and Ranjit Kumaresan and Eyal Kushilevitz", title = "On the Cryptographic Complexity of the Worst Functions", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "317--342", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_14", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_14/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Kiyoshima:2014:CRB, author = "Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto", title = "Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "343--367", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_15", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_15/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Hazay:2014:OSA, author = "Carmit Hazay and Arpita Patra", title = "One-Sided Adaptively Secure Two-Party Computation", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "368--393", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_16", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_16/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Beimel:2014:MLS, author = "Amos Beimel and Aner Ben-Efraim and Carles Padr{\'o} and Ilya Tyomkin", title = "Multi-linear Secret-Sharing Schemes", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "394--418", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_17", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_17/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Hirt:2014:BA, author = "Martin Hirt and Ueli Maurer and Pavel Raykov", title = "Broadcast Amplification", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "419--439", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_18", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_18/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Cheraghchi:2014:NMC, author = "Mahdi Cheraghchi and Venkatesan Guruswami", title = "Non-malleable Coding against Bit-Wise and Split-State Tampering", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "440--464", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_19", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_19/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Faust:2014:CNM, author = "Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi", title = "Continuous Non-malleable Codes", journal = j-LECT-NOTES-COMP-SCI, volume = "8349", pages = "465--488", year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-642-54242-8_20", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Thu Aug 21 08:39:11 MDT 2014", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", URL = "http://link.springer.com/chapter/10.1007/978-3-642-54242-8_20/", acknowledgement = ack-nhfb, book-DOI = "https://doi.org/10.1007/978-3-642-54242-8", book-URL = "http://www.springerlink.com/content/978-3-642-54242-8", fjournal = "Lecture Notes in Computer Science", } @Article{Albertini:2014:MHE, author = "Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schl{\"a}ffer", title = "Malicious Hashing: {Eve}'s Variant of {SHA-1}", journal = j-LECT-NOTES-COMP-SCI, volume = "8781", pages = "1--19", day = "29", month = nov, year = "2014", CODEN = "LNCSD9", DOI = "https://doi.org/10.1007/978-3-319-13051-4_1", ISSN = "0302-9743 (print), 1611-3349 (electronic)", ISSN-L = "0302-9743", bibdate = "Mon Mar 09 11:15:46 2015", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib; http://www.math.utah.edu/pub/tex/bib/hash.bib; http://www.math.utah.edu/pub/tex/bib/lncs2014a.bib", series = ser-LNCS, URL = "http://eprint.iacr.org/2014/694; http://link.springer.com/chapter/10.1007/978-3-319-13051-4_1; https://malicioussha1.github.io/", abstract = "We present collisions for a version of SHA-1 with modified constants, where the colliding payloads are valid binary files. Examples are given of colliding executables, archives, and images. Our malicious SHA-1 instances have round constants that differ from the original ones in only 40 bits (on average). Modified versions of cryptographic standards are typically used on closed systems (e.g., in pay-TV, media and gaming platforms) and aim to differentiate cryptographic components across customers or services. Our proof-of-concept thus demonstrates the exploitability of custom SHA-1 versions for malicious purposes, such as the injection of user surveillance features. To encourage further research on such malicious hash functions, we propose definitions of malicious hash functions and of associated security notions.", acknowledgement = ack-nhfb, book-URL = "http://link.springer.com/chapter/10.1007/978-3-319-13051-4", fjournal = "Lecture Notes in Computer Science", journal-URL = "http://link.springer.com/bookseries/558", keywords = "cryptanalysis; hash functions; malicious cryptography, backdoors; secret-key cryptography; SHA-1", remark = "Cite in \cite[reference 2]{Schneier:2015:SWC}.", }