default search action
26th ASIACRYPT 2020: Daejeon, South Korea - Part I
- Shiho Moriai, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12491, Springer 2020, ISBN 978-3-030-64836-7
Best Paper Awards
- Akinori Hosoyamada, Takashi Yamakawa:
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness. 3-32 - Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions. 33-63 - Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski:
SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies. 64-93
Encryption Schemes
- Olivier Blazy, Patrick Towa, Damien Vergnaud:
Public-Key Generation with Verifiable Randomness. 97-127 - Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu:
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security. 128-158 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks:
CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors. 159-190 - Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. 191-220 - Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels:
Security Reductions for White-Box Key-Storage in Mobile Payments. 221-252 - Fuyuki Kitagawa, Takahiro Matsuda:
Circular Security Is Complete for KDM Security. 253-285
Post-quantum Cryptography
- Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest:
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications. 289-320 - Dominique Unruh:
Post-Quantum Verification of Fujisaki-Okamoto. 321-352 - Qian Guo, Thomas Johansson:
A New Decryption Failure Attack Against HQC. 353-382
Cryptanalysis
- Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen:
A Bit-Vector Differential Model for the Modular Addition by a Constant. 385-414 - Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. 415-445 - Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. 446-476 - Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. 477-506 - Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier A. Verbel:
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems. 507-536 - Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Lower Bounds on the Degree of Block Ciphers. 537-566 - Chun Guo, Jian Guo, Eik List, Ling Song:
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT). 567-597
Symmetric Key Cryptography
- Avijit Dutta:
Minimizing the Two-Round Tweakable Even-Mansour Cipher. 601-629 - Bart Mennink:
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption. 630-661 - Yusai Wu, Liqing Yu, Zhenfu Cao, Xiaolei Dong:
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation. 662-693
Message Authentication Codes
- Wonseok Choi, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee:
Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs. 697-723 - Andrew Morgan, Rafael Pass, Elaine Shi:
On the Adaptive Security of MACs and PRFs. 724-753 - Benoît Cogliati, Ashwin Jha, Mridul Nandi:
How to Build Optimally Secure PRFs Using Block Ciphers. 754-784
Side-Channel Analysis
- David Knichel, Pascal Sasdrich, Amir Moradi:
SILVER - Statistical Independence and Leakage Verification. 787-816 - Tim Beyne, Siemen Dhooghe, Zhenda Zhang:
Cryptanalysis of Masked Ciphers: A Not So Random Idea. 817-850 - Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers:
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking? 851-880 - Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska:
Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation. 881-910
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.