


default search action
27th ASIACRYPT 2021: Singapore - Part II
- Mehdi Tibouchi

, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part II. Lecture Notes in Computer Science 13091, Springer 2021, ISBN 978-3-030-92074-6
Physical Attacks, Leakage and Countermeasures
- Barbara Gigerl, Robert Primas, Stefan Mangard

:
Secure and Efficient Software Masking on Superscalar Pipelined Processors. 3-32 - Keita Xagawa

, Akira Ito, Rei Ueno, Junko Takahashi, Naofumi Homma:
Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM Candidates. 33-61 - Sayandeep Saha, Arnab Bag

, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin:
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks. 62-94 - Francesco Berti, Chun Guo, Thomas Peters, François-Xavier Standaert:

Efficient Leakage-Resilient MACs Without Idealized Assumptions. 95-123 - Anubhab Baksi, Shivam Bhasin, Jakub Breier

, Mustafa Khairallah
, Thomas Peyrin
, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. 124-156 - Sonia Belaïd, Matthieu Rivain, Abdul Rahman Taleb, Damien Vergnaud

:
Dynamic Random Probing Expansion with Quasi Linear Asymptotic Complexity. 157-188
Multiparty Computation
- Reo Eriguchi, Koji Nuida

:
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials. 191-221 - Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, Chaoping Xing

:
Improved Single-Round Secure Multiplication Using Regenerating Codes. 222-244 - David Heath, Vladimir Kolesnikov, Stanislav Peceny:

Garbling, Stacked and Staggered - Faster k-out-of-n Garbled Function Evaluation. 245-274 - Yu Long Chen, Stefano Tessaro:

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation. 275-304 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Pratik Sarkar:

Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH. 305-334 - Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi

, Pratik Sarkar:
Reverse Firewalls for Adaptively Secure MPC Without Setup. 335-364
Enhanced Public-Key Encryption and Time-Lock Puzzles
- Aron van Baarsen, Marc Stevens

:
On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups. 367-397 - Myrto Arapinis, Nikolaos Lamprou, Thomas Zacharias

:
Astrolabous: A Universally Composable Time-Lock Encryption Scheme. 398-426 - Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:

Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE. 427-455 - Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng

:
Simulation-Based Bi-Selective Opening Security for Public Key Encryption. 456-482 - Shuai Han

, Shengli Liu
, Dawu Gu
:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal Tightness. 483-513 - Yu Chen

, Qiang Tang
, Yuyu Wang
:
Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds). 514-543
Real-World Protocols
- Erica Blum

, Jonathan Katz, Julian Loss:
Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions. 547-572 - Christiane Kuhn, Dennis Hofheinz, Andy Rupp, Thorsten Strufe:

Onion Routing with Replies. 573-604 - Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Karn Seth, Ni Trieu:

Private Join and Compute from PIR with Default. 605-634 - Lukas Aumayr, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Kristina Hostáková, Matteo Maffei, Pedro Moreno-Sanchez, Siavash Riahi:

Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures. 635-664 - Wasilij Beskorovajnov, Felix Dörre

, Gunnar Hartung, Alexander Koch
, Jörn Müller-Quade, Thorsten Strufe:
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy. 665-695 - Marc Fischlin, Olga Sanina:

Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite. 696-725

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














