


default search action
30th ASIACRYPT 2024: Kolkata, India - Part VII
- Kai-Min Chung

, Yu Sasaki
:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII. Lecture Notes in Computer Science 15490, Springer 2025, ISBN 978-981-96-0940-6
Information-Theoretic Cryptography
- Keyu Ji, Cong Zhang, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou

, Xin Wang, Kui Ren:
On the Complexity of Cryptographic Groups and Generic Group Models. 3-35 - Hari Krishnan P. Anilkumar, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran:

Randomness in Private Sequential Stateless Protocols. 36-66
Secret Sharing
- Danilo Francati

, Daniele Venturi
:
Evolving Secret Sharing Made Short. 69-99 - Ignacio Cascudo

, Daniele Cozzo
, Emanuele Giunta
:
Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity. 100-128 - Alireza Kavousi, Aydin Abadi, Philipp Jovanovic:

Timed Secret Sharing. 129-164
Security Against Physical Attacks
- Sonia Belaïd

, Jakob Feldtkeller
, Tim Güneysu
, Anna Guinet
, Jan Richter-Brockmann
, Matthieu Rivain
, Pascal Sasdrich
, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. 167-200 - Kaartik Bhushan, Rishab Goyal, Venkata Koppula, Varun Narayanan, Manoj Prabhakaran, Mahesh Sreekumar Rajasree

:
Leakage-Resilient Incompressible Cryptography: Constructions and Barriers. 201-234
Cryptanalysis on Symmetric-Key Schemes
- Yingxin Li, Fukang Liu, Gaoli Wang, Xiaoyang Dong, Siwei Sun:

The First Practical Collision for 31-Step SHA-256. 237-266 - Kodai Taiyama, Kosei Sakamoto, Ryoma Ito

, Kazuma Taka, Takanori Isobe:
Key Collisions on AES and Its Applications. 267-300 - Xueping Yan, Lin Tan, Hong Xu, Wen-Feng Qi:

The Boomerang Chain Distinguishers: New Record for 6-Round AES. 301-329 - Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo:

Multiple-Tweak Differential Attack Against SCARF. 330-360 - Ling Song

, Huimin Liu
, Qianqian Yang
, Yincen Chen
, Lei Hu
, Jian Weng
:
Generic Differential Key Recovery Attacks and Beyond. 361-391 - Tim Beyne

, Michiel Verbauwhede
:
Ultrametric Integral Cryptanalysis. 392-423 - Fukang Liu, Mohammad Mahzoun, Willi Meier:

Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit. 424-456 - Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, Deng Tang:

A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms. 457-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














