default search action
27th ASIACRYPT 2021: Singapore - Part I
- Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I. Lecture Notes in Computer Science 13090, Springer 2021, ISBN 978-3-030-92061-6
Best Paper Awards
- Alice Pellet-Mary, Damien Stehlé:
On the Hardness of the NTRU Problem. 3-35 - Tim Beyne:
A Geometric Approach to Linear Cryptanalysis. 36-66 - Gabrielle De Micheli, Pierrick Gaudry, Cécile Pierrot:
Lattice Enumeration for Tower NFS: A 521-Bit Discrete Logarithm Computation. 67-96
Public-Key Cryptanalysis
- Alexander May, Julian Nowakowski, Santanu Sarkar:
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. 99-129 - Vladimir Sedlacek, Jesús-Javier Chi-Domínguez, Jan Jancar, Billy Bob Brumley:
A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks. 130-159 - Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, Antonio Sanso:
Cryptanalysis of an Oblivious PRF from Supersingular Isogenies. 160-184
Symmetric-Key Cryptanalysis
- Chen-Dong Ye, Tian Tian:
A Practical Key-Recovery Attack on 805-Round Trivium. 187-213 - Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. 214-240 - Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. 241-271 - Gaëtan Leurent, Clara Pernot, André Schrottenloher:
Clustering Effect in Simon and Simeck. 272-302 - Subhadeep Banik, Khashayar Barooti, Serge Vaudenay, Hailun Yan:
New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair. 303-331 - Aleksei Udovenko:
Convexity of Division Property Transitions: Theory, Algorithms and Compact Models. 332-361 - Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Strong and Tight Security Guarantees Against Integral Distinguishers. 362-391 - Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. 392-421 - Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher:
Quantum Linearization Attacks. 422-452 - Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia:
Generic Framework for Key-Guessing Improvements. 453-483
Quantum Security
- Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
On the Non-tightness of Measurement-Based Reductions for Key Encapsulation Mechanism in the Quantum Random Oracle Model. 487-517 - Mark Zhandry:
Redeeming Reset Indifferentiability and Applications to Post-quantum Security. 518-548 - Bhaskar Roberts, Mark Zhandry:
Franchised Quantum Money. 549-574 - Jun Yan:
Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP. 575-605 - Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa:
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication. 606-636 - Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz:
Tight Adaptive Reprogramming in the QROM. 637-667 - Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin:
QCB: Efficient Quantum-Secure Authenticated Encryption. 668-698
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.