


default search action
29th ASIACRYPT 2023: Guangzhou, China - Part III
- Jian Guo  , Ron Steinfeld , Ron Steinfeld : :
 Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14440, Springer 2023, ISBN 978-981-99-8726-9
Quantum Cryptanalysis
- Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang: 
 Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. 3-33
- Ritam Bhaumik  , Benoît Cogliati , Benoît Cogliati , Jordan Ethan , Jordan Ethan , Ashwin Jha , Ashwin Jha : :
 On Quantum Secure Compressing Pseudorandom Functions. 34-66
- Qun Liu, Bart Preneel, Zheng Zhao, Meiqin Wang: 
 Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits. 67-98
- Mingjie Chen  , Muhammad Imran , Muhammad Imran , Gábor Ivanyos , Gábor Ivanyos , Péter Kutas , Péter Kutas , Antonin Leroux, Christophe Petit , Antonin Leroux, Christophe Petit : :
 Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH. 99-130
- Shi Bai  , Maya-Iggy van Hoof, Floyd Johnson, Tanja Lange, Tran Ngo , Maya-Iggy van Hoof, Floyd Johnson, Tanja Lange, Tran Ngo : :
 Concrete Analysis of Quantum Lattice Enumeration. 131-166
Symmetric-Key Cryptanalysis
- Yaobin Shen, François-Xavier Standaert, Lei Wang: 
 Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. 169-189
- Jianhua Wang  , Lu Qin , Lu Qin , Baofeng Wu , Baofeng Wu : :
 Correlation Cube Attack Revisited - Improved Cube Search and Superpoly Recovery Techniques. 190-222
- Yi Chen  , Zhenzhen Bao , Zhenzhen Bao , Hongbo Yu , Hongbo Yu : :
 Differential-Linear Approximation Semi-unconstrained Searching and Partition Tree: Application to LEA and Speck. 223-255
- Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, Jean-René Reinhard: 
 Cryptanalysis of Elisabeth-4. 256-284
- Kaiyi Zhang  , Qingju Wang , Qingju Wang , Yu Yu , Yu Yu , Chun Guo , Chun Guo , Hongrui Cui , Hongrui Cui : :
 Algebraic Attacks on Round-Reduced Rain and Full AIM-III. 285-310
- Akinori Hosoyamada: 
 Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers. 311-345
- Bishwajit Chakraborty  , Chandranan Dhar , Chandranan Dhar , Mridul Nandi , Mridul Nandi : :
 Exact Security Analysis of ASCON. 346-369
- Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang: 
 Automated Meet-in-the-Middle Attack Goes to Feistel. 370-404
- Kai Hu, Thomas Peyrin, Quan Quan Tan, Trevor Yap  : :
 Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective. 405-435
- Zhenzhen Bao  , Jinyu Lu , Jinyu Lu , Yiran Yao , Yiran Yao , Liu Zhang , Liu Zhang : :
 More Insight on Deep Learning-Aided Cryptanalysis. 436-467

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














