


default search action
27th ASIACRYPT 2021: Singapore - Part I
- Mehdi Tibouchi

, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part I. Lecture Notes in Computer Science 13090, Springer 2021, ISBN 978-3-030-92061-6
Best Paper Awards
- Alice Pellet-Mary, Damien Stehlé:

On the Hardness of the NTRU Problem. 3-35 - Tim Beyne

:
A Geometric Approach to Linear Cryptanalysis. 36-66 - Gabrielle De Micheli

, Pierrick Gaudry, Cécile Pierrot:
Lattice Enumeration for Tower NFS: A 521-Bit Discrete Logarithm Computation. 67-96
Public-Key Cryptanalysis
- Alexander May

, Julian Nowakowski
, Santanu Sarkar
:
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. 99-129 - Vladimir Sedlacek

, Jesús-Javier Chi-Domínguez
, Jan Jancar
, Billy Bob Brumley
:
A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks. 130-159 - Andrea Basso

, Péter Kutas
, Simon-Philipp Merz
, Christophe Petit
, Antonio Sanso:
Cryptanalysis of an Oblivious PRF from Supersingular Isogenies. 160-184
Symmetric-Key Cryptanalysis
- Chen-Dong Ye, Tian Tian:

A Practical Key-Recovery Attack on 805-Round Trivium. 187-213 - Fukang Liu, Santanu Sarkar

, Willi Meier, Takanori Isobe:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. 214-240 - Xiaoyang Dong, Zhiyu Zhang

, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. 241-271 - Gaëtan Leurent, Clara Pernot, André Schrottenloher:

Clustering Effect in Simon and Simeck. 272-302 - Subhadeep Banik

, Khashayar Barooti, Serge Vaudenay, Hailun Yan:
New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair. 303-331 - Aleksei Udovenko

:
Convexity of Division Property Transitions: Theory, Algorithms and Compact Models. 332-361 - Phil Hebborn, Baptiste Lambin, Gregor Leander

, Yosuke Todo:
Strong and Tight Security Guarantees Against Integral Distinguishers. 362-391 - Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang

:
Massive Superpoly Recovery with Nested Monomial Predictions. 392-421 - Xavier Bonnetain, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher:

Quantum Linearization Attacks. 422-452 - Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander

, María Naya-Plasencia:
Generic Framework for Key-Guessing Improvements. 453-483
Quantum Security
- Haodong Jiang, Zhenfeng Zhang, Zhi Ma:

On the Non-tightness of Measurement-Based Reductions for Key Encapsulation Mechanism in the Quantum Random Oracle Model. 487-517 - Mark Zhandry

:
Redeeming Reset Indifferentiability and Applications to Post-quantum Security. 518-548 - Bhaskar Roberts

, Mark Zhandry
:
Franchised Quantum Money. 549-574 - Jun Yan:

Quantum Computationally Predicate-Binding Commitments with Application in Quantum Zero-Knowledge Arguments for NP. 575-605 - Taiga Hiroka, Tomoyuki Morimae

, Ryo Nishimaki, Takashi Yamakawa:
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication. 606-636 - Alex B. Grilo, Kathrin Hövelmanns

, Andreas Hülsing
, Christian Majenz
:
Tight Adaptive Reprogramming in the QROM. 637-667 - Ritam Bhaumik, Xavier Bonnetain, André Chailloux, Gaëtan Leurent, María Naya-Plasencia, André Schrottenloher, Yannick Seurin:

QCB: Efficient Quantum-Secure Authenticated Encryption. 668-698

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














