default search action
29th SAC 2022: Windsor, ON, Canada
- Benjamin Smith, Huapeng Wu:
Selected Areas in Cryptography - 29th International Conference, SAC 2022, Windsor, ON, Canada, August 24-26, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13742, Springer 2024, ISBN 978-3-031-58410-7
Lattices and ECC
- Vincent Quentin Ulitzsch, Soundes Marzougui, Mehdi Tibouchi, Jean-Pierre Seifert:
Profiling Side-Channel Attacks on Dilithium - A Small Bit-Fiddling Leak Breaks It All. 3-32 - Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji:
On the Weakness of Ring-LWE mod Prime Ideal $\mathfrak {q}$ by Trace Map. 33-52 - Marius A. Aardal, Diego F. Aranha:
2DT-GLS: Faster and Exception-Free Scalar Multiplication in the GLS254 Binary Curve. 53-74
Differential Cryptanalysis
- Ling Sun, Wei Wang, Meiqin Wang:
Key-Recovery Attacks on CRAFT and WARP. 77-95 - Christina Boura, Margot Funk, Yann Rotella:
Differential Analysis of the Ternary Hash Function Troika. 96-115 - Orr Dunkelman, Ariel Weizman:
Another Look at Differential-Linear Attacks. 116-136
Cryptographic Primitives
- Étienne Burle, Philippe Gaborit, Younes Hatri, Ayoub Otmani:
Injective Rank Metric Trapdoor Functions with Homogeneous Errors. 139-158 - Gareth T. Davies, Jeroen Pijnenburg:
sfPERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords. 159-189 - Kyoohyung Han, Dukjae Moon, Yongha Son:
Improved Circuit-Based PSI via Equality Preserving Compression. 190-209
Isogeny-based Cryptography I
- Aleksei Udovenko, Giuseppe Vitto:
Revisiting Meet-in-the-Middle Cryptanalysis of SIDH/SIKE with Application to the $IKEp182 Challenge. 213-233 - Fabio Campos, Michael Meyer, Krijn Reijnders, Marc Stöttinger:
Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE. 234-262 - Antonin Leroux:
An Effective Lower Bound on the Number of Orientable Supersingular Elliptic Curves. 263-281
Block Ciphers
- Kai Hu, Thomas Peyrin, Meiqin Wang:
Finding All Impossible Differentials When Considering the DDT. 285-305 - Lulu Zhang, Meicheng Liu, Dongdai Lin:
A Three-Stage MITM Attack on LowMC from a Single Plaintext-Ciphertext Pair. 306-327 - Jiqiang Lu, Mingxue Wang, Can Wang, Chen Yang:
Collision-Based Attacks on White-Box Implementations of the AES Block Cipher. 328-352
Differential Cryptanalysis II
- Alex Biryukov, Je Sen Teh, Aleksei Udovenko:
Advancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN. 355-375 - Jiali Shi, Guoqiang Liu, Chao Li:
Improved the Automated Evaluation Algorithm Against Differential Attacks and Its Application to WARP. 376-396
Isogeny-based Cryptography II
- Javad Doliskani, Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto:
Faster Cryptographic Hash Function from Supersingular Isogeny Graphs. 399-415
Protocols and PRFs
- Ehsan Ebrahimi:
From Plaintext-Extractability to IND-CCA Security. 419-436 - Najwa Aaraj, Emanuele Bellini, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar:
Farasha: A Provable Permutation-Based Parallelizable PRF. 437-458 - Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi:
A Sponge-Based PRF with Good Multi-user Security. 459-478
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.