default search action
28th SAC 2021: Virtual Event
- Riham AlTawy, Andreas Hülsing:
Selected Areas in Cryptography - 28th International Conference, SAC 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13203, Springer 2022, ISBN 978-3-030-99276-7
Privacy and Applications
- Alessandro Melloni, Martijn Stam, Øyvind Ytrehus:
On Evaluating Anonymity of Onion Routing. 3-24 - Deepak Kumaraswamy, Shyam Murthy, Srinivas Vivek:
Revisiting Driver Anonymity in ORide. 25-46 - Keita Xagawa:
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application. 47-67 - Armando Faz-Hernández, Watson Ladd, Deepak Maram:
ZKAttest: Ring and Group Signatures for Existing ECDSA Keys. 68-83
Implementation, PUFs and MPC
- Tim Beyne, Siemen Dhooghe, Adrián Ranea, Danilo Sijacic:
A Low-Randomness Second-Order Masked AES. 87-110 - Animesh Roy, Dibyendu Roy, Subhamoy Maitra:
How Do the Arbiter PUFs Sample the Boolean Function Class? 111-130 - Robin Jadoul, Nigel P. Smart, Barry Van Leeuwen:
MPC for Q2 Access Structures over Rings and Fields. 131-151
Secret-Key Cryptography: Design and Proofs
- Tim Beyne, Yu Long Chen, Christoph Dobraunig, Bart Mennink:
Multi-user Security of the Elephant v2 Authenticated Encryption Mode. 155-178 - Yosuke Todo, Yu Sasaki:
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. 179-199 - Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo:
Parallel Verification of Serial MAC and AE Modes. 200-219
Secret-Key Cryptography: Cryptanalysis
- Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. 223-245 - Ling Sun, Wei Wang, Meiqin Wang:
Improved Attacks on GIFT-64. 246-265 - Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme:
A Simpler Model for Recovering Superpoly on Trivium. 266-285 - Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto:
Automated Truncation of Differential Trails and Trail Clustering in ARX. 286-307
Quantum Cryptanalysis
- André Schrottenloher:
Improved Quantum Algorithms for the k-XOR Problem. 311-331 - Paul Frixons, María Naya-Plasencia, André Schrottenloher:
Quantum Boomerang Attacks and Some Applications. 332-352
Post-quantum Cryptography
- Ward Beullens:
MAYO: Practical Post-quantum Signatures from Oil-and-Vinegar Maps. 355-376 - Haruhisa Kosuge, Hidema Tanaka:
Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS^{MT}}$. 377-397 - Parhat Abla, Mingsheng Wang:
Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext Size. 398-418 - Pierre Briaud, Jean-Pierre Tillich, Javier A. Verbel:
A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem. 419-438
Isogenies
- Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF. 441-460 - Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani:
Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies. 461-482 - Sabrina Kunzweiler, Yan Bo Ti, Charlotte Weitkämper:
Secret Keys in Genus-2 SIDH. 483-507
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.