


default search action
27th SAC 2020: Virtual Event
- Orr Dunkelman
, Michael J. Jacobson Jr.
, Colin O'Flynn
:
Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12804, Springer 2021, ISBN 978-3-030-81651-3
Public-Key Cryptography
- Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments. 3-33 - Chelsea Komlo, Ian Goldberg:
FROST: Flexible Round-Optimized Schnorr Threshold Signatures. 34-65 - Jonathan Takeshita, Dayane Reis
, Ting Gong, Michael T. Niemier, X. Sharon Hu
, Taeho Jung:
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM. 66-89 - Steven D. Galbraith
, Lukas Zobernig
:
Obfuscating Finite Automata. 90-114 - Steven D. Galbraith, Robert Granger
, Simon-Philipp Merz
, Christophe Petit
:
On Index Calculus Algorithms for Subfield Curves. 115-138
Symmetric-Key Analysis
- Lorenzo Grassi
, Gregor Leander
, Christian Rechberger, Cihangir Tezcan
, Friedrich Wiemer
:
Weak-Key Distinguishers for AES. 141-170 - Tingting Cui, Lorenzo Grassi
:
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff. 171-197 - Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding:
Improved (Related-key) Differential Cryptanalysis on GIFT. 198-228 - John Petter Indrøy, Nicolas Costes, Håvard Raddum:
Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath. 229-251 - Sean Murphy, Maura B. Paterson, Christine Swart:
Boolean Ring Cryptographic Equation Solving. 252-272 - Arnab Roy
, Elena Andreeva
, Jan Ferdinand Sauer:
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions. 273-300 - Gal Benmocha, Eli Biham, Stav Perle:
Unintended Features of APIs: Cryptanalysis of Incremental HMAC. 301-325
Quantum Cryptanalysis
- Samuel Jaques, André Schrottenloher:
Low-Gate Quantum Golden Collision Finding. 329-359 - James H. Davenport
, Benjamin Pring:
Improvements to Quantum Search Techniques for Block-Ciphers, with Applications to AES. 360-384
Post-Quantum Constructions
- Ward Beullens:
Not Enough LESS: An Improved Algorithm for Solving Code Equivalence Problems over $\mathbb {F}_q$. 387-403 - Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila
:
Towards Post-Quantum Security for Signal's X3DH Handshake. 404-430 - Péter Kutas
, Christophe Petit
, Javier Silva:
Trapdoor DDH Groups from Pairings and Isogenies. 431-450 - Bor de Kock
, Kristian Gjøsteen
, Mattia Veroni
:
Practical Isogeny-Based Key-Exchange with Optimal Tightness. 451-479
Symmetric-Key Design
- Dusan Bozilov, Maria Eichlseder
, Miroslav Knezevic, Baptiste Lambin, Gregor Leander
, Thorben Moos
, Ventzislav Nikov, Shahram Rasoolzadeh
, Yosuke Todo
, Friedrich Wiemer
:
PRINCEv2 - More Security for (Almost) No Overhead. 483-511 - Elena Andreeva
, Amit Singh Bhati
, Damian Vizár:
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode. 512-534 - Subhadeep Banik
, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. 535-564
Side Channel Attacks
- Aron Gohr, Sven Jacob, Werner Schindler
:
Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations. 567-592 - Yunsi Fei
, Guang Gong, Cheng Gongye
, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
:
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE. 593-614 - Guilherme Perin, Stjepan Picek:
On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis. 615-636
Cryptographic Applications
- Adrián Ranea
, Bart Preneel:
On Self-equivalence Encodings in White-Box Implementations. 639-669 - Ashley Fraser, Elizabeth A. Quaglia
:
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting. 670-697 - Hao Cheng, Johann Großschädl, Jiaqi Tian, Peter B. Rønne
, Peter Y. A. Ryan:
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. 698-719

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.