Stop the war!
Остановите войну!
for scientists:
default search action
29th ASIACRYPT 2023: Guangzhou, China - Part III
- Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14440, Springer 2023, ISBN 978-981-99-8726-9
Quantum Cryptanalysis
- Xiaoyang Dong, Shun Li, Phuong Pham, Guoyan Zhang:
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory. 3-33 - Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha:
On Quantum Secure Compressing Pseudorandom Functions. 34-66 - Qun Liu, Bart Preneel, Zheng Zhao, Meiqin Wang:
Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits. 67-98 - Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit:
Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH. 99-130 - Shi Bai, Iggy van Hoof, Floyd Johnson, Tanja Lange, Tran Ngo:
Concrete Analysis of Quantum Lattice Enumeration. 131-166
Symmetric-Key Cryptanalysis
- Yaobin Shen, François-Xavier Standaert, Lei Wang:
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. 169-189 - Jianhua Wang, Lu Qin, Baofeng Wu:
Correlation Cube Attack Revisited - Improved Cube Search and Superpoly Recovery Techniques. 190-222 - Yi Chen, Zhenzhen Bao, Hongbo Yu:
Differential-Linear Approximation Semi-unconstrained Searching and Partition Tree: Application to LEA and Speck. 223-255 - Henri Gilbert, Rachelle Heim Boissier, Jérémy Jean, Jean-René Reinhard:
Cryptanalysis of Elisabeth-4. 256-284 - Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui:
Algebraic Attacks on Round-Reduced Rain and Full AIM-III. 285-310 - Akinori Hosoyamada:
Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers. 311-345 - Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Exact Security Analysis of ASCON. 346-369 - Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. 370-404 - Kai Hu, Thomas Peyrin, Quan Quan Tan, Trevor Yap:
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective. 405-435 - Zhenzhen Bao, Jinyu Lu, Yiran Yao, Liu Zhang:
More Insight on Deep Learning-Aided Cryptanalysis. 436-467
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.