default search action
42nd EUROCRYPT 2023: Lyon, France - Part IV
- Carmit Hazay, Martijn Stam:
Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14007, Springer 2023, ISBN 978-3-031-30633-4
Blockcipher and Hash Function Cryptanalysis
- Augustin Bariant, Gaëtan Leurent:
Truncated Boomerang Attacks and Application to AES-Based Ciphers. 3-35 - Christina Boura, Nicolas David, Rachelle Heim Boissier, María Naya-Plasencia:
Better Steady than Speedy: Full Break of SPEEDY-7-192. 36-66 - Danping Shi, Siwei Sun, Ling Song, Lei Hu, Qianqian Yang:
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY. 67-97 - Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. 98-127 - Hosein Hadipour, Sadegh Sadeghi, Maria Eichlseder:
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks. 128-157 - Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing. 158-188 - Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. 189-219 - Zhongyi Zhang, Chengan Hou, Meicheng Liu:
Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials. 220-251
Symmetric Designs
- Lorenzo Grassi, Morten Øygarden, Markus Schofnegger, Roman Walch:
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications. 255-286 - Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe:
Coefficient Grouping: Breaking Chaghri and More. 287-317 - Baptiste Lambin, Gregor Leander, Patrick Neumann:
Pitfalls and Shortcomings for Decompositions and Alignment. 318-347 - Henri Gilbert, Rachelle Heim Boissier, Louiza Khati, Yann Rotella:
Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics. 348-378 - Sanketh Menda, Julia Len, Paul Grubbs, Thomas Ristenpart:
Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More. 379-407 - Chun Guo, Lei Wang, Dongdai Lin:
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive Calls. 408-439 - Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski:
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions. 440-469 - Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha:
Proof of Mirror Theory for a Wide Range of $\xi _{\max }$. 470-501 - Xinyu Mao, Noam Mazor, Jiapeng Zhang:
Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions. 502-531 - Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation. 532-561
Side-Channels and Masking
- Shiduo Zhang, Xiuhan Lin, Yang Yu, Weijia Wang:
Improved Power Analysis Attacks on Falcon. 565-595 - Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert:
Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime Ciphers. 596-627 - Jan-Pieter D'Anvers:
One-Hot Conversion: Towards Faster Table-Based A2B Conversion. 628-657
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.