default search action
ASIACRYPT 2014: Kaoshiung, Taiwan, R.O.C.
- Palash Sarkar, Tetsu Iwata:
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8873, Springer 2014, ISBN 978-3-662-45610-1
Cryptology and Coding Theory
- Qian Guo, Thomas Johansson, Carl Löndahl:
Solving LPN Using Covering Codes. 1-20 - Jean-Charles Faugère, Ludovic Perret, Frédéric de Portzamparc:
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form. 21-41
New Proposals
- Dan Boneh, Henry Corrigan-Gibbs:
Bivariate Polynomials Modulo Composites and Their Applications. 42-62 - Alex Biryukov, Charles Bouillaguet, Dmitry Khovratovich:
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract). 63-84
Authenticated Encryption
- Philipp Jovanovic, Atul Luykx, Bart Mennink:
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes. 85-104 - Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
How to Securely Release Unverified Plaintext in Authenticated Encryption. 105-125 - Mridul Nandi:
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET. 126-140
Symmetric Key Cryptanalysis
- Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. 141-157 - Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song:
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. 158-178 - Christina Boura, María Naya-Plasencia, Valentin Suder:
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon. 179-199 - Henri Gilbert:
A Simplified Representation of AES. 200-222
Side Channel Analysis I
- Jake Longo, Daniel P. Martin, Elisabeth Oswald, Daniel Page, Martijn Stam, Michael Tunstall:
Simulatable Leakage: Analysis, Pitfalls, and New Constructions. 223-242 - Luke Mather, Elisabeth Oswald, Carolyn Whitnall:
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer. 243-261 - Diego F. Aranha, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi, Jean-Christophe Zapalowicz:
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. 262-281 - Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert:
Soft Analytical Side-Channel Attacks. 282-296
Hyperelliptic Curve Cryptography
- Christophe Doche:
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography. 297-316 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe:
Kummer Strikes Back: New DH Speed Records. 317-337 - Hüseyin Hisil, Craig Costello:
Jacobian Coordinates on Genus 2 Curves. 338-357
Factoring and Discrete Log
- Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra:
Mersenne Factorization Factory. 358-377 - Antoine Joux, Cécile Pierrot:
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields. 378-397
Invited Talk I
- Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). 398-419
Cryptanalysis
- Pierre-Alain Fouque, Antoine Joux, Chrysanthi Mavromati:
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE. 420-438 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. 439-457 - Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Generic Feistel Constructions. 458-477 - Mridul Nandi:
XLS is Not a Strong Pseudorandom Permutation. 478-490
Signatures
- Christian Hanser, Daniel Slamanig:
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials. 491-511 - Nils Fleischhacker, Tibor Jager, Dominique Schröder:
On Tight Security Proofs for Schnorr Signatures. 512-531
Zero-Knowledge
- George Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss:
Square Span Programs with Applications to Succinct NIZK Arguments. 532-550 - Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven:
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures. 551-572
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.