default search action
41st EUROCRYPT 2022: Trondheim, Norway - Part III
- Orr Dunkelman, Stefan Dziembowski:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13277, Springer 2022, ISBN 978-3-031-07081-5
Symmetric-Key Cryptanalysis
- Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. 3-33 - Zhen Shi, Chenhui Jin, Jiyan Zhang, Ting Cui, Lin Ding, Yu Jin:
A Correlation Attack on Full SNOW-V and SNOW-Vi. 34-56 - Dor Amzaleg, Itai Dinur:
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2. 57-85 - Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma:
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha. 86-114 - Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang:
A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis. 115-144
Side Channel Attacks and Masking
- Alexander May, Julian Nowakowski, Santanu Sarkar:
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents. 147-167 - Marcel Nageler, Christoph Dobraunig, Maria Eichlseder:
Information-Combining Differential Fault Attacks on DEFAULT. 168-191 - Vipul Goyal, Yuval Ishai, Yifan Song:
Private Circuits with Quasilinear Randomness. 192-221 - Thomas Espitau, Pierre-Alain Fouque, François Gérard, Mélissa Rossi, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet, Yang Yu:
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon. 222-253 - Si Gao, Elisabeth Oswald:
A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators. 254-283 - Si Gao, Elisabeth Oswald, Dan Page:
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical. 284-311
Post-Quantum Cryptography
- Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras:
Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes. 315-344 - Benjamin Wesolowski:
Orientations and the Supersingular Endomorphism Ring Problem. 345-371 - Yilei Chen, Qipeng Liu, Mark Zhandry:
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering. 372-401 - Paul Grubbs, Varun Maram, Kenneth G. Paterson:
Anonymous, Robust Post-quantum Public Key Encryption. 402-432 - Andre Esser, Alexander May, Floyd Zweydinger:
McEliece Needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD. 433-457 - Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz:
Post-Quantum Security of the Even-Mansour Cipher. 458-487 - Fuyuki Kitagawa, Ryo Nishimaki:
Watermarking PRFs Against Quantum Adversaries. 488-518 - Nir Bitansky, Huijia Lin, Omri Shmueli:
Non-malleable Commitments Against Quantum Attacks. 519-550 - Keita Xagawa:
Anonymity of NIST PQC Round 3 KEMs. 551-581 - Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. 582-612 - Loïs Huguenin-Dumittan, Serge Vaudenay:
On IND-qCCA Security in the ROM and Its Applications - CPA Security Is Sufficient for TLS 1.3. 613-642 - Léo Ducas, Wessel P. J. van Woerden:
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography. 643-673
Information-Theoretic Security
- Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Online-Extractability in the Quantum Random-Oracle Model. 677-706 - Kai-Min Chung, Yi Lee, Han-Hsuan Lin, Xiaodi Wu:
Constant-Round Blind Classical Verification of Quantum Sampling. 707-736 - Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. 737-766 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen:
Secure Non-interactive Simulation: Feasibility and Rate. 767-796 - Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran, Mohammad Ali Rehan:
Secure Non-interactive Reduction and Spectral Analysis of Correlations. 797-827
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.