default search action
28th ASIACRYPT 2022: Taipei, Taiwan - Part I
- Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13791, Springer 2022, ISBN 978-3-031-22962-6
Award Papers
- Hart Montgomery, Mark Zhandry:
Full Quantum Equivalence of Group Action DLog and CDH, and More. 3-32 - Navid Alamati, Sikhar Patranabis:
Cryptographic Primitives with Hinting Property. 33-62 - Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Mehdi Tibouchi:
SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves - Faster Indifferentiable Hashing to Elliptic Curves. 63-92
Functional and Witness Encryption
- Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Fine-Grained Access Control. 95-125 - Pratish Datta, Tapas Pal, Katsuyuki Takashima:
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH. 126-159 - Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, Luowen Qian:
Collusion-Resistant Functional Encryption for RAMs. 160-194 - Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Witness Encryption and Null-IO from Evasive LWE. 195-221
Symmetric Key Cryptanalysis
- Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. 225-255 - Murilo Coutinho, Iago Passos, Juan del Carmen Grados Vasquez, Fábio Lúcio Lopes de Mendonça, Rafael Timteo de Sousa, Fábio Borges:
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró. 256-286 - Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. 287-317 - Zhenzhen Bao, Jian Guo, Meicheng Liu, Li Ma, Yi Tu:
Enhancing Differential-Neural Cryptanalysis. 318-347 - Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
Towards Tight Security Bounds for OMAC, XCBC and TMAC. 348-378 - Yu Long Chen:
A Modular Approach to the Security Analysis of Two-Permutation Constructions. 379-409 - Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. 410-440
Multiparty Computation
- Geoffroy Couteau, Adi Rosén:
Random Sources in Private Computation. 443-473 - Geoffroy Couteau, Maryam Zarezadeh:
Non-interactive Secure Computation of Inner-Product from LPN and LWE. 474-503 - Amey Bhangale, Chen-Da Liu-Zhang, Julian Loss, Kartik Nayak:
Efficient Adaptively-Secure Byzantine Agreement for Long Messages. 504-525 - Andrew Morgan, Rafael Pass:
Concurrently Composable Non-interactive Secure Computation. 526-555 - Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul:
Attaining GOD Beyond Honest Majority with Friends and Foes. 556-587 - Shuaishuai Li:
Towards Practical Topology-Hiding Computation. 588-617
Real World Protocols
- Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss:
Key-Schedule Security for the TLS 1.3 Standard. 621-650 - Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring:
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model. 651-680 - Andreea B. Alexandru, Erica Blum, Jonathan Katz, Julian Loss:
State Machine Replication Under Changing Network Conditions. 681-710
Blockchains and Cryptocurrencies
- Georg Fuchsbauer, Michele Orrù:
Non-interactive Mimblewimble Transactions, Revisited. 713-744 - Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
A Universally Composable Non-interactive Aggregate Cash System. 745-773 - Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen:
Practical Provably Secure Flooding for Blockchains. 774-805 - Hamza Abusalah, Georg Fuchsbauer, Peter Gazi, Karen Klein:
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients. 806-836
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.