default search action
26th ASIACRYPT 2020: Daejeon, South Korea - Part II
- Shiho Moriai, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12492, Springer 2020, ISBN 978-3-030-64833-6
Public Key Cryptography
- Matteo Campanelli, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo:
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. 3-35 - Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa, Keisuke Tanaka:
Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions. 36-65 - Sam Kim, David J. Wu:
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. 66-97 - Rongmao Chen, Xinyi Huang, Moti Yung:
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. 98-128 - Roman Langrehr, Jiaxin Pan:
Unbounded HIBE with Tight Security. 129-159 - Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta:
Multi-client Oblivious RAM with Poly-logarithmic Communication. 160-190 - Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. 191-220 - Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim:
Efficient Homomorphic Comparison Methods with Optimal Complexity. 221-256
Lattice-Based Cryptography
- Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler:
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings. 259-288 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:
Towards Classical Hardness of Module-LWE: The Linear Rank Case. 289-317 - Amit Deo, Benoît Libert, Khoa Nguyen, Olivier Sanders:
Lattice-Based E-Cash, Revisited. 318-348 - Olivier Bernard, Adeline Roux-Langlois:
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices. 349-380 - Daniele Micciancio, Jessica Sorrell:
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers. 381-407
Isogeny-Based Cryptography
- Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis:
Cryptographic Group Actions and Applications. 411-439 - Craig Costello:
B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted Torsion. 440-463 - Ward Beullens, Shuichi Katsumata, Federico Pintore:
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices. 464-492 - Wouter Castryck, Thomas Decru, Frederik Vercauteren:
Radical Isogenies. 493-519 - Dan Boneh, Dmitry Kogan, Katharine Woo:
Oblivious Pseudorandom Functions from Isogenies. 520-550 - Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRF. 551-580
Quantum Algorithms
- Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck:
Estimating Quantum Speedups for Lattice Sieves. 583-613 - Nico Döttling, Giulio Malavolta, Sihang Pu:
A Combinatorial Approach to Quantum Random Functions. 614-632 - Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen:
Improved Classical and Quantum Algorithms for Subset-Sum. 633-666 - Christian Badertscher, Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Dominik Leichtle, Atul Mantri, Petros Wallden:
Security Limitations of Classical-Client Delegated Quantum Computing. 667-696 - Jian Zou, Zihao Wei, Siwei Sun, Ximeng Liu, Wenling Wu:
Quantum Circuit Implementations of AES with Fewer Qubits. 697-726 - Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. 727-757
Authenticated Key Exchange
- Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi:
Fuzzy Asymmetric Password-Authenticated Key Exchange. 761-784 - Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. 785-814
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.