default search action
43rd CRYPTO 2023, Santa Barbara, CA, USA - Part III
- Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14083, Springer 2023, ISBN 978-3-031-38547-6
Cryptanalysis
- Keegan Ryan, Nadia Heninger:
Fast Practical Lattice Reduction Through Iterated Compression. 3-36 - Léo Ducas, Ludo N. Pulles:
Does the Dual-Sieve Attack on Learning with Errors Even Work? 37-69 - Tianrui Wang, Anyu Wang, Xiaoyun Wang:
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. 70-100 - Ward Beullens:
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem. 101-126 - Nicolas Aragon, Victor Dyseryn, Philippe Gaborit:
Analysis of the Security of the PSSI Problem and Cryptanalysis of the Durandal Signature Scheme. 127-149 - Léo Ducas, Thomas Espitau, Eamonn W. Postlethwaite:
Finding Short Integer Solutions When the Modulus Is Small. 150-176 - Orr Dunkelman, Nathan Keller, Ariel Weizman:
Practical-Time Related-Key Attack on GOST with Secret S-Boxes. 177-208 - Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. 209-239 - Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia:
Differential Meet-In-The-Middle Cryptanalysis. 240-272 - Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Moving a Step of ChaCha in Syncopated Rhythm. 273-304 - Lorenzo Grassi, Irati Manterola Ayala, Martha Norberg Hovd, Morten Øygarden, Håvard Raddum, Qingju Wang:
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato. 305-339
Side Channels
- Loïc Masure, François-Xavier Standaert:
Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model. 343-376 - Sebastian Berndt, Thomas Eisenbarth, Sebastian Faust, Marc Gourjon, Maximilian Orlt, Okan Seker:
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler. 377-409 - Clément Hoffmann, Pierrick Méaux, Charles Momin, Yann Rotella, François-Xavier Standaert, Balazs Udvarhelyi:
Learning with Physical Rounding for Linear and Quadratic Leakage Functions. 410-439 - Sonia Belaïd, Gaëtan Cassiers, Matthieu Rivain, Abdul Rahman Taleb:
Unifying Freedom and Separation for Tight Probing-Secure Composition. 440-472
Symmetric Constructions
- Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim:
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation. 475-506 - Clémence Bouvier, Pierre Briaud, Pyrros Chaidos, Léo Perrin, Robin Salen, Vesselin Velichkov, Danny Willems:
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode. 507-539 - Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe:
Coefficient Grouping for Complex Affine Layers. 540-572 - Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. 573-606 - Jonathan Fuchs, Yann Rotella, Joan Daemen:
On the Security of Keyed Hashing Based on Public Permutations. 607-627 - Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen:
Revisiting the Indifferentiability of the Sum of Permutations. 628-660 - Matilda Backendal, Mihir Bellare, Felix Günther, Matteo Scarlata:
When Messages Are Keys: Is HMAC a Dual-PRF? 661-693 - Tianren Liu, Angelos Pelecanos, Stefano Tessaro, Vinod Vaikuntanathan:
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers. 694-726
Isogenies
- Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin:
CSI -Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist. 729-761 - Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren:
Weak Instances of Class Group Action Based Cryptography via Self-pairings. 762-792
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.