


default search action
CT-RSA 2022: Virtual Event
- Steven D. Galbraith

:
Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings. Lecture Notes in Computer Science 13161, Springer 2022, ISBN 978-3-030-95311-9 - Alexander Bienstock, Yevgeniy Dodis, Yi Tang:

Multicast Key Agreement, Revisited. 1-25 - Benoît Chevallier-Mames:

A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption. 26-48 - Rami Elkhatib, Brian Koziel, Reza Azarderakhsh:

Faster Isogenies for Post-quantum Cryptography: SIKE. 49-72 - Jesús-Javier Chi-Domínguez

, Krijn Reijnders:
Fully Projective Radical Isogenies in Constant-Time. 73-95 - Shahla Atapoor

, Nigel P. Smart
, Younes Talibi Alaoui
:
Private Liquidity Matching Using MPC. 96-119 - Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov

:
Approximate Homomorphic Encryption with Reduced Approximation Error. 120-144 - Florette Martinez:

Attacks on Pseudo Random Number Generators Hiding a Linear Structure. 145-168 - Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen

, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA. 169-195 - Han Wu

, Guangwu Xu:
More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes. 196-222 - Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang:

Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. 223-246 - Yanhong Fan, Muzhou Li

, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. 247-271 - Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom, Zhiyuan Zhang

:
Side-Channeling the Kalyna Key Expansion. 272-296 - Naila Mukhtar

, Lejla Batina, Stjepan Picek
, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. 297-321 - Tako Boris Fouotsa

, Christophe Petit
:
A New Adaptive Attack on SIDH. 322-344 - Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten:

On Fingerprinting Attacks and Length-Hiding Encryption. 345-369 - Xavier Bultel

:
CCA Secure A Posteriori Openable Encryption in the Standard Model. 370-394 - Giuseppe Vitto, Alex Biryukov

:
Dynamic Universal Accumulator with Batch Update over Bilinear Groups. 395-426 - Razvan Rosie:

Adaptively Secure Laconic Function Evaluation for NC1. 427-450 - Carlos Cid

, John Petter Indrøy, Håvard Raddum
:
FASTA - A Stream Cipher for Fast FHE Evaluation. 451-483 - Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander

, María Naya-Plasencia, Yosuke Todo:
New Attacks from Old Distinguishers Improved Attacks on Serpent. 484-510 - Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz:

Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function. 511-536 - David Galindo

, Jia Liu
:
Robust Subgroup Multi-signatures for Consensus. 537-561 - Antonio Faonio

, Dario Fiore, Luca Nizzardo, Claudio Soriente:
Subversion-Resilient Enhanced Privacy ID. 562-588 - Kristian Gjøsteen, Mayank Raikwar, Shuang Wu:

PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. 589-619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














