


default search action
26th ASIACRYPT 2020: Daejeon, South Korea - Part II
- Shiho Moriai, Huaxiong Wang

:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12492, Springer 2020, ISBN 978-3-030-64833-6
Public Key Cryptography
- Matteo Campanelli

, Dario Fiore, Nicola Greco, Dimitris Kolonelos, Luca Nizzardo:
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. 3-35 - Yusuke Yoshida, Fuyuki Kitagawa, Keita Xagawa

, Keisuke Tanaka:
Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions. 36-65 - Sam Kim, David J. Wu:

Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. 66-97 - Rongmao Chen, Xinyi Huang, Moti Yung:

Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption. 98-128 - Roman Langrehr

, Jiaxin Pan
:
Unbounded HIBE with Tight Security. 129-159 - Sherman S. M. Chow

, Katharina Fech, Russell W. F. Lai
, Giulio Malavolta
:
Multi-client Oblivious RAM with Poly-logarithmic Communication. 160-190 - Anis Bkakria, Nora Cuppens, Frédéric Cuppens:

Privacy-Preserving Pattern Matching on Encrypted Data. 191-220 - Jung Hee Cheon, Dongwoo Kim

, Duhyeong Kim:
Efficient Homomorphic Comparison Methods with Optimal Complexity. 221-256
Lattice-Based Cryptography
- Muhammed F. Esgin, Ngoc Khanh Nguyen, Gregor Seiler:

Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings. 259-288 - Katharina Boudgoust

, Corentin Jeudy
, Adeline Roux-Langlois
, Weiqiang Wen:
Towards Classical Hardness of Module-LWE: The Linear Rank Case. 289-317 - Amit Deo, Benoît Libert, Khoa Nguyen

, Olivier Sanders:
Lattice-Based E-Cash, Revisited. 318-348 - Olivier Bernard

, Adeline Roux-Langlois
:
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices. 349-380 - Daniele Micciancio

, Jessica Sorrell:
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers. 381-407
Isogeny-Based Cryptography
- Navid Alamati, Luca De Feo, Hart Montgomery, Sikhar Patranabis:

Cryptographic Group Actions and Applications. 411-439 - Craig Costello

:
B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted Torsion. 440-463 - Ward Beullens, Shuichi Katsumata, Federico Pintore

:
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices. 464-492 - Wouter Castryck

, Thomas Decru, Frederik Vercauteren:
Radical Isogenies. 493-519 - Dan Boneh, Dmitry Kogan, Katharine Woo:

Oblivious Pseudorandom Functions from Isogenies. 520-550 - Tomoki Moriya

, Hiroshi Onuki
, Tsuyoshi Takagi:
SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRF. 551-580
Quantum Algorithms
- Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite

, John M. Schanck:
Estimating Quantum Speedups for Lattice Sieves. 583-613 - Nico Döttling, Giulio Malavolta

, Sihang Pu
:
A Combinatorial Approach to Quantum Random Functions. 614-632 - Xavier Bonnetain, Rémi Bricout, André Schrottenloher, Yixin Shen

:
Improved Classical and Quantum Algorithms for Subset-Sum. 633-666 - Christian Badertscher

, Alexandru Cojocaru
, Léo Colisson
, Elham Kashefi, Dominik Leichtle
, Atul Mantri, Petros Wallden
:
Security Limitations of Classical-Client Delegated Quantum Computing. 667-696 - Jian Zou, Zihao Wei, Siwei Sun, Ximeng Liu, Wenling Wu:

Quantum Circuit Implementations of AES with Fewer Qubits. 697-726 - Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:

Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. 727-757
Authenticated Key Exchange
- Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi:

Fuzzy Asymmetric Password-Authenticated Key Exchange. 761-784 - Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng

:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. 785-814

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














