![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
30th ASIACRYPT 2024: Kolkata, India - Part VIII
- Kai-Min Chung
, Yu Sasaki
:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VIII. Lecture Notes in Computer Science 15491, Springer 2025, ISBN 978-981-96-0943-7
Cryptanalysis on Public-Key Schemes
- Yiming Gao, Jinghui Wang, Honggang Hu, Binang He:
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-Based Attacks. 3-34 - Alessandro Budroni, Jesús-Javier Chi-Domínguez, Giuseppe D'Alconzo, Antonio J. Di Scala, Mukul Kulkarni:
Don't Use it Twice! Solving Relaxed Linear Equivalence Problems. 35-65 - Lars Ran, Simona Samardjiska:
Rare Structures in Tensor Graphs - Bermuda Triangles for Cryptosystems Based on the Tensor Isomorphism Problem. 66-96
Fault Attacks and Side-Channel Analysis
- Sengim Karayalcin, Marina Krcek
, Lichao Wu
, Stjepan Picek
, Guilherme Perin
:
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-Channel Analysis. 99-131 - Puja Mondal, Supriya Adhikary
, Suparna Kundu
, Angshuman Karmakar
:
ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature Schemes. 132-167 - Amit Jana, Anup Kumar Kundu, Goutam Paul:
More Vulnerabilities of Linear Structure Sbox-Based Ciphers Reveal Their Inability to Resist DFA. 168-203
Cryptanalysis on Various Problems
- Yi Chen
, Xiaoyang Dong
, Jian Guo
, Yantian Shen
, Anyu Wang
, Xiaoyun Wang
:
Hard-Label Cryptanalytic Extraction of Neural Network Models. 207-236 - Taechan Kim:
Analysis on Sliced Garbling via Algebraic Approach. 237-265 - Kyoohyung Han, Seongkwang Kim, Byeonghak Lee, Yongha Son:
Revisiting OKVS-Based OPRF and PSI: Cryptanalysis and Better Construction. 266-296
Quantum Cryptanalysis
- Clémence Chevignard, Pierre-Alain Fouque, André Schrottenloher:
Reducing the Number of Qubits in Quantum Information Set Decoding. 299-329 - Christopher Battarbee, Giacomo Borin, Julian Brough, Ryann Cartor, Tobias Hemmert, Nadia Heninger, David Jao, Delaram Kahrobaei, Laura Maddison, Edoardo Persichetti, Angela Robinson, Daniel Smith-Tone, Rainer Steinwandt:
On the Semidirect Discrete Logarithm Problem in Finite Groups. 330-357 - Haotian Shi, Xiutao Feng:
Quantum Circuits of AES with a Low-Depth Linear Layer and a New Structure. 358-395 - Akinori Hosoyamada:
Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers. 396-430
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.