


default search action
28th SAC 2021: Virtual Event
- Riham AlTawy

, Andreas Hülsing
:
Selected Areas in Cryptography - 28th International Conference, SAC 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13203, Springer 2022, ISBN 978-3-030-99276-7
Privacy and Applications
- Alessandro Melloni

, Martijn Stam
, Øyvind Ytrehus
:
On Evaluating Anonymity of Onion Routing. 3-24 - Deepak Kumaraswamy

, Shyam Murthy
, Srinivas Vivek
:
Revisiting Driver Anonymity in ORide. 25-46 - Keita Xagawa

:
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application. 47-67 - Armando Faz-Hernández

, Watson Ladd
, Deepak Maram
:
ZKAttest: Ring and Group Signatures for Existing ECDSA Keys. 68-83
Implementation, PUFs and MPC
- Tim Beyne

, Siemen Dhooghe
, Adrián Ranea
, Danilo Sijacic:
A Low-Randomness Second-Order Masked AES. 87-110 - Animesh Roy, Dibyendu Roy, Subhamoy Maitra:

How Do the Arbiter PUFs Sample the Boolean Function Class? 111-130 - Robin Jadoul

, Nigel P. Smart
, Barry Van Leeuwen
:
MPC for Q2 Access Structures over Rings and Fields. 131-151
Secret-Key Cryptography: Design and Proofs
- Tim Beyne

, Yu Long Chen, Christoph Dobraunig
, Bart Mennink:
Multi-user Security of the Elephant v2 Authenticated Encryption Mode. 155-178 - Yosuke Todo, Yu Sasaki:

Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. 179-199 - Kazuhiko Minematsu

, Akiko Inoue
, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo:
Parallel Verification of Serial MAC and AE Modes. 200-219
Secret-Key Cryptography: Cryptanalysis
- Chao Niu, Muzhou Li

, Meiqin Wang, Qingju Wang, Siu-Ming Yiu:
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. 223-245 - Ling Sun, Wei Wang, Meiqin Wang:

Improved Attacks on GIFT-64. 246-265 - Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme

:
A Simpler Model for Recovering Superpoly on Trivium. 266-285 - Alex Biryukov

, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov, Giuseppe Vitto:
Automated Truncation of Differential Trails and Trail Clustering in ARX. 286-307
Quantum Cryptanalysis
- André Schrottenloher:

Improved Quantum Algorithms for the k-XOR Problem. 311-331 - Paul Frixons, María Naya-Plasencia, André Schrottenloher:

Quantum Boomerang Attacks and Some Applications. 332-352
Post-quantum Cryptography
- Ward Beullens:

MAYO: Practical Post-quantum Signatures from Oil-and-Vinegar Maps. 355-376 - Haruhisa Kosuge, Hidema Tanaka:

Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS^{MT}}$. 377-397 - Parhat Abla, Mingsheng Wang:

Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext Size. 398-418 - Pierre Briaud, Jean-Pierre Tillich, Javier A. Verbel:

A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem. 419-438
Isogenies
- Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:

Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF. 441-460 - Edward Eaton, David Jao, Chelsea Komlo, Youcef Mokrani:

Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies. 461-482 - Sabrina Kunzweiler

, Yan Bo Ti
, Charlotte Weitkämper:
Secret Keys in Genus-2 SIDH. 483-507

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














