default search action
23rd INDOCRYPT 2022: Kolkata, India
- Takanori Isobe, Santanu Sarkar:
Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings. Lecture Notes in Computer Science 13774, Springer 2022, ISBN 978-3-031-22911-4
Foundation
- Behzad Abdolmaleki, Daniel Slamanig:
CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments. 3-25 - Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. 26-51 - Wei Dai, Tatsuaki Okamoto, Go Yamamoto:
Stronger Security and Generic Constructions for Adaptor Signatures. 52-77 - Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen:
Entropic Hardness of Module-LWE from Module-NTRU. 78-99
Symmetric Key Cryptology
- Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud'homme:
New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks. 103-124 - Shanjie Xu, Qi Da, Chun Guo:
Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules). 125-145 - Nilanjan Datta, Avijit Dutta, Shibam Ghosh:
INT-RUP Security of SAEB and TinyJAMBU. 146-170 - Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi:
Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches. 171-194 - Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi:
sf ISAP+: sf ISAP with Fast Authentication. 195-219
Protocols and Implementation
- Ananya Appan, Anirudh Chandramouli, Ashish Choudhury:
Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries. 223-248 - Aisling Connolly, Jérôme Deschamps, Pascal Lafourcade, Octavio Perez-Kempner:
Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric. 249-271 - Hanno Becker, Matthias J. Kannwischer:
Hybrid Scalar/Vector Implementations of Keccak and SPHINCS+ on AArch64. 272-293 - Emanuele Bellini, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger:
Parallel Isogeny Path Finding with Limited Memory. 294-316
Cryptanalysis
- Subhabrata Samajder, Palash Sarkar:
Distinguishing Error of Nonlinear Invariant Attacks. 319-335 - Daniël Kuijsters, Denise Verbakel, Joan Daemen:
Weak Subtweakeys in SKINNY. 336-348 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Full Round Zero-Sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-Permutation in the Known-Key Setting. 349-372 - Emanuele Bellini, David Gérault, Matteo Protopapa, Matteo Rossi:
Monte Carlo Tree Search for Automatic Differential Characteristics Search: Application to SPECK. 373-397 - Debasmita Chakraborty:
Finding Three-Subset Division Property for Ciphers with Complex Linear Layers. 398-421 - Chengcheng Chang, Meiqin Wang, Ling Sun, Wei Wang:
Improved Truncated Differential Distinguishers of AES with Concrete S-Box. 422-445
Boolean Functions
- Subhamoy Maitra, Bimal Mandal, Manmatha Roy:
Modifying Bent Functions to Obtain the Balanced Ones with High Nonlinearity. 449-470 - Bikshan Chatterjee, Rachit Parikh, Arpita Maitra, Subhamoy Maitra, Animesh Roy:
Revisiting BoolTest - On Randomness Testing Using Boolean Functions. 471-491 - Agnese Gini, Pierrick Méaux:
Weightwise Almost Perfectly Balanced Functions: Secondary Constructions for All n and Better Weightwise Nonlinearities. 492-514
Quantum Cryptography and Cryptanalysis
- Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay:
Improved Quantum Analysis of SPECK and LowMC. 517-540 - Jyotirmoy Basak, Kaushik Chakraborty, Arpita Maitra, Subhamoy Maitra:
A Proposal for Device Independent Probabilistic Quantum Oblivious Transfer. 541-565 - Tingting Guo, Peng Wang, Lei Hu, Dingfeng Ye:
Quantum Attacks on PRFs Based on Public Random Permutations. 566-591 - Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu:
On Security Notions for Encryption in a Quantum World. 592-613
Post Quantum Cryptography
- Daniel J. Bernstein:
A One-Time Single-bit Fault Leaks All Previous NTRU-HRSS Session Keys to a Chosen-Ciphertext Attack. 617-643 - Zijian Song, Jun Xu, Zhiwei Li, Dingfeng Ye:
An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015. 644-657 - Wouter Castryck, Natan Vander Meeren:
Two Remarks on the Vectorization Problem. 658-678 - Sanjit Chatterjee, Tapas Pandit:
Efficient IBS from a New Assumption in the Multivariate-Quadratic Setting. 679-696 - Sanjit Chatterjee, M. Prem Laxman Das, Tapas Pandit:
Revisiting the Security of Salted UOV Signature. 697-719
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.