default search action
ASIACRYPT 2016: Hanoi, Vietnam
- Jung Hee Cheon, Tsuyoshi Takagi:
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Lecture Notes in Computer Science 10031, 2016, ISBN 978-3-662-53886-9
Asiacrypt 2016 Best Paper
- Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, Malika Izabachène:
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds. 3-33
Mathematical Analysis I
- Palash Sarkar, Shashank Singh:
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm. 37-62 - Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti:
On the Security of Supersingular Isogeny Cryptosystems. 63-91
AES and White-Box
- Shay Gueron, Nicky Mouha:
Simpira v2: A Family of Efficient Permutations Using the AES Round Function. 95-125 - Andrey Bogdanov, Takanori Isobe, Elmar Tischhauser:
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness. 126-158 - Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud:
Efficient and Provable White-Box Primitives. 159-188
Hash Function
- Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen:
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. 191-219 - Dan Boneh, Henry Corrigan-Gibbs, Stuart E. Schechter:
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks. 220-248 - Jian Guo, Meicheng Liu, Ling Song:
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak. 249-274
Randomness
- Benjamin Fuller, Leonid Reyzin, Adam D. Smith:
When Are Fuzzy Extractors Possible? 277-306 - Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:
More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22. 307-329
Authenticated Encryption
- Raphael Bost, Olivier Sanders:
Trick or Tweak: On the (In)security of OTR's Tweaks. 333-353 - Aslí Bay, Oguzhan Ersoy, Ferhat Karakoç:
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm. 354-368 - Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes. 369-395 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Authenticated Encryption with Variable Stretch. 396-425
Block Cipher I
- Thomas Shrimpton, R. Seth Terashima:
Salvaging Weak Security Bounds for Blockcipher-Based Constructions. 429-454 - Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. 455-483 - Daniel Dinu, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Johann Großschädl, Alex Biryukov:
Design Strategies for ARX with Provable Bounds: Sparx and LAX. 484-513
SCA and Leakage Resilience I
- Amir Moradi, Tobias Schneider:
Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori -. 517-547 - Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam:
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations. 548-572 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert, Yannick Teglia:
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. 573-601 - Marcel Medwed, François-Xavier Standaert, Ventzislav Nikov, Martin Feldhofer:
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF. 602-623
Block Cipher II
- Ivica Nikolic, Yu Sasaki:
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. 627-647 - Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. 648-678 - Sarah Miracle, Scott Yilek:
Reverse Cycle Walking and Its Applications. 679-700
Mathematical Analysis II
- Sonia Bogos, Serge Vaudenay:
Optimization of \mathsf LPN Solving Algorithms. 703-728 - Paz Morillo, Carla Ràfols, Jorge Luis Villar:
The Kernel Matrix Diffie-Hellman Assumption. 729-758 - Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr:
Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials. 759-788 - Qian Guo, Thomas Johansson, Paul Stankovski:
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors. 789-815
SCA and Leakage Resilience II
- Cong Chen, Mohammad Farmani, Thomas Eisenbarth:
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not. 819-843 - Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. 844-876 - Antonio Faonio, Daniele Venturi:
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience. 877-907 - Eiichiro Fujisaki, Keita Xagawa:
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions. 908-938
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.