


default search action
ASIACRYPT 2016: Hanoi, Vietnam
- Jung Hee Cheon, Tsuyoshi Takagi:

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Lecture Notes in Computer Science 10031, 2016, ISBN 978-3-662-53886-9
Asiacrypt 2016 Best Paper
- Ilaria Chillotti

, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds. 3-33
Mathematical Analysis I
- Palash Sarkar, Shashank Singh:

A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm. 37-62 - Steven D. Galbraith

, Christophe Petit
, Barak Shani, Yan Bo Ti
:
On the Security of Supersingular Isogeny Cryptosystems. 63-91
AES and White-Box
- Shay Gueron

, Nicky Mouha:
Simpira v2: A Family of Efficient Permutations Using the AES Round Function. 95-125 - Andrey Bogdanov

, Takanori Isobe, Elmar Tischhauser
:
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness. 126-158 - Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner

, Brice Minaud:
Efficient and Provable White-Box Primitives. 159-188
Hash Function
- Martin R. Albrecht, Lorenzo Grassi

, Christian Rechberger
, Arnab Roy
, Tyge Tiessen
:
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. 191-219 - Dan Boneh, Henry Corrigan-Gibbs, Stuart E. Schechter:

Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks. 220-248 - Jian Guo

, Meicheng Liu, Ling Song:
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak. 249-274
Randomness
- Benjamin Fuller

, Leonid Reyzin, Adam D. Smith:
When Are Fuzzy Extractors Possible? 277-306 - Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:

More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22. 307-329
Authenticated Encryption
- Raphael Bost, Olivier Sanders:

Trick or Tweak: On the (In)security of OTR's Tweaks. 333-353 - Aslí Bay, Oguzhan Ersoy, Ferhat Karakoç:

Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm. 354-368 - Christoph Dobraunig

, Maria Eichlseder
, Thomas Korak, Victor Lomné, Florian Mendel
:
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. 369-395 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:

Authenticated Encryption with Variable Stretch. 396-425
Block Cipher I
- Thomas Shrimpton, R. Seth Terashima:

Salvaging Weak Security Bounds for Blockcipher-Based Constructions. 429-454 - Lei Wang, Jian Guo

, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. 455-483 - Daniel Dinu, Léo Perrin, Aleksei Udovenko

, Vesselin Velichkov, Johann Großschädl, Alex Biryukov
:
Design Strategies for ARX with Provable Bounds: Sparx and LAX. 484-513
SCA and Leakage Resilience I
- Amir Moradi

, Tobias Schneider:
Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori -. 517-547 - Daniel P. Martin

, Luke Mather, Elisabeth Oswald
, Martijn Stam:
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations. 548-572 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul

, François-Xavier Standaert
, Yannick Teglia:
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. 573-601 - Marcel Medwed, François-Xavier Standaert

, Ventzislav Nikov, Martin Feldhofer:
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF. 602-623
Block Cipher II
- Ivica Nikolic, Yu Sasaki:

A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. 627-647 - Zejun Xiang

, Wentao Zhang, Zhenzhen Bao
, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. 648-678 - Sarah Miracle, Scott Yilek:

Reverse Cycle Walking and Its Applications. 679-700
Mathematical Analysis II
- Sonia Bogos, Serge Vaudenay:

Optimization of \mathsf LPN Solving Algorithms. 703-728 - Paz Morillo, Carla Ràfols

, Jorge Luis Villar
:
The Kernel Matrix Diffie-Hellman Assumption. 729-758 - Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr:

Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials. 759-788 - Qian Guo

, Thomas Johansson
, Paul Stankovski
:
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors. 789-815
SCA and Leakage Resilience II
- Cong Chen, Mohammad Farmani

, Thomas Eisenbarth
:
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not. 819-843 - Rongmao Chen, Yi Mu, Guomin Yang

, Willy Susilo
, Fuchun Guo
, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. 844-876 - Antonio Faonio

, Daniele Venturi:
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience. 877-907 - Eiichiro Fujisaki, Keita Xagawa

:
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions. 908-938

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














