


default search action
7th LATINCRYPT 2021: Bogotá, Colombia
- Patrick Longa
, Carla Ràfols
:
Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings. Lecture Notes in Computer Science 12912, Springer 2021, ISBN 978-3-030-88237-2
Quantum Cryptography
- Xavier Bonnetain:
Tight Bounds for Simon's Algorithm. 3-23 - Anne Broadbent, Raza Ali Kazmi:
Constructions for Quantum Indistinguishability Obfuscation. 24-43 - Robin M. Berger
, Marcel Tiepelt
:
On Forging SPHINCS+-Haraka Signatures on a Fault-Tolerant Quantum Computer. 44-63
Post-quantum Cryptography
- Edward Eaton, Douglas Stebila
, Roy Stracovsky
:
Post-quantum Key-Blinding for Authentication in Anonymity Networks. 67-87 - Sofía Celi
, Armando Faz-Hernández
, Nick Sullivan, Goutam Tamvada
, Luke Valenta
, Thom Wiggers
, Bas Westerbaan
, Christopher A. Wood
:
Implementing and Measuring KEMTLS. 88-107 - Mojtaba Bisheh-Niasar
, Reza Azarderakhsh, Mehran Mozaffari Kermani
:
A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates. 108-126 - Tapas Pal
, Ratna Dutta:
Attribute-Based Access Control for Inner Product Functional Encryption from LWE. 127-148
Asymmetric Cryptanalysis
- Abderrahmane Nitaj, Muhammad Rezal Bin Kamel Ariffin, Nurul Nur Hanisah Adenan, Nur Azman Abu:
Classical Attacks on a Variant of the RSA Cryptosystem. 151-167 - Nina Bindel
, Douglas Stebila
, Shannon Veitch:
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange. 168-188
Cryptanalysis and Side-Channel Analysis
- Tarun Yadav
, Manoj Kumar
:
Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Cryptanalysis. 191-212 - Christophe Genevey-Metat
, Annelie Heuser
, Benoît Gérard
:
Train or Adapt a Deeply Learned Profile? 213-232 - Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
Autocorrelations of Vectorial Boolean Functions. 233-253 - Shibam Ghosh
, Orr Dunkelman:
Automatic Search for Bit-Based Division Property. 254-274 - Eik List:
TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption. 275-295
Distributed Cryptographic Protocols
- Simon Holmgaard Kamp
, Bernardo Magri
, Christian Matt
, Jesper Buus Nielsen
, Søren Eller Thomsen
, Daniel Tschudi
:
Weight-Based Nakamoto-Style Blockchains. 299-319 - Diego F. Aranha
, Elena Pagnin
, Francisco Rodríguez-Henríquez:
LOVE a Pairing. 320-340 - Alejandro Hevia, Ilana Mergudich-Thal:
Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo. 341-362 - Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov
:
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. 363-381 - Diego F. Aranha
, Anders P. K. Dalskov
, Daniel Escudero, Claudio Orlandi:
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms. 382-404
Multiparty Computation
- Eleftheria Makri, Tim Wood:
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling. 407-430 - David W. Archer
, Shahla Atapoor
, Nigel P. Smart
:
The Cost of IEEE Arithmetic in Secure Computation. 431-452 - Anders P. K. Dalskov
, Daniel Escudero:
Honest Majority MPC with Abort with Minimal Online Communication. 453-472

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.