default search action
CT-RSA 2023: San Francisco, CA, USA
- Mike Rosulek:
Topics in Cryptology - CT-RSA 2023 - Cryptographers' Track at the RSA Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings. Lecture Notes in Computer Science 13871, Springer 2023, ISBN 978-3-031-30871-0
Cryptographic Implementations
- Nicky Mouha, Christopher Celi:
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms. 3-28 - Anamaria Costache, Lea Nürnberger, Rachel Player:
Optimisations and Tradeoffs for HElib. 29-53
Quantum Cryptanalysis
- Ren Taguchi, Atsushi Takayasu:
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain. 57-83 - Chris Peikert, Jiayu Xu:
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability. 84-112
Advanced Public-Key Encryption
- Marc Joye:
On-Line/Off-Line DCR-Based Homomorphic Encryption and Applications. 115-131 - Marloes Venema:
A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More. 132-159
Tools for Privacy-Enhancing Technologies
- Joakim Brorsson, Bernardo David, Lorenzo Gentile, Elena Pagnin, Paul Stankovski Wagner:
PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials. 163-190 - Ismail Afia, Riham AlTawy:
Unlinkable Policy-Based Sanitizable Signatures. 191-221
Symmetric Cryptanalysis
- Junjie Cheng, Kexin Qiao:
Improved Graph-Based Model for Recovering Superpoly on Trivium. 225-251 - Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Fully Automated Differential-Linear Attacks Against ARX Ciphers. 252-276 - Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe:
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros. 277-304 - Siwei Chen, Mingming Zhu, Zejun Xiang, Runqing Xu, Xiangyong Zeng, Shasha Zhang:
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-Like Ciphers. 305-330
Multiparty Protocols
- Navid Alamati, Hart Montgomery, Sikhar Patranabis:
Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs. 333-359 - Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser:
Putting the Online Phase on a Diet: Covert Security from Short MACs. 360-386
Digital Signatures
- Alexandre Bouez, Kalpana Singh:
One Round Threshold ECDSA Without Roll Call. 389-414 - Andrew Fregly, Joseph Harvey, Burton S. Kaliski Jr., Swapneel Sheth:
Merkle Tree Ladder Mode: Reducing the Size Impact of NIST PQC Signature Algorithms in Practice. 415-441
Fault Attacks and Side Channels
- Guillaume Barbu, Christophe Giraud:
All Shall FA-LLL: Breaking CT-RSA 2022 and CHES 2022 Infective Countermeasures with Lattice-Based Fault Attacks. 445-468 - Luke Beckwith, Abubakr Abdulgadir, Reza Azarderakhsh:
A Flexible Shared Hardware Accelerator for NIST-Recommended Algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA Protection. 469-490
Heuristic Approaches
- Anna Hambitzer, David Gérault, Yun Ju Huang, Najwa Aaraj, Emanuele Bellini:
NNBits: Bit Profiling with a Deep Learning Ensemble Based Distinguisher. 493-523 - Qun Liu, Zheng Zhao, Meiqin Wang:
Improved Heuristics for Low-Latency Implementations of Linear Layers. 524-550
Symmetric-Key Constructions
- Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata:
Authenticated Encryption for Very Short Inputs. 553-572 - Ferdinand Sibleyras, Yosuke Todo:
Keyed Sum of Permutations: A Simpler RP-Based PRF. 573-593 - Mihir Bellare, Laura Shea:
Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks. 594-621 - Sarah Miracle, Scott Yilek:
Targeted Invertible Pseudorandom Functions and Deterministic Format-Transforming Encryption. 622-642
Key Agreement
- Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV. 645-671 - Afonso Arriaga, Petra Sala, Marjan Skrobot:
Wireless-Channel Key Exchange. 672-699
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.