


default search action
26th SAC 2019: Waterloo, ON, Canada
- Kenneth G. Paterson, Douglas Stebila

:
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11959, Springer 2020, ISBN 978-3-030-38470-8
Invited Talks
- Douglas R. Stinson:

Looking Back - My Life as a Mathematician and Cryptographer. 3-20 - Craig Costello

:
Supersingular Isogeny Key Exchange for Beginners. 21-50
Differential Cryptanalysis
- Lorenzo Grassi

:
Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES. 53-84 - Fukang Liu, Takanori Isobe:

Iterative Differential Characteristic of TRIFLE-BC. 85-100
Tweakable Block Ciphers
- Takanori Isobe, Kazuhiko Minematsu:

Plaintext Recovery Attacks Against XTS Beyond Collisions. 103-123 - Patrick Derbez, Virginie Lallemand, Aleksei Udovenko

:
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition. 124-145
Block Ciphers and Permutations
- Christoph Dobraunig

, Maria Eichlseder
, Florian Mendel
, Markus Schofnegger:
Algebraic Cryptanalysis of Variants of Frit. 149-170 - Chaoyun Li

, Bart Preneel
:
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree. 171-193 - Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim:

A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules. 194-224
Real-World Cryptography
- Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park:

Towards a Practical Cluster Analysis over Encrypted Data. 227-249 - Eli Biham, Lior Neumann:

Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack. 250-273 - Carsten Baum

, Daniele Cozzo
, Nigel P. Smart
:
Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ. 274-302 - Tibor Jager, David Niehues:

On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. 303-332
Stream Ciphers and Lightweight Cryptography
- Matthias Hamann, Matthias Krause, Alexander Moch:

Tight Security Bounds for Generic Stream Cipher Constructions. 335-364 - Yosuke Todo

, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. 365-392 - Kazuhiko Minematsu:

A Lightweight Alternative to PMAC. 393-417
Post-quantum Analysis
- Akifumi Muroi, Shinya Okumura, Atsuko Miyaji

:
An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks. 421-436 - Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne:

Ternary Syndrome Decoding with Large Weight. 437-466 - Martin R. Albrecht, Benjamin R. Curtis

, Thomas Wunderer:
Exploring Trade-offs in Batch Bounded Distance Decoding. 467-491 - Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:

On Quantum Slide Attacks. 492-519
Post-quantum Implementations
- Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:

XMSS and Embedded Systems. 523-550 - Thales Bandiera Paiva

, Routo Terada:
A Timing Attack on the HQC Encryption Scheme. 551-573 - Alan Szepieniec, Bart Preneel

:
Block-Anti-Circulant Unbalanced Oil and Vinegar. 574-588
Symmetric Cryptography
- Alessandro Amadori, Wil Michiels, Peter Roelse:

A DFA Attack on White-Box Implementations of AES with External Encodings. 591-617 - Akiko Inoue, Kazuhiko Minematsu:

Parallelizable Authenticated Encryption with Small State Size. 618-644 - Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:

Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. 645-666
Post-quantum Constructions
- Cyprien Delpech de Saint Guilhem

, Lauren De Meyer
, Emmanuela Orsini
, Nigel P. Smart
:
BBQ: Using AES in Picnic Signatures. 669-692 - Chitchanok Chuengsatiansup, Damien Stehlé:

Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding. 693-713

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














