


default search action
ASIACRYPT 2014: Kaoshiung, Taiwan, R.O.C.
- Palash Sarkar, Tetsu Iwata:

Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8873, Springer 2014, ISBN 978-3-662-45610-1
Cryptology and Coding Theory
- Qian Guo

, Thomas Johansson
, Carl Löndahl:
Solving LPN Using Covering Codes. 1-20 - Jean-Charles Faugère, Ludovic Perret, Frédéric de Portzamparc:

Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form. 21-41
New Proposals
- Dan Boneh, Henry Corrigan-Gibbs:

Bivariate Polynomials Modulo Composites and Their Applications. 42-62 - Alex Biryukov, Charles Bouillaguet

, Dmitry Khovratovich:
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract). 63-84
Authenticated Encryption
- Philipp Jovanovic, Atul Luykx, Bart Mennink:

Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes. 85-104 - Elena Andreeva

, Andrey Bogdanov
, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
How to Securely Release Unverified Plaintext in Authenticated Encryption. 105-125 - Mridul Nandi:

Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET. 126-140
Symmetric Key Cryptanalysis
- Sareh Emami, San Ling

, Ivica Nikolic, Josef Pieprzyk
, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. 141-157 - Siwei Sun, Lei Hu, Peng Wang

, Kexin Qiao
, Xiaoshuang Ma, Ling Song:
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers. 158-178 - Christina Boura, María Naya-Plasencia, Valentin Suder:

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon. 179-199 - Henri Gilbert:

A Simplified Representation of AES. 200-222
Side Channel Analysis I
- Jake Longo, Daniel P. Martin

, Elisabeth Oswald
, Daniel Page, Martijn Stam, Michael Tunstall
:
Simulatable Leakage: Analysis, Pitfalls, and New Constructions. 223-242 - Luke Mather, Elisabeth Oswald

, Carolyn Whitnall:
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer. 243-261 - Diego F. Aranha

, Pierre-Alain Fouque
, Benoît Gérard, Jean-Gabriel Kammerer, Mehdi Tibouchi
, Jean-Christophe Zapalowicz:
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias. 262-281 - Nicolas Veyrat-Charvillon, Benoît Gérard, François-Xavier Standaert

:
Soft Analytical Side-Channel Attacks. 282-296
Hyperelliptic Curve Cryptography
- Christophe Doche

:
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography. 297-316 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe:

Kummer Strikes Back: New DH Speed Records. 317-337 - Hüseyin Hisil

, Craig Costello
:
Jacobian Coordinates on Genus 2 Curves. 338-357
Factoring and Discrete Log
- Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra:

Mersenne Factorization Factory. 358-377 - Antoine Joux

, Cécile Pierrot:
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields. 378-397
Invited Talk I
- Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:

Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). 398-419
Cryptanalysis
- Pierre-Alain Fouque, Antoine Joux

, Chrysanthi Mavromati:
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE. 420-438 - Itai Dinur, Orr Dunkelman

, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. 439-457 - Jian Guo

, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Generic Feistel Constructions. 458-477 - Mridul Nandi:

XLS is Not a Strong Pseudorandom Permutation. 478-490
Signatures
- Christian Hanser, Daniel Slamanig

:
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials. 491-511 - Nils Fleischhacker

, Tibor Jager, Dominique Schröder
:
On Tight Security Proofs for Schnorr Signatures. 512-531
Zero-Knowledge
- George Danezis

, Cédric Fournet, Jens Groth
, Markulf Kohlweiss
:
Square Span Programs with Applications to Succinct NIZK Arguments. 532-550 - Fabrice Benhamouda

, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven:
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures. 551-572

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














