default search action
30th SAC 2023: Fredericton, Canada
- Claude Carlet, Kalikinkar Mandal, Vincent Rijmen:
Selected Areas in Cryptography - SAC 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14201, Springer 2024, ISBN 978-3-031-53367-9
Cryptanalysis of Lightweight Ciphers
- Hao Lei, Jiahui He, Kai Hu, Meiqin Wang:
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities. 3-21 - Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH. 22-42 - Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, Zhuohui Feng:
Improving the Rectangle Attack on GIFT-64. 43-61
Side-Channel Attacks and Countermeasures
- Markku-Juhani O. Saarinen, Mélissa Rossi:
Mask Compression: High-Order Masking on Memory-Constrained Devices. 65-81 - Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme. 82-96 - Siemen Dhooghe, Artemii Ovchinnikov:
Threshold Implementations with Non-uniform Inputs. 97-123
Post-Quantum Constructions
- Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong, MinJune Yi:
SMAUG: Pushing Lattice-Based Key Encapsulation Mechanisms to the Limits. 127-146 - Andrea Basso:
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies. 147-168 - Wei Wei, Min Luo, Zijian Bao, Cong Peng, Debiao He:
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant. 169-188
Symmetric Cryptography and Fault Attacks
- Siemen Dhooghe, Svetla Nikova:
The Random Fault Model. 191-212 - Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Probabilistic Related-Key Statistical Saturation Cryptanalysis. 213-232 - Shoichi Hirose, Kazuhiko Minematsu:
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. 233-252
Post-Quantum Analysis and Implementations
- Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang:
Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks. 255-274 - Melanie Jauch, Varun Maram:
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery. 275-296 - Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer:
Fast and Efficient Hardware Implementation of HQC. 297-321
Homomorphic Encryption
- Anamaria Costache, Benjamin R. Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie, Rachel Player:
On the Precision Loss in Approximate Homomorphic Encryption. 325-345 - Mounika Pratapa, Aleksander Essex:
Secure Function Extensions to Additively Homomorphic Cryptosystems. 346-366
Public-Key Cryptography
- Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:
Generalized Implicit Factorization Problem. 369-384
Differential Cryptanalysis
- Emanuele Bellini, David Gérault, Juan Grados, Yun Ju Huang, Rusydi H. Makarim, Mohamed Rachidi, Sharwan K. Tiwari:
CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives. 387-408 - Kosei Sakamoto, Ryoma Ito, Takanori Isobe:
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications. 409-428 - Amirhossein Ebrahimi, David Gérault, Paolo Palmieri:
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon. 429-450
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.