


default search action
CT-RSA 2023: San Francisco, CA, USA
- Mike Rosulek:

Topics in Cryptology - CT-RSA 2023 - Cryptographers' Track at the RSA Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings. Lecture Notes in Computer Science 13871, Springer 2023, ISBN 978-3-031-30871-0
Cryptographic Implementations
- Nicky Mouha

, Christopher Celi
:
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms. 3-28 - Anamaria Costache

, Lea Nürnberger
, Rachel Player
:
Optimisations and Tradeoffs for HElib. 29-53
Quantum Cryptanalysis
- Ren Taguchi

, Atsushi Takayasu
:
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain. 57-83 - Chris Peikert, Jiayu Xu:

Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability. 84-112
Advanced Public-Key Encryption
- Marc Joye

:
On-Line/Off-Line DCR-Based Homomorphic Encryption and Applications. 115-131 - Marloes Venema

:
A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More. 132-159
Tools for Privacy-Enhancing Technologies
- Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin

, Paul Stankovski Wagner:
PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials. 163-190 - Ismail Afia

, Riham AlTawy
:
Unlinkable Policy-Based Sanitizable Signatures. 191-221
Symmetric Cryptanalysis
- Junjie Cheng, Kexin Qiao

:
Improved Graph-Based Model for Recovering Superpoly on Trivium. 225-251 - Emanuele Bellini

, David Gérault
, Juan Grados
, Rusydi H. Makarim
, Thomas Peyrin
:
Fully Automated Differential-Linear Attacks Against ARX Ciphers. 252-276 - Kazuma Taka, Tatsuya Ishikawa

, Kosei Sakamoto, Takanori Isobe:
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros. 277-304 - Siwei Chen, Mingming Zhu, Zejun Xiang

, Runqing Xu
, Xiangyong Zeng, Shasha Zhang:
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-Like Ciphers. 305-330
Multiparty Protocols
- Navid Alamati, Hart Montgomery, Sikhar Patranabis:

Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs. 333-359 - Sebastian Faust

, Carmit Hazay
, David Kretzler
, Benjamin Schlosser
:
Putting the Online Phase on a Diet: Covert Security from Short MACs. 360-386
Digital Signatures
- Alexandre Bouez

, Kalpana Singh
:
One Round Threshold ECDSA Without Roll Call. 389-414 - Andrew Fregly

, Joseph Harvey
, Burton S. Kaliski Jr.
, Swapneel Sheth
:
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice. 415-441
Fault Attacks and Side Channels
- Guillaume Barbu

, Christophe Giraud
:
All Shall FA-LLL: Breaking CT-RSA 2022 and CHES 2022 Infective Countermeasures with Lattice-Based Fault Attacks. 445-468 - Luke Beckwith, Abubakr Abdulgadir, Reza Azarderakhsh:

A Flexible Shared Hardware Accelerator for NIST-Recommended Algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA Protection. 469-490
Heuristic Approaches
- Anna Hambitzer

, David Gérault
, Yun Ju Huang
, Najwa Aaraj
, Emanuele Bellini
:
NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher. 493-523 - Qun Liu, Zheng Zhao, Meiqin Wang:

Improved Heuristics for Low-Latency Implementations of Linear Layers. 524-550
Symmetric-Key Constructions
- Alexandre Adomnicai

, Kazuhiko Minematsu
, Junji Shikata
:
Authenticated Encryption for Very Short Inputs. 553-572 - Ferdinand Sibleyras, Yosuke Todo:

Keyed Sum of Permutations: A Simpler RP-Based PRF. 573-593 - Mihir Bellare, Laura Shea:

Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks. 594-621 - Sarah Miracle, Scott Yilek:

Targeted Invertible Pseudorandom Functions and Deterministic Format-Transforming Encryption. 622-642
Key Agreement
- Eike Kiltz

, Jiaxin Pan
, Doreen Riepel
, Magnus Ringerud
:
Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV. 645-671 - Afonso Arriaga

, Petra Sala
, Marjan Skrobot
:
Wireless-Channel Key Exchange. 672-699

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














