default search action
29th ASIACRYPT 2023: Guangzhou, China - Part IV
- Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14441, Springer 2023, ISBN 978-981-99-8729-0
Cryptanalysis of Post-quantum and Public-Key Systems
- Alain Couvreur, Rocco Mora, Jean-Pierre Tillich:
A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem. 3-38 - Jonas Meers, Julian Nowakowski:
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith. 39-71 - Andre Esser, Rahul Girme, Arindam Mukherjee, Santanu Sarkar:
Memory-Efficient Attacks on Small LWE Keys. 72-105 - Alexander May, Julian Nowakowski:
Too Many Hints - When LLL Breaks LWE. 106-137 - Charles Bouillaguet, Ambroise Fleury, Pierre-Alain Fouque, Paul Kirchner:
We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve. 138-166 - Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang:
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. 167-200
Side-Channels
- Qian Guo, Denis Nabokov, Alexander Nilsson, Thomas Johansson:
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes. 203-236 - Maxime Plançon:
Exploiting Algebraic Structures in Probing Security. 237-267 - Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels. 268-301 - Jakob Feldtkeller, Tim Güneysu, Patrick Schaumont:
Quantitative Fault Injection Analysis. 302-336
Quantum Random Oracle Model
- Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody:
On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model. 339-368 - Dominique Unruh:
Towards Compressed Permutation Oracles. 369-400 - Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Tighter Security for Generic Authenticated Key Exchange in the QROM. 401-433 - Haodong Jiang, Zhi Ma, Zhenfeng Zhang:
Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query. 434-468
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.