default search action
30th ASIACRYPT 2024: Kolkata, India - Part VII
- Kai-Min Chung, Yu Sasaki:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII. Lecture Notes in Computer Science 15490, Springer 2025, ISBN 978-981-96-0940-6
Information-Theoretic Cryptography
- Keyu Ji, Cong Zhang, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, Kui Ren:
On the Complexity of Cryptographic Groups and Generic Group Models. 3-35 - Hari Krishnan P. Anilkumar, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran:
Randomness in Private Sequential Stateless Protocols. 36-66
Secret Sharing
- Danilo Francati, Daniele Venturi:
Evolving Secret Sharing Made Short. 69-99 - Ignacio Cascudo, Daniele Cozzo, Emanuele Giunta:
Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity. 100-128 - Alireza Kavousi, Aydin Abadi, Philipp Jovanovic:
Timed Secret Sharing. 129-164
Security Against Physical Attacks
- Sonia Belaïd, Jakob Feldtkeller, Tim Güneysu, Anna Guinet, Jan Richter-Brockmann, Matthieu Rivain, Pascal Sasdrich, Abdul Rahman Taleb:
Formal Definition and Verification for Combined Random Fault and Random Probing Security. 167-200 - Kaartik Bhushan, Rishab Goyal, Venkata Koppula, Varun Narayanan, Manoj Prabhakaran, Mahesh Sreekumar Rajasree:
Leakage-Resilient Incompressible Cryptography: Constructions and Barriers. 201-234
Cryptanalysis on Symmetric-Key Schemes
- Yingxin Li, Fukang Liu, Gaoli Wang, Xiaoyang Dong, Siwei Sun:
The First Practical Collision for 31-Step SHA-256. 237-266 - Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Takanori Isobe:
Key Collisions on AES and Its Applications. 267-300 - Xueping Yan, Lin Tan, Hong Xu, Wen-Feng Qi:
The Boomerang Chain Distinguishers: New Record for 6-Round AES. 301-329 - Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo:
Multiple-Tweak Differential Attack Against SCARF. 330-360 - Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Generic Differential Key Recovery Attacks and Beyond. 361-391 - Tim Beyne, Michiel Verbauwhede:
Ultrametric Integral Cryptanalysis. 392-423 - Fukang Liu, Mohammad Mahzoun, Willi Meier:
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit. 424-456 - Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, Deng Tang:
A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms. 457-489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.