default search action
40th EUROCRYPT 2021: Zagreb, Croatia - Part I
- Anne Canteaut, François-Xavier Standaert:
Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12696, Springer 2021, ISBN 978-3-030-77869-9
Best Papers
- Abhishek Jain, Zhengzhong Jin:
Non-interactive Zero Knowledge from Sub-exponential DDH. 3-32 - Fabrice Benhamouda, Tancrède Lepoint, Julian Loss, Michele Orrù, Mariana Raykova:
On the (in)security of ROS. 33-53 - Gaëtan Leurent, Clara Pernot:
New Representations of the AES Key Schedule. 54-84
Public-Key Cryptography
- Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard. 87-116 - Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge:
Tightly-Secure Authenticated Key Exchange, Revisited. 117-146 - Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Aggregatable Distributed Key Generation. 147-176 - Pratish Datta, Ilan Komargodski, Brent Waters:
Decentralized Multi-authority ABE for DNFs from LWE. 177-209
Isogenies
- Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem:
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer. 213-241 - Péter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkämper:
One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols. 242-271 - Craig Costello, Michael Meyer, Michael Naehrig:
Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott Problem. 272-301 - Jeffrey Burdges, Luca De Feo:
Delay Encryption. 302-326
Post-Quantum Cryptography
- Jintai Ding, Joshua Deaton, Vishakha, Bo-Yin Yang:
The Nested Subset Differential Attack - A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes. 329-347 - Ward Beullens:
Improved Cryptanalysis of UOV and Rainbow. 348-373 - Itai Dinur:
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2). 374-403 - Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions. 404-434 - Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Post-Quantum Multi-Party Computation. 435-464
Lattices
- Divesh Aggarwal, Zeyong Li, Noah Stephens-Davidowitz:
A 2n/2-Time Algorithm for $\sqrt{n}$-SVP and $\sqrt{n}$-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP. 467-497 - Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. 498-527 - Martin R. Albrecht, Nadia Heninger:
On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem. 528-558 - Yanbin Pan, Jun Xu, Nick Wadleigh, Qi Cheng:
On the Ideal Shortest Vector Problem over Random Rational Primes. 559-583
Homomorphic Encryption
- Jean-Philippe Bossuat, Christian Mouchet, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux:
Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-sparse Keys. 587-617 - Joon-Woo Lee, Eunsang Lee, Yongwoo Lee, Young-Sik Kim, Jong-Seon No:
High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function. 618-647 - Baiyu Li, Daniele Micciancio:
On the Security of Homomorphic Encryption on Approximate Numbers. 648-677 - Claudio Orlandi, Peter Scholl, Sophia Yakoubov:
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT. 678-708
Symmetric Cryptanalysis
- Murilo Coutinho, Tertuliano C. Souza Neto:
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha. 711-740 - Yunwen Liu, Siwei Sun, Chao Li:
Rotational Cryptanalysis from a Differential-Linear Perspective - Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette. 741-770 - Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. 771-804 - Adrien Benamira, David Gérault, Thomas Peyrin, Quan Quan Tan:
A Deeper Look at Machine Learning-Based Cryptanalysis. 805-835
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.