


default search action
CT-RSA 2025: San Francisco, CA, USA
- Arpita Patra
:
Topics in Cryptology - CT-RSA 2025 - Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025, Proceedings. Lecture Notes in Computer Science 15598, Springer 2025, ISBN 978-3-031-88660-7
Cryptanalysis
- Emanuele Bellini
, David Gérault
, Juan Grados
, Thomas Peyrin
:
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs. 3-26 - Chengcheng Chang, Meiqin Wang, Wei Wang, Kai Hu:
Quasidifferential Saves Infeasible Differential - Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT. 27-50 - Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong:
Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer. 51-74 - Akiko Inoue
, Tetsu Iwata
, Kazuhiko Minematsu
:
Comprehensive Robustness Analysis of GCM, CCM, and OCB3. 75-98 - Xiaoyu Wang, Zejun Xiang, Shasha Zhang, Siwei Chen, Xiangyong Zeng:
Quantum Chosen-Ciphertext Attacks Based on Simon's Algorithm Against Unified Structures. 99-122 - Shuo Peng, Kai Hu, Jiahui He, Meiqin Wang:
Improved Key Recovery Attacks of Ascon. 123-146
Public-Key Cryptography
- Zhipeng Wang
, Orestis Alpos, Alireza Kavousi, Harry W. H. Wong, Sze Yiu Chau, Duc Viet Le, Christian Cachin:
DSKE: Digital Signatures with Key Extraction. 149-173 - Benoît Libert:
Simplified Adaptively Secure Threshold BLS Signatures. 174-197 - Sebastian Faust
, Carmit Hazay
, David Kretzler
, Leandro Rometsch
, Benjamin Schlosser
:
Non-interactive Threshold BBS+ from Pseudorandom Correlations. 198-222 - Kyoichi Asano
, Yohei Watanabe
:
Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction. 223-246
Hardware and Software Implementations
- Quinten Norga
, Suparna Kundu
, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar
, Ingrid Verbauwhede
:
Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate-and Code-Based PQC. 249-272 - Martin R. Albrecht, Nicolas Gama
, James Howe
, Anand Kumar Narayanan
:
Post-quantum Online/Offline Signatures. 273-300
Symmetric-Key Cryptography
- István András Seres, Péter Burcsi, Péter Kutas:
How (Not) to Hash into Class Groups of Imaginary Quadratic Fields? 303-326 - Jiayi Ai, Chun Guo:
Sequential Indifferentiability of 7-Round Misty Structures. 327-348
Multiparty Computation and Zero-Knowledge
- Takeshi Nakai
:
Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors. 351-374 - Michele Ciampi, Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas:
Universal Adaptor Signatures from Blackbox Multi-party Computation. 375-398
White-box Crypto
- Zexuan Chen, Jiqiang Lu:
Affine Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher. 401-425

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.