


default search action
23rd INDOCRYPT 2022: Kolkata, India
- Takanori Isobe, Santanu Sarkar:

Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings. Lecture Notes in Computer Science 13774, Springer 2022, ISBN 978-3-031-22911-4
Foundation
- Behzad Abdolmaleki, Daniel Slamanig

:
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments. 3-25 - Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:

ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. 26-51 - Wei Dai, Tatsuaki Okamoto, Go Yamamoto:

Stronger Security and Generic Constructions for Adaptor Signatures. 52-77 - Katharina Boudgoust

, Corentin Jeudy
, Adeline Roux-Langlois, Weiqiang Wen
:
Entropic Hardness of Module-LWE from Module-NTRU. 78-99
Symmetric Key Cryptology
- Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme

:
New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks. 103-124 - Shanjie Xu, Qi Da, Chun Guo:

Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules). 125-145 - Nilanjan Datta, Avijit Dutta, Shibam Ghosh:

INT-RUP Security of SAEB and TinyJAMBU. 146-170 - Arghya Bhattacharjee

, Ritam Bhaumik, Mridul Nandi:
Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches. 171-194 - Arghya Bhattacharjee

, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi:
sf ISAP+: sf ISAP with Fast Authentication. 195-219
Protocols and Implementation
- Ananya Appan, Anirudh Chandramouli

, Ashish Choudhury:
Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries. 223-248 - Aisling Connolly

, Jérôme Deschamps, Pascal Lafourcade
, Octavio Perez-Kempner
:
Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric. 249-271 - Hanno Becker, Matthias J. Kannwischer:

Hybrid Scalar/Vector Implementations of Keccak and SPHINCS+ on AArch64. 272-293 - Emanuele Bellini

, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez
, Andre Esser
, Sorina Ionica
, Luis Rivera-Zamarripa
, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger:
Parallel Isogeny Path Finding with Limited Memory. 294-316
Cryptanalysis
- Subhabrata Samajder, Palash Sarkar:

Distinguishing Error of Nonlinear Invariant Attacks. 319-335 - Daniël Kuijsters, Denise Verbakel, Joan Daemen:

Weak Subtweakeys in SKINNY. 336-348 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:

Full Round Zero-Sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-Permutation in the Known-Key Setting. 349-372 - Emanuele Bellini

, David Gérault, Matteo Protopapa, Matteo Rossi:
Monte Carlo Tree Search for Automatic Differential Characteristics Search: Application to SPECK. 373-397 - Debasmita Chakraborty

:
Finding Three-Subset Division Property for Ciphers with Complex Linear Layers. 398-421 - Chengcheng Chang, Meiqin Wang, Ling Sun, Wei Wang:

Improved Truncated Differential Distinguishers of AES with Concrete S-Box. 422-445
Boolean Functions
- Subhamoy Maitra, Bimal Mandal, Manmatha Roy:

Modifying Bent Functions to Obtain the Balanced Ones with High Nonlinearity. 449-470 - Bikshan Chatterjee, Rachit Parikh, Arpita Maitra, Subhamoy Maitra, Animesh Roy:

Revisiting BoolTest - On Randomness Testing Using Boolean Functions. 471-491 - Agnese Gini

, Pierrick Méaux:
Weightwise Almost Perfectly Balanced Functions: Secondary Constructions for All n and Better Weightwise Nonlinearities. 492-514
Quantum Cryptography and Cryptanalysis
- Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay:

Improved Quantum Analysis of SPECK and LowMC. 517-540 - Jyotirmoy Basak

, Kaushik Chakraborty, Arpita Maitra, Subhamoy Maitra:
A Proposal for Device Independent Probabilistic Quantum Oblivious Transfer. 541-565 - Tingting Guo

, Peng Wang, Lei Hu, Dingfeng Ye:
Quantum Attacks on PRFs Based on Public Random Permutations. 566-591 - Céline Chevalier, Ehsan Ebrahimi

, Quoc-Huy Vu:
On Security Notions for Encryption in a Quantum World. 592-613
Post Quantum Cryptography
- Daniel J. Bernstein:

A One-Time Single-bit Fault Leaks All Previous NTRU-HRSS Session Keys to a Chosen-Ciphertext Attack. 617-643 - Zijian Song, Jun Xu, Zhiwei Li, Dingfeng Ye:

An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015. 644-657 - Wouter Castryck

, Natan Vander Meeren:
Two Remarks on the Vectorization Problem. 658-678 - Sanjit Chatterjee, Tapas Pandit:

Efficient IBS from a New Assumption in the Multivariate-Quadratic Setting. 679-696 - Sanjit Chatterjee, M. Prem Laxman Das, Tapas Pandit:

Revisiting the Security of Salted UOV Signature. 697-719

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














