default search action
26th SAC 2019: Waterloo, ON, Canada
- Kenneth G. Paterson, Douglas Stebila:
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11959, Springer 2020, ISBN 978-3-030-38470-8
Invited Talks
- Douglas R. Stinson:
Looking Back - My Life as a Mathematician and Cryptographer. 3-20 - Craig Costello:
Supersingular Isogeny Key Exchange for Beginners. 21-50
Differential Cryptanalysis
- Lorenzo Grassi:
Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES. 53-84 - Fukang Liu, Takanori Isobe:
Iterative Differential Characteristic of TRIFLE-BC. 85-100
Tweakable Block Ciphers
- Takanori Isobe, Kazuhiko Minematsu:
Plaintext Recovery Attacks Against XTS Beyond Collisions. 103-123 - Patrick Derbez, Virginie Lallemand, Aleksei Udovenko:
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition. 124-145
Block Ciphers and Permutations
- Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Markus Schofnegger:
Algebraic Cryptanalysis of Variants of Frit. 149-170 - Chaoyun Li, Bart Preneel:
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree. 171-193 - Jung-Keun Lee, Bonwook Koo, Woo-Hwan Kim:
A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules. 194-224
Real-World Cryptography
- Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park:
Towards a Practical Cluster Analysis over Encrypted Data. 227-249 - Eli Biham, Lior Neumann:
Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack. 250-273 - Carsten Baum, Daniele Cozzo, Nigel P. Smart:
Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ. 274-302 - Tibor Jager, David Niehues:
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. 303-332
Stream Ciphers and Lightweight Cryptography
- Matthias Hamann, Matthias Krause, Alexander Moch:
Tight Security Bounds for Generic Stream Cipher Constructions. 335-364 - Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. 365-392 - Kazuhiko Minematsu:
A Lightweight Alternative to PMAC. 393-417
Post-quantum Analysis
- Akifumi Muroi, Shinya Okumura, Atsuko Miyaji:
An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks. 421-436 - Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne:
Ternary Syndrome Decoding with Large Weight. 437-466 - Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer:
Exploring Trade-offs in Batch Bounded Distance Decoding. 467-491 - Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
On Quantum Slide Attacks. 492-519
Post-quantum Implementations
- Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:
XMSS and Embedded Systems. 523-550 - Thales Bandiera Paiva, Routo Terada:
A Timing Attack on the HQC Encryption Scheme. 551-573 - Alan Szepieniec, Bart Preneel:
Block-Anti-Circulant Unbalanced Oil and Vinegar. 574-588
Symmetric Cryptography
- Alessandro Amadori, Wil Michiels, Peter Roelse:
A DFA Attack on White-Box Implementations of AES with External Encodings. 591-617 - Akiko Inoue, Kazuhiko Minematsu:
Parallelizable Authenticated Encryption with Small State Size. 618-644 - Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery. 645-666
Post-quantum Constructions
- Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart:
BBQ: Using AES in Picnic Signatures. 669-692 - Chitchanok Chuengsatiansup, Damien Stehlé:
Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding. 693-713
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.