


default search action
7th LATINCRYPT 2021: Bogotá, Colombia
- Patrick Longa

, Carla Ràfols
:
Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings. Lecture Notes in Computer Science 12912, Springer 2021, ISBN 978-3-030-88237-2
Quantum Cryptography
- Xavier Bonnetain:

Tight Bounds for Simon's Algorithm. 3-23 - Anne Broadbent, Raza Ali Kazmi:

Constructions for Quantum Indistinguishability Obfuscation. 24-43 - Robin M. Berger

, Marcel Tiepelt
:
On Forging SPHINCS+-Haraka Signatures on a Fault-Tolerant Quantum Computer. 44-63
Post-quantum Cryptography
- Edward Eaton, Douglas Stebila

, Roy Stracovsky
:
Post-quantum Key-Blinding for Authentication in Anonymity Networks. 67-87 - Sofía Celi

, Armando Faz-Hernández
, Nick Sullivan, Goutam Tamvada
, Luke Valenta
, Thom Wiggers
, Bas Westerbaan
, Christopher A. Wood
:
Implementing and Measuring KEMTLS. 88-107 - Mojtaba Bisheh-Niasar

, Reza Azarderakhsh, Mehran Mozaffari Kermani
:
A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates. 108-126 - Tapas Pal

, Ratna Dutta:
Attribute-Based Access Control for Inner Product Functional Encryption from LWE. 127-148
Asymmetric Cryptanalysis
- Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu:

Classical Attacks on a Variant of the RSA Cryptosystem. 151-167 - Nina Bindel

, Douglas Stebila
, Shannon Veitch:
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange. 168-188
Cryptanalysis and Side-Channel Analysis
- Tarun Yadav

, Manoj Kumar
:
Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Cryptanalysis. 191-212 - Christophe Genevey-Metat

, Annelie Heuser
, Benoît Gérard
:
Train or Adapt a Deeply Learned Profile? 213-232 - Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:

Autocorrelations of Vectorial Boolean Functions. 233-253 - Shibam Ghosh

, Orr Dunkelman:
Automatic Search for Bit-Based Division Property. 254-274 - Eik List:

TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption. 275-295
Distributed Cryptographic Protocols
- Simon Holmgaard Kamp

, Bernardo Magri
, Christian Matt
, Jesper Buus Nielsen
, Søren Eller Thomsen
, Daniel Tschudi
:
Weight-Based Nakamoto-Style Blockchains. 299-319 - Diego F. Aranha

, Elena Pagnin
, Francisco Rodríguez-Henríquez:
LOVE a Pairing. 320-340 - Alejandro Hevia, Ilana Mergudich-Thal:

Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo. 341-362 - Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov

:
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. 363-381 - Diego F. Aranha

, Anders P. K. Dalskov
, Daniel Escudero, Claudio Orlandi:
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms. 382-404
Multiparty Computation
- Eleftheria Makri, Tim Wood:

Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling. 407-430 - David W. Archer

, Shahla Atapoor
, Nigel P. Smart
:
The Cost of IEEE Arithmetic in Secure Computation. 431-452 - Anders P. K. Dalskov

, Daniel Escudero:
Honest Majority MPC with Abort with Minimal Online Communication. 453-472

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














