


default search action
ASIACRYPT 2017: Hong Kong, China
- Tsuyoshi Takagi, Thomas Peyrin:

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10624, Springer 2017, ISBN 978-3-319-70693-1
Asiacrypt 2017 Best Paper
- Steven D. Galbraith

, Christophe Petit
, Javier Silva:
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. 3-33
Post-Quantum Cryptography
- Kyung-Ah Shim, Cheol-Min Park, Namhun Koo

:
An Existential Unforgeable Signature Scheme Based on Multivariate Quadratic Equations. 37-64 - Dominique Unruh:

Post-quantum Security of Fiat-Shamir. 65-95
Symmetric Key Cryptanalysis
- Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:

Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. 99-127 - Ling Sun, Wei Wang, Meiqin Wang:

Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property. 128-157 - Fukang Liu, Florian Mendel

, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. 158-186 - Andrey Bogdanov

, Philip S. Vejre:
Linear Cryptanalysis of DES with Asymmetries. 187-216 - Sondre Rønjom, Navid Ghaedi Bardeh

, Tor Helleseth:
Yoyo Tricks with AES. 217-243 - Takanori Isobe, Kyoji Shibutani:

New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers. 244-263
Lattices
- Martin R. Albrecht, Amit Deo:

Large Modulus Ring-LWE ≥ Module-LWE. 267-296 - Martin R. Albrecht, Florian Göpfert, Fernando Virdia

, Thomas Wunderer:
Revisiting the Expected Cost of Solving uSVP and Applications to LWE. 297-322 - Qian Guo

, Thomas Johansson
, Erik Mårtensson
, Paul Stankovski:
Coded-BKW with Sieving. 323-346 - Thomas Prest

:
Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence. 347-374
Homomorphic Encryptions
- Ilaria Chillotti

, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE. 377-408 - Jung Hee Cheon, Andrey Kim, Miran Kim

, Yong Soo Song
:
Homomorphic Encryption for Arithmetic of Approximate Numbers. 409-437 - Gorjan Alagic, Yfke Dulek

, Christian Schaffner
, Florian Speelman
:
Quantum Fully Homomorphic Encryption with Verification. 438-467
Access Control
- Sam Kim, David J. Wu:

Access Control Encryption for General Policies from Standard Assumptions. 471-501 - Christian Badertscher

, Christian Matt
, Ueli Maurer:
Strengthening Access Control Encryption. 502-532 - Benoît Libert, San Ling

, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions. 533-563
Oblivious Protocols
- T.-H. Hubert Chan, Kai-Min Chung

, Elaine Shi:
On the Depth of Oblivious Parallel RAM. 567-597 - Carmit Hazay, Peter Scholl

, Eduardo Soria-Vazquez
:
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer. 598-628 - Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges:

Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. 629-659 - T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi:

Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. 660-690
Side Channel Analysis
- Guy Barwell, Daniel P. Martin

, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. 693-723 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert

:
Consolidating Inner Product Masking. 724-754 - Maik Ender

, Samaneh Ghandali, Amir Moradi
, Christof Paar:
The First Thorough Side-Channel Hardware Trojan. 755-780 - Sebastian Faust, Clara Paglialonga, Tobias Schneider:

Amortizing Randomness Complexity in Private Circuits. 781-810

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














