


default search action
28th ASIACRYPT 2022: Taipei, Taiwan - Part I
- Shweta Agrawal, Dongdai Lin:

Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13791, Springer 2022, ISBN 978-3-031-22962-6
Award Papers
- Hart Montgomery

, Mark Zhandry
:
Full Quantum Equivalence of Group Action DLog and CDH, and More. 3-32 - Navid Alamati, Sikhar Patranabis:

Cryptographic Primitives with Hinting Property. 33-62 - Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:

SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves - Faster Indifferentiable Hashing to Elliptic Curves. 63-92
Functional and Witness Encryption
- Ky Nguyen

, Duong Hieu Phan
, David Pointcheval
:
Multi-Client Functional Encryption with Fine-Grained Access Control. 95-125 - Pratish Datta

, Tapas Pal
, Katsuyuki Takashima
:
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH. 126-159 - Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian:

Collusion-Resistant Functional Encryption for RAMs. 160-194 - Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:

Witness Encryption and Null-IO from Evasive LWE. 195-221
Symmetric Key Cryptanalysis
- Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe:

Algebraic Meet-in-the-Middle Attack on LowMC. 225-255 - Murilo Coutinho, Iago Passos, Juan del Carmen Grados Vasquez

, Fábio Lúcio Lopes de Mendonça, Rafael Timteo de Sousa, Fábio Borges
:
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró. 256-286 - Lingyue Qin, Xiaoyang Dong, Anyu Wang

, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. 287-317 - Zhenzhen Bao

, Jian Guo
, Meicheng Liu
, Li Ma
, Yi Tu
:
Enhancing Differential-Neural Cryptanalysis. 318-347 - Soumya Chattopadhyay, Ashwin Jha

, Mridul Nandi
:
Towards Tight Security Bounds for OMAC, XCBC and TMAC. 348-378 - Yu Long Chen:

A Modular Approach to the Security Analysis of Two-Permutation Constructions. 379-409 - Ling Song

, Nana Zhang
, Qianqian Yang
, Danping Shi
, Jiahao Zhao
, Lei Hu
, Jian Weng
:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. 410-440
Multiparty Computation
- Geoffroy Couteau, Adi Rosén:

Random Sources in Private Computation. 443-473 - Geoffroy Couteau, Maryam Zarezadeh:

Non-interactive Secure Computation of Inner-Product from LPN and LWE. 474-503 - Amey Bhangale, Chen-Da Liu-Zhang

, Julian Loss, Kartik Nayak
:
Efficient Adaptively-Secure Byzantine Agreement for Long Messages. 504-525 - Andrew Morgan, Rafael Pass

:
Concurrently Composable Non-interactive Secure Computation. 526-555 - Aditya Hegde

, Nishat Koti
, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul
:
Attaining GOD Beyond Honest Majority with Friends and Foes. 556-587 - Shuaishuai Li

:
Towards Practical Topology-Hiding Computation. 588-617
Real World Protocols
- Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger

, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
:
Key-Schedule Security for the TLS 1.3 Standard. 621-650 - Ignacio Cascudo

, Bernardo David, Lydia Garms, Anders Konring:
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model. 651-680 - Andreea B. Alexandru

, Erica Blum
, Jonathan Katz
, Julian Loss
:
State Machine Replication Under Changing Network Conditions. 681-710
Blockchains and Cryptocurrencies
- Georg Fuchsbauer, Michele Orrù

:
Non-interactive Mimblewimble Transactions, Revisited. 713-744 - Yanxue Jia

, Shifeng Sun
, Hong-Sheng Zhou
, Dawu Gu
:
A Universally Composable Non-interactive Aggregate Cash System. 745-773 - Chen-Da Liu-Zhang

, Christian Matt
, Ueli Maurer, Guilherme Rito
, Søren Eller Thomsen
:
Practical Provably Secure Flooding for Blockchains. 774-805 - Hamza Abusalah

, Georg Fuchsbauer, Peter Gazi
, Karen Klein
:
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients. 806-836

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














