


default search action
28th ASIACRYPT 2022: Taipei, Taiwan - Part III
- Shweta Agrawal, Dongdai Lin:

Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13793, Springer 2022, ISBN 978-3-031-22968-8
Practical Cryptography
- Sarah Miracle, Scott Yilek:

New Algorithms and Analyses for Sum-Preserving Encryption. 3-31 - Orel Cosseron

, Clément Hoffmann
, Pierrick Méaux
, François-Xavier Standaert
:
Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher. 32-67 - Patrick Derbez, Marie Euler

, Pierre-Alain Fouque
, Phuong Hoa Nguyen
:
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool. 68-88 - Jeroen Pijnenburg, Bertram Poettering

:
On Secure Ratcheting with Immediate Decryption. 89-118 - Benjamin Dowling

, Eduard Hauck
, Doreen Riepel
, Paul Rösler
:
Strongly Anonymous Ratcheted Key Exchange. 119-150 - Matteo Campanelli

, Bernardo David, Hamidreza Khoshakhlagh
, Anders Konring, Jesper Buus Nielsen:
Encryption to the Future - A Paradigm for Sending Secret Messages to Future (Anonymous) Committees. 151-180 - Julia Len, Paul Grubbs, Thomas Ristenpart

:
Authenticated Encryption with Key Identification. 181-209 - You Lyu

, Shengli Liu
, Shuai Han
, Dawu Gu
:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. 210-240 - Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei:

On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC. 241-270
Advanced Encryption
- Henri Devillez, Olivier Pereira, Thomas Peters:

Traceable Receipt-Free Encryption. 273-303 - Charanjit S. Jutla, Sikhar Patranabis:

Efficient Searchable Symmetric Encryption for Join Queries. 304-333 - Yi Deng, Xinxuan Zhang:

Knowledge Encryption and Its Applications to Simulatable Protocols with Low Round-Complexity. 334-362 - Jiaxin Pan

, Runzhi Zeng
:
Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes. 363-393 - Jie Chen, Yu Li

, Jinming Wen, Jian Weng
:
Identity-Based Matchmaking Encryption from Standard Assumptions. 394-422 - Zhengan Huang

, Junzuo Lai
, Shuai Han
, Lin Lyu
, Jian Weng
:
Anonymous Public Key Encryption Under Corruptions. 423-453 - Joseph Jaeger

, Akshaya Kumar:
Memory-Tight Multi-challenge Security of Public-Key Encryption. 454-484
Zero Knowledge
- Arasu Arun, Joseph Bonneau, Jeremy Clark:

Short-lived Zero-Knowledge Proofs and Signatures. 487-516 - Kang Yang

, Xiao Wang
:
Non-interactive Zero-Knowledge Proofs to Multiple Verifiers. 517-546 - Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin

, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency. 547-580
Quantum Algorithms
- Barbara Jiabao Benedikt

, Marc Fischlin
, Moritz Huppert:
Nostradamus Goes Quantum. 583-613 - Zhenyu Huang, Siwei Sun:

Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. 614-644 - Jian Guo

, Guozhen Liu
, Ling Song
, Yi Tu
:
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3. 645-674
Lattice Cryptanalysis
- Olivier Bernard

, Andrea Lesavourey
, Tuong-Huy Nguyen, Adeline Roux-Langlois
:
Log-S-unit Lattices Using Explicit Stickelberger Generators to Solve Approx Ideal-SVP. 677-708 - Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé:

On Module Unique-SVP and NTRU. 709-740 - Hanlin Liu

, Yu Yu
:
A Non-heuristic Approach to Time-Space Tradeoffs and Optimizations for BKW. 741-770 - Jun Xu

, Santanu Sarkar
, Huaxiong Wang
, Lei Hu
:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. 771-799

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














