


default search action
CT-RSA 2022: Virtual Event
- Steven D. Galbraith
:
Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings. Lecture Notes in Computer Science 13161, Springer 2022, ISBN 978-3-030-95311-9 - Alexander Bienstock, Yevgeniy Dodis, Yi Tang:
Multicast Key Agreement, Revisited. 1-25 - Benoît Chevallier-Mames:
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption. 26-48 - Rami Elkhatib, Brian Koziel, Reza Azarderakhsh:
Faster Isogenies for Post-quantum Cryptography: SIKE. 49-72 - Jesús-Javier Chi-Domínguez
, Krijn Reijnders:
Fully Projective Radical Isogenies in Constant-Time. 73-95 - Shahla Atapoor
, Nigel P. Smart
, Younes Talibi Alaoui
:
Private Liquidity Matching Using MPC. 96-119 - Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov
:
Approximate Homomorphic Encryption with Reduced Approximation Error. 120-144 - Florette Martinez:
Attacks on Pseudo Random Number Generators Hiding a Linear Structure. 145-168 - Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen
, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA. 169-195 - Han Wu
, Guangwu Xu:
More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes. 196-222 - Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang:
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. 223-246 - Yanhong Fan, Muzhou Li
, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. 247-271 - Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom, Zhiyuan Zhang
:
Side-Channeling the Kalyna Key Expansion. 272-296 - Naila Mukhtar
, Lejla Batina, Stjepan Picek
, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. 297-321 - Tako Boris Fouotsa
, Christophe Petit
:
A New Adaptive Attack on SIDH. 322-344 - Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten:
On Fingerprinting Attacks and Length-Hiding Encryption. 345-369 - Xavier Bultel
:
CCA Secure A Posteriori Openable Encryption in the Standard Model. 370-394 - Giuseppe Vitto, Alex Biryukov
:
Dynamic Universal Accumulator with Batch Update over Bilinear Groups. 395-426 - Razvan Rosie:
Adaptively Secure Laconic Function Evaluation for NC1. 427-450 - Carlos Cid
, John Petter Indrøy, Håvard Raddum
:
FASTA - A Stream Cipher for Fast FHE Evaluation. 451-483 - Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander
, María Naya-Plasencia, Yosuke Todo:
New Attacks from Old Distinguishers Improved Attacks on Serpent. 484-510 - Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz:
Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function. 511-536 - David Galindo
, Jia Liu
:
Robust Subgroup Multi-signatures for Consensus. 537-561 - Antonio Faonio
, Dario Fiore, Luca Nizzardo, Claudio Soriente:
Subversion-Resilient Enhanced Privacy ID. 562-588 - Kristian Gjøsteen, Mayank Raikwar, Shuang Wu:
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. 589-619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.