


Остановите войну!
for scientists:


default search action
ASIACRYPT 2017: Hong Kong, China
- Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10624, Springer 2017, ISBN 978-3-319-70693-1
Asiacrypt 2017 Best Paper
- Steven D. Galbraith
, Christophe Petit
, Javier Silva:
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. 3-33
Post-Quantum Cryptography
- Kyung-Ah Shim, Cheol-Min Park, Namhun Koo
:
An Existential Unforgeable Signature Scheme Based on Multivariate Quadratic Equations. 37-64 - Dominique Unruh:
Post-quantum Security of Fiat-Shamir. 65-95
Symmetric Key Cryptanalysis
- Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. 99-127 - Ling Sun, Wei Wang, Meiqin Wang:
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property. 128-157 - Fukang Liu, Florian Mendel, Gaoli Wang:
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160. 158-186 - Andrey Bogdanov
, Philip S. Vejre:
Linear Cryptanalysis of DES with Asymmetries. 187-216 - Sondre Rønjom, Navid Ghaedi Bardeh
, Tor Helleseth:
Yoyo Tricks with AES. 217-243 - Takanori Isobe, Kyoji Shibutani:
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers. 244-263
Lattices
- Martin R. Albrecht, Amit Deo:
Large Modulus Ring-LWE ≥ Module-LWE. 267-296 - Martin R. Albrecht, Florian Göpfert, Fernando Virdia
, Thomas Wunderer:
Revisiting the Expected Cost of Solving uSVP and Applications to LWE. 297-322 - Qian Guo
, Thomas Johansson, Erik Mårtensson, Paul Stankovski:
Coded-BKW with Sieving. 323-346 - Thomas Prest
:
Sharper Bounds in Lattice-Based Cryptography Using the Rényi Divergence. 347-374
Homomorphic Encryptions
- Ilaria Chillotti
, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE. 377-408 - Jung Hee Cheon, Andrey Kim, Miran Kim
, Yong Soo Song
:
Homomorphic Encryption for Arithmetic of Approximate Numbers. 409-437 - Gorjan Alagic, Yfke Dulek
, Christian Schaffner
, Florian Speelman
:
Quantum Fully Homomorphic Encryption with Verification. 438-467
Access Control
- Sam Kim, David J. Wu:
Access Control Encryption for General Policies from Standard Assumptions. 471-501 - Christian Badertscher
, Christian Matt
, Ueli Maurer:
Strengthening Access Control Encryption. 502-532 - Benoît Libert, San Ling
, Fabrice Mouhartem, Khoa Nguyen
, Huaxiong Wang:
Adaptive Oblivious Transfer with Access Control from Lattice Assumptions. 533-563
Oblivious Protocols
- T.-H. Hubert Chan, Kai-Min Chung
, Elaine Shi:
On the Depth of Oblivious Parallel RAM. 567-597 - Carmit Hazay, Peter Scholl
, Eduardo Soria-Vazquez
:
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer. 598-628 - Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges:
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. 629-659 - T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi:
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. 660-690
Side Channel Analysis
- Guy Barwell, Daniel P. Martin
, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. 693-723 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
:
Consolidating Inner Product Masking. 724-754 - Maik Ender
, Samaneh Ghandali, Amir Moradi
, Christof Paar:
The First Thorough Side-Channel Hardware Trojan. 755-780 - Sebastian Faust, Clara Paglialonga, Tobias Schneider:
Amortizing Randomness Complexity in Private Circuits. 781-810

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.