default search action
28th ASIACRYPT 2022: Taipei, Taiwan - Part III
- Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13793, Springer 2022, ISBN 978-3-031-22968-8
Practical Cryptography
- Sarah Miracle, Scott Yilek:
New Algorithms and Analyses for Sum-Preserving Encryption. 3-31 - Orel Cosseron, Clément Hoffmann, Pierrick Méaux, François-Xavier Standaert:
Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher. 32-67 - Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen:
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool. 68-88 - Jeroen Pijnenburg, Bertram Poettering:
On Secure Ratcheting with Immediate Decryption. 89-118 - Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler:
Strongly Anonymous Ratcheted Key Exchange. 119-150 - Matteo Campanelli, Bernardo David, Hamidreza Khoshakhlagh, Anders Konring, Jesper Buus Nielsen:
Encryption to the Future - A Paradigm for Sending Secret Messages to Future (Anonymous) Committees. 151-180 - Julia Len, Paul Grubbs, Thomas Ristenpart:
Authenticated Encryption with Key Identification. 181-209 - You Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. 210-240 - Jiamin Cui, Kai Hu, Meiqin Wang, Puwen Wei:
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC. 241-270
Advanced Encryption
- Henri Devillez, Olivier Pereira, Thomas Peters:
Traceable Receipt-Free Encryption. 273-303 - Charanjit S. Jutla, Sikhar Patranabis:
Efficient Searchable Symmetric Encryption for Join Queries. 304-333 - Yi Deng, Xinxuan Zhang:
Knowledge Encryption and Its Applications to Simulatable Protocols with Low Round-Complexity. 334-362 - Jiaxin Pan, Runzhi Zeng:
Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes. 363-393 - Jie Chen, Yu Li, Jinming Wen, Jian Weng:
Identity-Based Matchmaking Encryption from Standard Assumptions. 394-422 - Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption Under Corruptions. 423-453 - Joseph Jaeger, Akshaya Kumar:
Memory-Tight Multi-challenge Security of Public-Key Encryption. 454-484
Zero Knowledge
- Arasu Arun, Joseph Bonneau, Jeremy Clark:
Short-lived Zero-Knowledge Proofs and Signatures. 487-516 - Kang Yang, Xiao Wang:
Non-interactive Zero-Knowledge Proofs to Multiple Verifiers. 517-546 - Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency. 547-580
Quantum Algorithms
- Barbara Jiabao Benedikt, Marc Fischlin, Moritz Huppert:
Nostradamus Goes Quantum. 583-613 - Zhenyu Huang, Siwei Sun:
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. 614-644 - Jian Guo, Guozhen Liu, Ling Song, Yi Tu:
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3. 645-674
Lattice Cryptanalysis
- Olivier Bernard, Andrea Lesavourey, Tuong-Huy Nguyen, Adeline Roux-Langlois:
Log-S-unit Lattices Using Explicit Stickelberger Generators to Solve Approx Ideal-SVP. 677-708 - Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé:
On Module Unique-SVP and NTRU. 709-740 - Hanlin Liu, Yu Yu:
A Non-heuristic Approach to Time-Space Tradeoffs and Optimizations for BKW. 741-770 - Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. 771-799
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.