


default search action
ASIACRYPT 2015: Auckland, New Zealand
- Tetsu Iwata, Jung Hee Cheon:
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9453, Springer 2015, ISBN 978-3-662-48799-0
Attacks on ASASA
- Brice Minaud, Patrick Derbez, Pierre-Alain Fouque
, Pierre Karpman:
Key-Recovery Attacks on ASASA. 3-27
Number Field Sieve
- Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung:
The Tower Number Field Sieve. 31-55
Hashes and MACs
- Bart Mennink, Bart Preneel
:
On the Impact of Known-Key Attacks on Hash Functions. 59-84 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:
Generic Security of NMAC and HMAC with Input Whitening. 85-109
Symmetric Encryption
- Mridul Nandi
:
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes. 113-133 - Benoît Cogliati, Yannick Seurin:
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing. 134-158 - Ritam Bhaumik, Mridul Nandi
:
An Inverse-Free Single-Keyed Tweakable Enciphering Scheme. 159-180
Foundations
- Carmit Hazay
, Muthuramakrishnan Venkitasubramaniam:
On Black-Box Complexity of Universally Composable Security in the CRS Model. 183-209 - Vladimir Kolesnikov, Alex J. Malozemoff:
Public Verifiability in the Covert Model (Almost) for Free. 210-235 - Elette Boyle, Rafael Pass
:
Limits of Extractability Assumptions with Distributional Auxiliary Input. 236-261 - Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
:
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions. 262-288
Side-Channel Attacks
- Vincent Grosso, François-Xavier Standaert
:
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? 291-312 - Daniel P. Martin
, Jonathan F. O'Connell, Elisabeth Oswald
, Martijn Stam:
Counting Keys in Parallel After a Side Channel Attack. 313-337 - Liwei Zhang, A. Adam Ding
, Yunsi Fei
, Pei Luo
:
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks. 338-360 - Andrey Bogdanov, Takanori Isobe:
How Secure is AES Under Leakage. 361-385
Design of Block Ciphers
- Chun Guo, Dongdai Lin:
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers. 389-410 - Subhadeep Banik
, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni
:
Midori: A Block Cipher for Low Energy. 411-436 - Stefano Tessaro:
Optimally Secure Block Ciphers from Ideal Primitives. 437-462
Authenticated Encryption
- Bart Mennink, Reza Reyhanitabar, Damian Vizár:
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption. 465-489 - Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel
:
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. 490-509 - Thomas Fuhr, Gaëtan Leurent
, Valentin Suder:
Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble. 510-532
Symmetric Analysis
- Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
:
Optimized Interpolation Attacks on LowMC. 535-560 - Bin Zhang, Xinxin Gong:
Another Tradeoff Attack on Sprout-Like Stream Ciphers. 561-585 - Max Fillinger, Marc Stevens
:
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware. 586-611 - Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel
:
Analysis of SHA-512/224 and SHA-512/256. 612-630
Cryptanalysis
- Alex Biryukov
, Dmitry Khovratovich:
Tradeoff Cryptanalysis of Memory-Hard Functions. 633-657 - Sanjit Chatterjee, M. Prem Laxman Das
:
Property Preserving Symmetric Encryption Revisited. 658-682 - Ivica Nikolic, Yu Sasaki:
Refinements of the k-tree Algorithm for the Generalized Birthday Problem. 683-703 - Sonia Bogos, Serge Vaudenay:
How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition. 704-731
Privacy and Lattices
- Cynthia Dwork, Moni Naor, Omer Reingold, Guy N. Rothblum:
Pure Differential Privacy for Rectangle Queries via Private Partitions. 735-751 - Martin R. Albrecht, Catalin Cocis, Fabien Laguillaumie, Adeline Langlois
:
Implementing Candidate Graded Encoding Schemes from Ideal Lattices. 752-775 - Allison Bishop, Susan Hohenberger, Brent Waters:
New Circular Security Counterexamples from Decision Linear and Learning with Errors. 776-800

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.