


Остановите войну!
for scientists:


default search action
ASIACRYPT 2018: Brisbane, QLD, Australia
- Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11272, Springer 2018, ISBN 978-3-030-03325-5
Asiacrypt 2018 Best Paper
- Tim Beyne
:
Block Cipher Invariants as Eigenvectors of Correlation Matrices. 3-31
Post-Quantum Cryptanalysis
- Ward Beullens, Simon R. Blackburn:
Practical Attacks Against the Walnut Digital Signature Scheme. 35-61 - Thomas Debris-Alazard, Jean-Pierre Tillich:
Two Attacks on Rank Metric Code-Based Schemes: RankSign and an IBE Scheme. 62-92 - Élise Barelli, Alain Couvreur:
An Efficient Structural Attack on NIST Submission DAGS. 93-118
Encrypted Storage
- Nicolas Desmoulins, Pierre-Alain Fouque
, Cristina Onete, Olivier Sanders:
Pattern Matching on Encrypted Streams. 121-148 - Seny Kamara, Tarik Moataz:
SQL on Structurally-Encrypted Databases. 149-180 - David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry, Cong Zhang:
Parameter-Hiding Order Revealing Encryption. 181-210
Symmetric-Key Constructions
- Chun Guo, Lei Wang:
Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security. 213-243 - Yu Long Chen, Bart Mennink, Mridul Nandi
:
Short Variable Length Domain Extenders with Beyond Birthday Bound Security. 244-274 - Akinori Hosoyamada
, Kan Yasuda:
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions. 275-304 - ByeongHak Lee, Jooyoung Lee:
Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model. 305-335 - Ritam Bhaumik, Eik List, Mridul Nandi
:
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls. 336-366
Lattice-Based Cryptography
- Shi Bai, Damien Stehlé, Weiqiang Wen:
Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ. 369-404 - Yoshinori Aono, Phong Q. Nguyen, Yixin Shen
:
Quantum Lattice Enumeration and Tweaking Discrete Pruning. 405-434 - Long Chen, Zhenfeng Zhang, Zhenfei Zhang:
On the Hardness of the Computational Ring-LWR Problem and Its Applications. 435-464 - Léo Ducas, Alice Pellet-Mary:
On the Statistical Leak of the GGH13 Multilinear Map and Some Variants. 465-493 - Jonathan Bootle
, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque
, Mehdi Tibouchi:
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS. 494-524
Quantum Symmetric Cryptanalysis
- Lorenzo Grassi
, María Naya-Plasencia, André Schrottenloher:
Quantum Algorithms for the k -xor Problem. 527-559 - Xavier Bonnetain, María Naya-Plasencia:
Hidden Shift Quantum Cryptanalysis and Implications. 560-592
Zero-Knowledge
- Jonathan Bootle
, Andrea Cerulli, Jens Groth
, Sune K. Jakobsen, Mary Maller:
Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution. 595-626 - Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy:
Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications. 627-656

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.