


default search action
41st CRYPTO 2021: Virtual Event - Part III
- Tal Malkin

, Chris Peikert
:
Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part III. Lecture Notes in Computer Science 12827, Springer 2021, ISBN 978-3-030-84251-2
Models
- Christian Badertscher

, Yun Lu
, Vassilis Zikas:
A Rational Protocol Treatment of 51% Attacks. 3-32 - Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrótniak

:
MoSS: Modular Security Specifications Framework. 33-63 - Ashrujit Ghoshal

, Stefano Tessaro:
Tight State-Restoration Soundness in the Algebraic Group Model. 64-93 - Haim Kaplan, Yishay Mansour, Kobbi Nissim

, Uri Stemmer:
Separating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage Model. 94-121
Applied Cryptography and Side Channels
- Manuel Barbosa

, Alexandra Boldyreva, Shan Chen
, Bogdan Warinschi:
Provable Security Analysis of FIDO2. 125-156 - Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque

, Brice Minaud, Michael Reichle
:
SSE and SSD: Page-Efficient Searchable Symmetric Encryption. 157-184 - Gaëtan Cassiers

, Sebastian Faust, Maximilian Orlt, François-Xavier Standaert:
Towards Tight Random Probing Security. 185-214 - Jean-Sébastien Coron

, Lorenzo Spignoli:
Secure Wire Shuffling in the Probing Model. 215-244
Cryptanalysis
- Meicheng Liu, Xiaojuan Lu, Dongdai Lin:

Differential-Linear Cryptanalysis from an Algebraic Perspective. 247-277 - Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:

Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. 278-308 - Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng

:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting. 309-336 - Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche:

Thinking Outside the Superbox. 337-367 - Fukang Liu, Takanori Isobe, Willi Meier:

Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. 368-401 - Patrick Longa, Wen Wang, Jakub Szefer:

The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. 402-431 - Victoria de Quehen, Péter Kutas

, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit
, Katherine E. Stange
:
Improved Torsion-Point Attacks on SIDH Variants. 432-470
Codes and Extractors
- Yu Yu, Jiang Zhang:

Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for LPN. 473-501 - Geoffroy Couteau, Peter Rindal, Srinivasan Raghuraman:

Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes. 502-534 - Dana Dachman-Soled, Ilan Komargodski, Rafael Pass

:
Non-malleable Codes for Bounded Parallel-Time Tampering. 535-565 - Dakshita Khurana

, Akshayaram Srinivasan:
Improved Computational Extractors and Their Applications. 566-594 - Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu

, Sruthi Sekar:
Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing. 595-624
Secret Sharing
- Benny Applebaum, Oded Nir:

Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n. 627-655 - Ronald Cramer, Matthieu Rambaud, Chaoping Xing

:
Asymptotically-Good Arithmetic Secret Sharing over $\mathbb {Z}/p^{\ell }\mathbb {Z}$ with Strong Multiplication and Its Applications to Efficient MPC. 656-686 - Lawrence Roy, Jaspal Singh:

Large Message Homomorphic Secret Sharing from DCR and Applications. 687-717 - Vipul Goyal, Yifan Song, Akshayaram Srinivasan:

Traceable Secret Sharing and Applications. 718-747 - Amos Beimel

, Hussien Othman, Naty Peter:
Quadratic Secret Sharing and Conditional Disclosure of Secrets. 748-778 - Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:

Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes. 779-808

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














