Robust Encryption Michel AbdallaMihir BellareGregory Neven OriginalPaper 12 June 2017 Pages: 307 - 350
Multivariate High-Order Attacks of Shuffled Tables Recomputation Nicolas BruneauSylvain GuilleyYannick Teglia OriginalPaper 19 June 2017 Pages: 351 - 393
Practical Cryptanalysis of Bluetooth Encryption with Condition Masking Bin ZhangChao XuDengguo Feng OriginalPaper 10 July 2017 Pages: 394 - 433
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Zvika BrakerskiIlan KomargodskiGil Segev OriginalPaper 26 June 2017 Pages: 434 - 520
Deterministic Encryption with the Thorp Shuffle Ben MorrisPhillip RogawayTill Stegers OriginalPaper 25 August 2017 Pages: 521 - 536
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs Carmit Hazay OriginalPaper 21 August 2017 Pages: 537 - 586
Characterization of Secure Multiparty Computation Without Broadcast Ran CohenIftach HaitnerLior Rotem OriginalPaper 22 September 2017 Pages: 587 - 609
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance Shi BaiTancrède LepointRon Steinfeld OriginalPaper 28 August 2017 Pages: 610 - 640