default search action
7th LATINCRYPT 2021: Bogotá, Colombia
- Patrick Longa, Carla Ràfols:
Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings. Lecture Notes in Computer Science 12912, Springer 2021, ISBN 978-3-030-88237-2
Quantum Cryptography
- Xavier Bonnetain:
Tight Bounds for Simon's Algorithm. 3-23 - Anne Broadbent, Raza Ali Kazmi:
Constructions for Quantum Indistinguishability Obfuscation. 24-43 - Robin M. Berger, Marcel Tiepelt:
On Forging SPHINCS+-Haraka Signatures on a Fault-Tolerant Quantum Computer. 44-63
Post-quantum Cryptography
- Edward Eaton, Douglas Stebila, Roy Stracovsky:
Post-quantum Key-Blinding for Authentication in Anonymity Networks. 67-87 - Sofía Celi, Armando Faz-Hernández, Nick Sullivan, Goutam Tamvada, Luke Valenta, Thom Wiggers, Bas Westerbaan, Christopher A. Wood:
Implementing and Measuring KEMTLS. 88-107 - Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani:
A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates. 108-126 - Tapas Pal, Ratna Dutta:
Attribute-Based Access Control for Inner Product Functional Encryption from LWE. 127-148
Asymmetric Cryptanalysis
- Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu:
Classical Attacks on a Variant of the RSA Cryptosystem. 151-167 - Nina Bindel, Douglas Stebila, Shannon Veitch:
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange. 168-188
Cryptanalysis and Side-Channel Analysis
- Tarun Yadav, Manoj Kumar:
Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Cryptanalysis. 191-212 - Christophe Genevey-Metat, Annelie Heuser, Benoît Gérard:
Train or Adapt a Deeply Learned Profile? 213-232 - Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
Autocorrelations of Vectorial Boolean Functions. 233-253 - Shibam Ghosh, Orr Dunkelman:
Automatic Search for Bit-Based Division Property. 254-274 - Eik List:
TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption. 275-295
Distributed Cryptographic Protocols
- Simon Holmgaard Kamp, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen, Daniel Tschudi:
Weight-Based Nakamoto-Style Blockchains. 299-319 - Diego F. Aranha, Elena Pagnin, Francisco Rodríguez-Henríquez:
LOVE a Pairing. 320-340 - Alejandro Hevia, Ilana Mergudich-Thal:
Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo. 341-362 - Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov:
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. 363-381 - Diego F. Aranha, Anders P. K. Dalskov, Daniel Escudero, Claudio Orlandi:
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms. 382-404
Multiparty Computation
- Eleftheria Makri, Tim Wood:
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling. 407-430 - David W. Archer, Shahla Atapoor, Nigel P. Smart:
The Cost of IEEE Arithmetic in Secure Computation. 431-452 - Anders P. K. Dalskov, Daniel Escudero:
Honest Majority MPC with Abort with Minimal Online Communication. 453-472
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.