default search action
27th ASIACRYPT 2021: Singapore - Part IV
- Mehdi Tibouchi, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV. Lecture Notes in Computer Science 13093, Springer 2021, ISBN 978-3-030-92067-8
Lattice Cryptanalysis
- Léo Ducas, Wessel P. J. van Woerden:
NTRU Fatigue: How Stretched is Overstretched? 3-32 - Qian Guo, Thomas Johansson:
Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS. 33-62 - André Chailloux, Johanna Loyer:
Lattice Sieving via Quantum Random Walks. 63-91 - Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. 92-121
Post-Quantum Cryptography
- Kelong Cong, Daniele Cozzo, Varun Maram, Nigel P. Smart:
Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption. 125-155 - Jing Pan, Xiaofeng Chen, Fangguo Zhang, Willy Susilo:
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy. 156-186 - Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. 187-217 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Maxime Plançon, Gregor Seiler:
Shorter Lattice-Based Group Signatures via "Almost Free" Encryption and Other Optimizations. 218-248 - Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski:
Séta: Supersingular Encryption from Torsion Attacks. 249-278 - Tako Boris Fouotsa, Christophe Petit:
SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH. 279-307
Advanced Encryption and Signatures
- Rishab Goyal, Jiahui Liu, Brent Waters:
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. 311-341 - Elie Bouscatié, Guilhem Castagnos, Olivier Sanders:
Public Key Encryption with Flexible Pattern Matching. 342-370 - Rishab Goyal, Ridwan Syed, Brent Waters:
Bounded Collusion ABE for TMs from IBE. 371-402 - Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:
Digital Signatures with Memory-Tight Security in the Multi-challenge Setting. 403-433 - Pratish Datta, Tapas Pal:
(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin. 434-467 - Jonathan Katz, Julian Loss, Michael Rosenberg:
Boosting the Security of Blind Signature Schemes. 468-492
Zero-Knowledge Proofs, Threshold and Multi-Signatures
- David Heath, Vladimir Kolesnikov:
PrORAM - Fast P(logn) Authenticated Shares ZK ORAM. 495-525 - Thomas Attema, Ronald Cramer, Matthieu Rambaud:
Compressed $\varSigma $-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures. 526-556 - Yi Deng, Shunli Ma, Xinxuan Zhang, Hailong Wang, Xuyang Song, Xiang Xie:
Promise $\varSigma $-Protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. 557-586 - Balthazar Bauer, Georg Fuchsbauer, Antoine Plouviez:
The One-More Discrete Logarithm Assumption in the Generic Group Model. 587-617 - Prastudy Fauzi, Helger Lipmaa, Janno Siim, Michal Zajac, Arne Tobias Ødegaard:
Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge. 618-649 - Mihir Bellare, Wei Dai:
Chain Reductions for Multi-signatures and the HBMS Scheme. 650-678
Authenticated Key Exchange
- Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. 681-710 - Michel Abdalla, Björn Haase, Julia Hesse:
Security Analysis of CPace. 711-741 - Yuting Xiao, Rui Zhang, Hui Ma:
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols. 742-772
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.