


default search action
26th ASIACRYPT 2020: Daejeon, South Korea - Part I
- Shiho Moriai, Huaxiong Wang

:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12491, Springer 2020, ISBN 978-3-030-64836-7
Best Paper Awards
- Akinori Hosoyamada, Takashi Yamakawa:

Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness. 3-32 - Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:

New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions. 33-63 - Luca De Feo

, David Kohel, Antonin Leroux, Christophe Petit
, Benjamin Wesolowski:
SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies. 64-93
Encryption Schemes
- Olivier Blazy, Patrick Towa, Damien Vergnaud:

Public-Key Generation with Verifiable Randomness. 97-127 - Benoît Libert, Khoa Nguyen

, Alain Passelègue, Radu Titiu:
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security. 128-158 - Valerio Cini

, Sebastian Ramacher
, Daniel Slamanig
, Christoph Striecks
:
CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors. 159-190 - Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo

:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. 191-220 - Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels:

Security Reductions for White-Box Key-Storage in Mobile Payments. 221-252 - Fuyuki Kitagawa, Takahiro Matsuda:

Circular Security Is Complete for KDM Security. 253-285
Post-quantum Cryptography
- Shuichi Katsumata, Kris Kwiatkowski

, Federico Pintore
, Thomas Prest
:
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications. 289-320 - Dominique Unruh:

Post-Quantum Verification of Fujisaki-Okamoto. 321-352 - Qian Guo

, Thomas Johansson
:
A New Decryption Failure Attack Against HQC. 353-382
Cryptanalysis
- Seyyed Arash Azimi, Adrián Ranea

, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
:
A Bit-Vector Differential Model for the Modular Addition by a Constant. 385-414 - Xichao Hu, Yongqiang Li

, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. 415-445 - Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang

:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. 446-476 - Maria Eichlseder

, Lorenzo Grassi
, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger
, Markus Schofnegger, Qingju Wang
:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. 477-506 - Magali Bardet, Maxime Bros

, Daniel Cabarcas, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier A. Verbel:
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems. 507-536 - Phil Hebborn, Baptiste Lambin, Gregor Leander

, Yosuke Todo
:
Lower Bounds on the Degree of Block Ciphers. 537-566 - Chun Guo, Jian Guo, Eik List, Ling Song:

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT). 567-597
Symmetric Key Cryptography
- Avijit Dutta:

Minimizing the Two-Round Tweakable Even-Mansour Cipher. 601-629 - Bart Mennink:

Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption. 630-661 - Yusai Wu

, Liqing Yu, Zhenfu Cao
, Xiaolei Dong:
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation. 662-693
Message Authentication Codes
- Wonseok Choi, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee:

Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs. 697-723 - Andrew Morgan, Rafael Pass

, Elaine Shi:
On the Adaptive Security of MACs and PRFs. 724-753 - Benoît Cogliati, Ashwin Jha, Mridul Nandi:

How to Build Optimally Secure PRFs Using Block Ciphers. 754-784
Side-Channel Analysis
- David Knichel

, Pascal Sasdrich
, Amir Moradi
:
SILVER - Statistical Independence and Leakage Verification. 787-816 - Tim Beyne

, Siemen Dhooghe
, Zhenda Zhang
:
Cryptanalysis of Masked Ciphers: A Not So Random Idea. 817-850 - Weijia Wang

, Chun Guo, François-Xavier Standaert
, Yu Yu, Gaëtan Cassiers:
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking? 851-880 - Norman Lahr

, Ruben Niederhagen, Richard Petri, Simona Samardjiska:
Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation. 881-910

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














