default search action
25th SAC 2018: Calgary, AB, Canada
- Carlos Cid, Michael J. Jacobson Jr.:
Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11349, Springer 2019, ISBN 978-3-030-10969-1
Design of Symmetric Key Primitives
- Sarah Miracle, Scott Yilek:
Targeted Ciphers for Format-Preserving Encryption. 3-26 - Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin:
Variants of the AES Key Schedule for Better Truncated Differential Bounds. 27-49 - Louiza Khati, Damien Vergnaud:
Analysis and Improvement of an Authentication Scheme in Incremental Cryptography. 50-70
Cryptanalysis of Symmetric Key Primitives
- Muhammad ElSheikh, Mohamed Tolba, Amr M. Youssef:
Integral Attacks on Round-Reduced Bel-T-256. 73-91 - Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang:
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. 92-114 - Zahra Eskandari, Andreas Brasen Kidmose, Stefan Kölbl, Tyge Tiessen:
Finding Integral Distinguishers with Ease. 115-138 - Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang:
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES. 139-162 - Ralph Ankele, Stefan Kölbl:
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis. 163-190
Side Channel and Fault Attacks
- Dor Fledel, Avishai Wool:
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock. 193-215 - Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:
Assessing the Feasibility of Single Trace Power Analysis of Frodo. 216-234 - Ben Lapid, Avishai Wool:
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. 235-256 - Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas:
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje. 257-277
Post-Quantum Cryptography
- Ryann Cartor, Daniel Smith-Tone:
EFLASH: A New Multivariate Encryption Scheme. 281-299 - Ward Beullens, Bart Preneel, Alan Szepieniec:
Public Key Compression for Constrained Linear Signature Schemes. 300-321 - Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez, Alfred Menezes, Francisco Rodríguez-Henríquez:
On the Cost of Computing Isogenies Between Supersingular Elliptic Curves. 322-343
Lattice-Based Cryptography
- Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
A Full RNS Variant of Approximate Homomorphic Encryption. 347-368 - Tim Fritzmann, Thomas Pöppelmann, Johanna Sepúlveda:
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange. 369-390 - Yang Wang, Mingqiang Wang:
Provably Secure NTRUEncrypt over Any Cyclotomic Field. 391-417
Classical Public Key Cryptography
- Abderrahmane Nitaj, Yanbin Pan, Joseph Tonien:
A Generalized Attack on Some Variants of the RSA Cryptosystem. 421-433 - Mojtaba Fadavi, Reza Rezaeian Farashahi, Soheila Sabbaghian:
Injective Encodings to Binary Ordinary Elliptic Curves. 434-449
Machine Learning and Cryptography
- Angela Jäschke, Frederik Armknecht:
Unsupervised Machine Learning on Encrypted Data. 453-478 - Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge. 479-498
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.