


default search action
45th CRYPTO 2025, Santa Barbara, CA, USA - Part V
- Yael Tauman Kalai, Seny F. Kamara:

Advances in Cryptology - CRYPTO 2025 - 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part V. Lecture Notes in Computer Science 16004, Springer 2025, ISBN 978-3-032-01900-4
Side-Channel Attacks
- Julius Hermelink, Kai-Chun Ning, Richard Petri:

Finding and Protecting the Weakest Link - On Side-Channel Attacks on y\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\textbf{y}$$\end{document} in Masked ML-DSA. 3-37 - Yuyu Wang

:
Leakage-Resilient Circuits Against sfNC1, Revisited. 38-69 - Nathan Maillet, Cyrius Nugier, Vincent Migliore, Jean-Christophe Deneuville:

Key Recovery from Side-Channel Power Analysis Attacks on Non-SIMD HQC Decryption. 70-102 - Calvin Abou Haidar

, Quentin Payet, Mehdi Tibouchi
:
Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip. 103-135
Cryptanalysis
- Lingyue Qin, Wenquan Bi, Xiaoyang Dong:

Guess-and-Determine Rebound: Applications to Key Collisions on AES. 139-171 - Amit Singh Bhati

, Elena Andreeva
:
Breaking the IEEE Encryption Standard XCB-AES in Two Queries. 172-199 - Yingxin Li, Fukang Liu, Gaoli Wang, Haifeng Qian, Keting Jia, Xiangyu Kong:

New Collision Attacks on Round-Reduced SHA-512. 200-229 - Peng Wang

, Shuping Mao, Ruozhou Xu, Jiwu Jing, Yuewu Wang:
How to Recover the Full Plaintext of XCB. 230-259 - Boxin Zhao, Qingliang Hou, Lingyue Qin, Xiaoyang Dong:

Triangulating Meet-in-the-Middle Attack. 260-292 - Kai Hu, Chi Zhang, Chengcheng Chang, Jiashu Zhang, Meiqin Wang, Thomas Peyrin:

Unlocking Mix-Basis Potential: Geometric Approach for Combined Attacks. 293-334 - Augustin Bariant, Aurélien Boeuf, Pierre Briaud, Maël Hostettler, Morten Øygarden, Håvard Raddum:

Improved Resultant Attack Against Arithmetization-Oriented Primitives. 335-367
Symmetric Cryptography
- Ritam Bhaumik, Avijit Dutta, Akiko Inoue, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro:

Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108. 371-403 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:

The Exact Multi-User Security of Key-Alternating Feistel Ciphers with a Single Permutation. 404-436 - Bishwajit Chakraborty

, Abishanka Saha:
Tweakable Permutation-Based Luby-Rackoff Constructions. 437-466 - Woohyuk Chung

, Seongha Hwang
, Hwigyeom Kim
, Jooyoung Lee
:
Enhancing Provable Security and Efficiency of Permutation-Based DRBGs. 467-496 - Christof Beierle

, Phil Hebborn, Gregor Leander
, Yevhen Perehuda:
Integral Resistance of Block Ciphers with Key Whitening by Modular Addition. 497-529 - Jules Baudrin, Sonia Belaïd, Nicolas Bon, Christina Boura, Anne Canteaut, Gaëtan Leurent, Pascal Paillier, Léo Perrin, Matthieu Rivain, Yann Rotella, Samuel Tap:

Transistor: a TFHE-Friendly Stream Cipher. 530-565
Pseudorandom Functions
- Ruben Baecker

, Paul Gerhart
, Daniel Rausch
, Dominique Schröder
:
A Fully-Adaptive Threshold Partially-Oblivious PRF. 569-597 - Kaishuo Cheng, Joseph Jaeger:

Adaptive Security for Constrained PRFs. 598-627 - Joël Alwen, Chris Brzuska, Jérôme Govinden

, Patrick Harasser, Stefano Tessaro:
Succinct PPRFs via Memory-Tight Reductions. 628-662 - Pedro Branco

, Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan:
Pseudorandom Obfuscation and Applications. 663-698

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














