


default search action
28th ASIACRYPT 2022: Taipei, Taiwan - Part IV
- Shweta Agrawal, Dongdai Lin:

Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV. Lecture Notes in Computer Science 13794, Springer 2022, ISBN 978-3-031-22971-8
Signatures
- Andreas Hülsing, Mikhail A. Kudinov

:
Recovering the Tight Security Proof of SPHINCS+. 3-33 - Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé:

On Rejection Sampling in Lyubashevsky's Signature Scheme. 34-64 - Léo Ducas

, Eamonn W. Postlethwaite
, Ludo N. Pulles
, Wessel P. J. van Woerden
:
Hawk: Module LIP Makes Lattice Signatures Fast, Compact and Simple. 65-94 - Vadim Lyubashevsky, Ngoc Khanh Nguyen

:
BLOOM: Bimodal Lattice One-out-of-Many Proofs and Applications. 95-125
Commitments
- Zhelei Zhou

, Bingsheng Zhang, Hong-Sheng Zhou
, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. 129-158 - Dario Catalano

, Dario Fiore
, Ida Tucker
:
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures. 159-188 - Matteo Campanelli

, Anca Nitulescu, Carla Ràfols
, Alexandros Zacharakis, Arantxa Zapico:
Linear-Map Vector Commitments and Their Practical Applications. 189-219 - Benoît Libert, Alain Passelègue, Mahshid Riahinia:

PointProofs, Revisited. 220-246
Theory
- Pedro Branco, Nico Döttling, Stella Wohnig:

Universal Ring Signatures in the Standard Model. 249-278 - Julia Kastner

, Julian Loss, Jiayu Xu
:
The Abe-Okamoto Partially Blind Signature Scheme Revisited. 279-309 - Cong Zhang, Hong-Sheng Zhou

, Jonathan Katz:
An Analysis of the Algebraic Group Model. 310-322 - Alice Murphy, Adam O'Neill, Mohammad Zaheri:

Instantiability of Classical Random-Oracle-Model Encryption Transforms. 323-352 - Daniel Apon, Chloé Cachet, Benjamin Fuller

, Peter Hall, Feng-Hao Liu:
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model. 353-383 - Gianluca Brian

, Sebastian Faust
, Elena Micheli, Daniele Venturi
:
Continuously Non-malleable Codes Against Bounded-Depth Tampering. 384-413 - Kathrin Hövelmanns

, Andreas Hülsing, Christian Majenz
:
Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform. 414-443
Cryptanalysis
- Antonio Flórez-Gutiérrez

:
Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning. 447-476 - Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich:

Statistical Decoding 2.0: Reducing Decoding to LPN. 477-507 - Yuanyuan Zhou

, Joop van de Pol, Yu Yu
, François-Xavier Standaert
:
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. 508-536 - Jiahui He

, Kai Hu
, Bart Preneel, Meiqin Wang:
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies. 537-566
Quantum Cryptography
- Fuyuki Kitagawa, Ryo Nishimaki:

Functional Encryption with Secure Key Leasing. 569-598 - Tomoyuki Morimae

, Takashi Yamakawa:
Classically Verifiable NIZK for QMA with Preprocessing. 599-627 - Jun Yan:

General Properties of Quantum Bit Commitments (Extended Abstract). 628-657

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














