


default search action
27th ASIACRYPT 2021: Singapore - Part IV
- Mehdi Tibouchi

, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV. Lecture Notes in Computer Science 13093, Springer 2021, ISBN 978-3-030-92067-8
Lattice Cryptanalysis
- Léo Ducas, Wessel P. J. van Woerden:

NTRU Fatigue: How Stretched is Overstretched? 3-32 - Qian Guo

, Thomas Johansson
:
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS. 33-62 - André Chailloux, Johanna Loyer:

Lattice Sieving via Quantum Random Walks. 63-91 - Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding

:
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. 92-121
Post-Quantum Cryptography
- Kelong Cong

, Daniele Cozzo
, Varun Maram
, Nigel P. Smart
:
Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption. 125-155 - Jing Pan, Xiaofeng Chen, Fangguo Zhang

, Willy Susilo
:
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy. 156-186 - Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:

A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. 187-217 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plançon, Gregor Seiler:

Shorter Lattice-Based Group Signatures via "Almost Free" Encryption and Other Optimizations. 218-248 - Luca De Feo, Cyprien Delpech de Saint Guilhem

, Tako Boris Fouotsa
, Péter Kutas
, Antonin Leroux, Christophe Petit
, Javier Silva, Benjamin Wesolowski:
Séta: Supersingular Encryption from Torsion Attacks. 249-278 - Tako Boris Fouotsa

, Christophe Petit
:
SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH. 279-307
Advanced Encryption and Signatures
- Rishab Goyal, Jiahui Liu, Brent Waters:

Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. 311-341 - Elie Bouscatié, Guilhem Castagnos, Olivier Sanders:

Public Key Encryption with Flexible Pattern Matching. 342-370 - Rishab Goyal, Ridwan Syed, Brent Waters:

Bounded Collusion ABE for TMs from IBE. 371-402 - Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:

Digital Signatures with Memory-Tight Security in the Multi-challenge Setting. 403-433 - Pratish Datta, Tapas Pal:

(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin. 434-467 - Jonathan Katz, Julian Loss, Michael Rosenberg

:
Boosting the Security of Blind Signature Schemes. 468-492
Zero-Knowledge Proofs, Threshold and Multi-Signatures
- David Heath, Vladimir Kolesnikov:

PrORAM - Fast P(logn) Authenticated Shares ZK ORAM. 495-525 - Thomas Attema

, Ronald Cramer, Matthieu Rambaud:
Compressed $\varSigma $-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures. 526-556 - Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie

:
Promise $\varSigma $-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. 557-586 - Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez:

The One-More Discrete Logarithm Assumption in the Generic Group Model. 587-617 - Prastudy Fauzi

, Helger Lipmaa, Janno Siim
, Michal Zajac, Arne Tobias Ødegaard:
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge. 618-649 - Mihir Bellare, Wei Dai:

Chain Reductions for Multi-signatures and the HBMS Scheme. 650-678
Authenticated Key Exchange
- Colin Boyd, Gareth T. Davies

, Bor de Kock
, Kai Gellert
, Tibor Jager, Lise Millerjord
:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. 681-710 - Michel Abdalla

, Björn Haase
, Julia Hesse
:
Security Analysis of CPace. 711-741 - Yuting Xiao, Rui Zhang, Hui Ma:

Modular Design of Role-Symmetric Authenticated Key Exchange Protocols. 742-772

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














