


default search action
CT-RSA 2025: San Francisco, CA, USA
- Arpita Patra

:
Topics in Cryptology - CT-RSA 2025 - Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025, Proceedings. Lecture Notes in Computer Science 15598, Springer 2025, ISBN 978-3-031-88660-7
Cryptanalysis
- Emanuele Bellini

, David Gérault
, Juan Grados
, Thomas Peyrin
:
The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs. 3-26 - Chengcheng Chang, Meiqin Wang, Wei Wang, Kai Hu:

Quasidifferential Saves Infeasible Differential - Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT. 27-50 - Qingliang Hou, Kuntong Li, Guoyan Zhang, Yanzhao Shen, Qidi You, Xiaoyang Dong:

Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer. 51-74 - Akiko Inoue

, Tetsu Iwata
, Kazuhiko Minematsu
:
Comprehensive Robustness Analysis of GCM, CCM, and OCB3. 75-98 - Xiaoyu Wang, Zejun Xiang, Shasha Zhang, Siwei Chen, Xiangyong Zeng:

Quantum Chosen-Ciphertext Attacks Based on Simon's Algorithm Against Unified Structures. 99-122 - Shuo Peng, Kai Hu, Jiahui He, Meiqin Wang:

Improved Key Recovery Attacks of Ascon. 123-146
Public-Key Cryptography
- Zhipeng Wang

, Orestis Alpos, Alireza Kavousi, Harry W. H. Wong, Sze Yiu Chau
, Duc Viet Le, Christian Cachin:
DSKE: Digital Signatures with Key Extraction. 149-173 - Benoît Libert:

Simplified Adaptively Secure Threshold BLS Signatures. 174-197 - Sebastian Faust

, Carmit Hazay
, David Kretzler
, Leandro Rometsch
, Benjamin Schlosser
:
Non-interactive Threshold BBS+ from Pseudorandom Correlations. 198-222 - Kyoichi Asano

, Yohei Watanabe
:
Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction. 223-246
Hardware and Software Implementations
- Quinten Norga

, Suparna Kundu
, Uttam Kumar Ojha, Anindya Ganguly, Angshuman Karmakar
, Ingrid Verbauwhede
:
Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate-and Code-Based PQC. 249-272 - Martin R. Albrecht, Nicolas Gama

, James Howe
, Anand Kumar Narayanan
:
Post-quantum Online/Offline Signatures. 273-300
Symmetric-Key Cryptography
- István András Seres, Péter Burcsi, Péter Kutas:

How (Not) to Hash into Class Groups of Imaginary Quadratic Fields? 303-326 - Jiayi Ai, Chun Guo:

Sequential Indifferentiability of 7-Round Misty Structures. 327-348
Multiparty Computation and Zero-Knowledge
- Takeshi Nakai

:
Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors. 351-374 - Michele Ciampi, Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas:

Universal Adaptor Signatures from Blackbox Multi-party Computation. 375-398
White-box Crypto
- Zexuan Chen, Jiqiang Lu:

Affine Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher. 401-425

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














