![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
30th SAC 2023: Fredericton, Canada
- Claude Carlet
, Kalikinkar Mandal
, Vincent Rijmen
:
Selected Areas in Cryptography - SAC 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14201, Springer 2024, ISBN 978-3-031-53367-9
Cryptanalysis of Lightweight Ciphers
- Hao Lei, Jiahui He, Kai Hu, Meiqin Wang:
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities. 3-21 - Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH. 22-42 - Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, Zhuohui Feng:
Improving the Rectangle Attack on GIFT-64. 43-61
Side-Channel Attacks and Countermeasures
- Markku-Juhani O. Saarinen, Mélissa Rossi:
Mask Compression: High-Order Masking on Memory-Constrained Devices. 65-81 - Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme. 82-96 - Siemen Dhooghe
, Artemii Ovchinnikov
:
Threshold Implementations with Non-uniform Inputs. 97-123
Post-Quantum Constructions
- Jung Hee Cheon
, Hyeongmin Choe
, Dongyeon Hong, MinJune Yi:
SMAUG: Pushing Lattice-Based Key Encapsulation Mechanisms to the Limits. 127-146 - Andrea Basso
:
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies. 147-168 - Wei Wei
, Min Luo
, Zijian Bao
, Cong Peng
, Debiao He
:
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant. 169-188
Symmetric Cryptography and Fault Attacks
- Siemen Dhooghe
, Svetla Nikova
:
The Random Fault Model. 191-212 - Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. 213-232 - Shoichi Hirose
, Kazuhiko Minematsu
:
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. 233-252
Post-Quantum Analysis and Implementations
- Ruiqi Mi
, Haodong Jiang, Zhenfeng Zhang:
Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks. 255-274 - Melanie Jauch, Varun Maram
:
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery. 275-296 - Sanjay Deshpande
, Chuanqi Xu
, Mamuri Nawan
, Kashif Nawaz
, Jakub Szefer
:
Fast and Efficient Hardware Implementation of HQC. 297-321
Homomorphic Encryption
- Anamaria Costache
, Benjamin R. Curtis
, Erin Hales
, Sean Murphy, Tabitha Ogilvie, Rachel Player
:
On the Precision Loss in Approximate Homomorphic Encryption. 325-345 - Mounika Pratapa
, Aleksander Essex
:
Secure Function Extensions to Additively Homomorphic Cryptosystems. 346-366
Public-Key Cryptography
- Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. 369-384
Differential Cryptanalysis
- Emanuele Bellini
, David Gérault
, Juan Grados
, Yun Ju Huang
, Rusydi H. Makarim
, Mohamed Rachidi
, Sharwan K. Tiwari
:
CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives. 387-408 - Kosei Sakamoto, Ryoma Ito
, Takanori Isobe:
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications. 409-428 - Amirhossein Ebrahimi
, David Gérault
, Paolo Palmieri
:
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon. 429-450
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.