default search action
24th SAC 2017: Ottawa, ON, Canada
- Carlisle Adams, Jan Camenisch:
Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10719, Springer 2018, ISBN 978-3-319-72564-2
Discrete Logarithms
- Yang Yu, Léo Ducas:
Second Order Statistical Behavior of LLL and BKZ. 3-22 - Hairong Yi, Yuqing Zhu, Dongdai Lin:
Refinement of the Four-Dimensional GLV Method on Elliptic Curves. 23-42
Key Agreement
- Reza Azarderakhsh, David Jao, Christopher Leonardi:
Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances. 45-63 - Brian Koziel, Reza Azarderakhsh, David Jao:
Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman. 64-81
Theory
- Laurent Grémy, Aurore Guillevic, François Morain, Emmanuel Thomé:
Computing Discrete Logarithms in 𝔽p6. 85-105 - Bailey Kacsmar, Sarah Plosker, Ryan Henry:
Computing Low-Weight Discrete Logarithms. 106-126
Efficient Implementation
- Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives. 129-150 - Jean-Claude Bajard, Julien Eynard, M. Anwar Hasan, Paulo Martins, Leonel Sousa, Vincent Zucca:
Efficient Reductions in Cyclotomic Rings - Application to Ring-LWE Based FHE Schemes. 151-171 - Thomaz Oliveira, Julio López, Hüseyin Hisil, Armando Faz-Hernández, Francisco Rodríguez-Henríquez:
How to (Pre-)Compute a Ladder - Improving the Performance of X25519 and X448. 172-191 - Markku-Juhani O. Saarinen:
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption. 192-212
Public Key Encryption
- Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka:
A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations. 215-234 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal:
NTRU Prime: Reducing Attack Surface at Low Cost. 235-260
Signatures
- Edward Eaton:
Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model. 263-280 - Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Efficient Post-Quantum Undeniable Signature on 64-Bit ARM. 281-298 - Leon Groot Bruinderink, Andreas Hülsing:
"Oops, I Did It Again" - Security of One-Time Signatures Under Two-Message Attacks. 299-322
Cryptanalysis
- Gustavo Banegas, Daniel J. Bernstein:
Low-Communication Parallel Quantum Multi-Target Preimage Search. 325-335 - Robin Kwant, Tanja Lange, Kimberley Thissen:
Lattice Klepto - Turning Post-Quantum Crypto Against Itself. 336-354 - Ray A. Perlner, Albrecht Petzoldt, Daniel Smith-Tone:
Total Break of the SRP Encryption Scheme. 355-373 - Jean-François Biasse:
Approximate Short Vectors in Ideal Lattices of Q(ζpe) with Precomputation of Cl(OK). 374-393 - Xavier Bonnetain:
Quantum Key-Recovery on Full AEZ. 394-406 - Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald, Daniel James Shepherd:
Quantum Key Search with Side Channel Advice. 407-422 - Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128. 423-441 - Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. 442-458
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.