Stop the war!
Остановите войну!
for scientists:
default search action
28th ACISP 2023: Brisbane, QLD, Australia
- Leonie Simpson, Mir Ali Rezazadeh Baee:
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings. Lecture Notes in Computer Science 13915, Springer 2023, ISBN 978-3-031-35485-4
Symmetric-Key Cryptography
- Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song:
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures. 3-24 - Zeyu Xu, Shiyao Chen, Meiqin Wang, Puwen Wei:
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly $\mathbb {F}_p$-Based Ciphers. 25-52 - Cheng Che, Tian Tian:
A New Correlation Cube Attack Based on Division Property. 53-71 - Xiaofeng Xie, Tian Tian:
The Triangle Differential Cryptanalysis. 72-88 - Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong:
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. 89-108 - Yongxia Mao, Wenling Wu, Yafei Zheng, Lei Zhang:
Related-Cipher Attacks: Applications to Ballet and ANT. 109-123 - Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. 124-156 - Francesco Berti:
Reconsidering Generic Composition: The Modes A10, A11 and A12 are Insecure. 157-176 - Nicky Mouha:
Exploring Formal Methods for Cryptographic Hash Function Implementations. 177-195
Public-Key Cryptography
- Jia-Chng Loh, Fuchun Guo, Willy Susilo, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. 199-219 - Ren Ishibashi, Kazuki Yoneyama:
Compact Password Authenticated Key Exchange from Group Actions. 220-247 - Peiying Xu, Li-Ping Wang:
Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE. 248-269 - Malika Izabachène, Lucas Prabel, Adeline Roux-Langlois:
Identity-Based Encryption from Lattices Using Approximate Trapdoors. 270-290 - Masahito Ishizaka, Kazuhide Fukushima:
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications. 291-319 - Jingjing Fan, Xingye Lu, Man Ho Au:
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors. 320-340
Post-Quantum Cryptography
- Quan Yuan, Mehdi Tibouchi, Masayuki Abe:
Quantum-Access Security of Hash-Based Signature Schemes. 343-380 - Ernest Foo, Qinyi Li:
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model. 381-402 - Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security. 403-430 - Huiqin Chen, Yongqiang Li, Parhat Abla, Zhiran Li, Lin Jiao, Mingsheng Wang:
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers. 431-451 - Naoto Kimura, Atsushi Takayasu, Tsuyoshi Takagi:
Memory-Efficient Quantum Information Set Decoding Algorithm. 452-468
Cryptographic Protocols
- Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen:
CSI-SharK: CSI-FiSh with Sharing-friendly Keys. 471-502 - Tsz Hon Yuen, Shimin Pan, Sheng Huang, Xiaoting Zhang:
Practical Verifiable Random Function with RKA Security. 503-522 - Sayantan Mukherjee:
Statistically Consistent Broadcast Authenticated Encryption with Keyword Search - Adaptive Security from Standard Assumptions. 523-552 - Colin Boyd, Bor de Kock, Lise Millerjord:
Modular Design of KEM-Based Authenticated Key Exchange. 553-579 - Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, Bart Preneel:
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies. 580-605
System Security
- Maliha Ismail, Yan Lin, DongGyun Han, Debin Gao:
BinAlign: Alignment Padding Based Compiler Provenance Recovery. 609-629 - Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi:
Encrypted Network Traffic Classification with Higher Order Graph Neural Network. 630-650
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.