default search action
27th SAC 2020: Virtual Event
- Orr Dunkelman, Michael J. Jacobson Jr., Colin O'Flynn:
Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12804, Springer 2021, ISBN 978-3-030-81651-3
Public-Key Cryptography
- Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments. 3-33 - Chelsea Komlo, Ian Goldberg:
FROST: Flexible Round-Optimized Schnorr Threshold Signatures. 34-65 - Jonathan Takeshita, Dayane Reis, Ting Gong, Michael T. Niemier, X. Sharon Hu, Taeho Jung:
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM. 66-89 - Steven D. Galbraith, Lukas Zobernig:
Obfuscating Finite Automata. 90-114 - Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit:
On Index Calculus Algorithms for Subfield Curves. 115-138
Symmetric-Key Analysis
- Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer:
Weak-Key Distinguishers for AES. 141-170 - Tingting Cui, Lorenzo Grassi:
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff. 171-197 - Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding:
Improved (Related-key) Differential Cryptanalysis on GIFT. 198-228 - John Petter Indrøy, Nicolas Costes, Håvard Raddum:
Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath. 229-251 - Sean Murphy, Maura B. Paterson, Christine Swart:
Boolean Ring Cryptographic Equation Solving. 252-272 - Arnab Roy, Elena Andreeva, Jan Ferdinand Sauer:
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions. 273-300 - Gal Benmocha, Eli Biham, Stav Perle:
Unintended Features of APIs: Cryptanalysis of Incremental HMAC. 301-325
Quantum Cryptanalysis
- Samuel Jaques, André Schrottenloher:
Low-Gate Quantum Golden Collision Finding. 329-359 - James H. Davenport, Benjamin Pring:
Improvements to Quantum Search Techniques for Block-Ciphers, with Applications to AES. 360-384
Post-Quantum Constructions
- Ward Beullens:
Not Enough LESS: An Improved Algorithm for Solving Code Equivalence Problems over $\mathbb {F}_q$. 387-403 - Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila:
Towards Post-Quantum Security for Signal's X3DH Handshake. 404-430 - Péter Kutas, Christophe Petit, Javier Silva:
Trapdoor DDH Groups from Pairings and Isogenies. 431-450 - Bor de Kock, Kristian Gjøsteen, Mattia Veroni:
Practical Isogeny-Based Key-Exchange with Optimal Tightness. 451-479
Symmetric-Key Design
- Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. 483-511 - Elena Andreeva, Amit Singh Bhati, Damian Vizár:
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode. 512-534 - Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. 535-564
Side Channel Attacks
- Aron Gohr, Sven Jacob, Werner Schindler:
Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations. 567-592 - Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE. 593-614 - Guilherme Perin, Stjepan Picek:
On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis. 615-636
Cryptographic Applications
- Adrián Ranea, Bart Preneel:
On Self-equivalence Encodings in White-Box Implementations. 639-669 - Ashley Fraser, Elizabeth A. Quaglia:
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting. 670-697 - Hao Cheng, Johann Großschädl, Jiaqi Tian, Peter B. Rønne, Peter Y. A. Ryan:
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. 698-719
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.