


default search action
32nd SAC 2025: Toronto, ON, Canada
- Christina Boura

, Atefeh Mashatan
, Ali Miri
:
Selected Areas in Cryptography - SAC 2025 - 32nd International Conference, Toronto, ON, Canada, August 13-15, 2025, Revised Selected Papers. Lecture Notes in Computer Science 16207, Springer 2026, ISBN 978-3-032-10535-6
Cryptanalysis of Symmetric Schemes and Primitives
- Marcel Nageler, Lorenz Schmid, Maria Eichlseder:

Preimage-Type Attacks for Reduced Ascon-Hash: Application to Ed25519. 3-25 - Keita Toyama, Kosei Sakamoto, Takanori Isobe:

Collision Attacks on SPONGENT with Grouping Method. 26-54 - Huina Li, Le He, Weidong Qiu:

Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode. 55-78 - Debasmita Chakraborty, Hosein Hadipour, Anup Kumar Kundu, Mostafizar Rahman, Prathamesh Ram, Yu Sasaki, Dilip Sau, Aman Sinha:

Breaking the Twinkle Authenticated Encryption Scheme and Analyzing Its Underlying Permutation. 79-109
Impossible Differential Attacks
- Patrick Derbez, Marie Euler:

Minimalist Model for Impossible Differentials. 113-143 - Emanuele Bellini, Alessandro De Piccoli, David Gérault, Paul Huynh, Simone Pelizzola, Andrea Visconti:

Impossible Differentials Automation: Model Generation and New Techniques. 144-175
Symmetric Design Strategies and Security
- Elena Andreeva, Amit Singh Bhati, Andreas Weninger:

Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs. 179-208 - Panos Kampanakis, Shai Halevi, Nevine Maurice Ebeid, Matt Campagna:

Blockcipher-Based Key Commitment for Nonce-Derived Schemes. 209-234 - Pierrick Méaux, Tim Seuré, Deng Tang:

The Revisited Hidden Weight Bit Function. 235-263 - Marc Fischlin, Evangelos Gkoumas:

Bit Security of Quantum Key Search. 264-290
Efficient Implementations
- Bowen Zhang, Hao Cheng, Johann Großschädl, Peter Y. A. Ryan:

High-Throughput EdDSA Verification on Intel Processors with Advanced Vector Extensions. 293-314 - Tanmayi Jandhyala, Guang Gong:

Air-FRI: Acceleration of the FRI Protocol on the GPU for ZkSNARK Applications. 315-338 - Mohammadtaghi Badakhshan, Susanta Samanta, Guang Gong:

Accelerating Post-quantum Secure zkSNARKs by Optimizing Additive FFT. 339-368 - Nicolas Méloni, François Palma, Pascal Véron:

Multi-precision PMNS with CIOS Reduction. 369-390 - Sanjay Deshpande, Yongseok Lee, Mamuri Nawan, Kashif Nawaz, Ruben Niederhagen, Yunheung Paek, Jakub Szefer:

Unified MEDS Accelerator. 391-421
Public Key Encryption
- Shingo Sato, Junji Shikata:

Bounded CCA2-Secure Proxy Re-encryption from Lattices. 425-455 - Liheng Ji, Yilei Chen:

Public-Key Encryption and Injective Trapdoor Functions from LWE with Large Noise Rate. 456-485
Attacks on Public-Key Schemes
- Mohamed Malhou, Ludovic Perret, Kristin E. Lauter:

AI for Code-based Cryptography. 489-518 - Pierre Briaud, Maxime Bros, Ray A. Perlner, Daniel Smith-Tone:

Practical Attack on All Parameters of the HPPC Signature Scheme. 519-538 - Michaël Bulois, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Vincent Grosso:

Algebraic Key-Recovery Side-Channel Attack on Classic McEliece. 539-566 - Paco Azevedo Oliveira, Jordan Beraud, Louis Goubin:

An Attack on ML-DSA Using an Implicit Hint. 567-585
Isogeny-Based Cryptography
- Elif Ozbay Gurler, Patrick Struck:

How (not) to Build Identity-Based Encryption from Isogenies. 589-615 - Kaizhan Lin, Weize Wang, Chang-An Zhao, Yunlei Zhao:

PIsignHD: A New Structure for the SQIsign Family with Flexible Applicability. 616-644
Fully Homomorphic Encryption
- Antonina Bondarchuk, Olive Chakraborty, Geoffroy Couteau, Renaud Sirdey:

Downlink (T)FHE Ciphertexts Compression. 647-678 - Intak Hwang, Shinwon Lee, Seonhong Min, Yongsoo Song:

Efficient Full Domain Functional Bootstrapping from Recursive LUT Decomposition. 679-699
Side-Channel Analysis and Fault Attacks
- Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:

Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure. 703-723 - Sengim Karayalcin, Guilherme Perin, Stjepan Picek:

Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-Channel Analysis. 724-752 - Rishub Nagpal, Vedad Hadzic, Robert Primas, Stefan Mangard:

Efficient SPA Countermeasures Using Redundant Number Representation with Application to ML-KEM. 753-780 - Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li:

Secret in OnePiece: Single-Bit Fault Attack on Kyber. 781-804

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














