


default search action
31st ASIACRYPT 2025: Melbourne, VIC, Australia - Part II
- Goichiro Hanaoka

, Bo-Yin Yang
:
Advances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8-12, 2025, Proceedings, Part II. Lecture Notes in Computer Science 16246, Springer 2026, ISBN 978-981-95-5095-1
Secure Messaging
- Armin Namavari, Thomas Ristenpart:

Transcript Franking for Encrypted Messaging. 3-33 - Joël Alwen, Xiaohui Ding, Sanjam Garg, Yiannis Tselekounis:

Policy Compliant Secure Messaging. 34-67 - Yanqi Gu

, Stanislaw Jarecki
, Phillip Nazarian
, Apurva Rai
:
Security Without Trusted Third Parties: VRF-Based Authentication with Short Authenticated Strings. 68-99
Formalization and Key Exchange
- Jiahao Liu, Yi Wang, Rongmao Chen

, Xinyi Huang
, Jinshu Su
, Moti Yung
:
Universally Composable Subversion-Resilient Authenticated Key Exchange. 103-136 - François Dupressoir, Andreas Hülsing, Cameron Low, Matthias Meijers

, Charlotte Mylog, Sabine Oechsner
:
How Hard can it be to Formalize a Proof? - Lessons from Formalizing CryptoBox Three Times in EasyCrypt. 137-167
Data Structures
- Ghada Almashaqbeh, Allison Bishop, Hayder Tirmazi:

Adversary Resilient Learned Bloom Filters. 171-202 - Marilyn George, Seny Kamara, Tarik Moataz, Zachary Espiritu:

Structured Encryption and Distribution-Aware Leakage Suppression. 203-237
Blockchain
- Peter Gazi, Saad Quader, Alexander Russell:

Taming Iterative Grinding Attacks on Blockchain Beacons. 241-272 - Ran Cohen

, Poulami Das
, Tal Moran
:
Setup-Free Committee Sampling with Subquadratic Communication. 273-304 - Michele Ciampi

, Aggelos Kiayias
, Yu Shen
:
Universally Composable Transaction Order Fairness: Refined Definitions and Adaptive Security. 305-337
Secure Implementations
- Alex Charlès, Aleksei Udovenko:

Haystack Ciphers: White-Box Countermeasures as Symmetric Encryption. 341-374 - Sonia Belaïd

, Victor Normand
, Matthieu Rivain
:
Masked Circuit Compiler in the Cardinal Random Probing Composability Framework. 375-406 - Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar:

StaMAC: Fault Protection via Stable-MAC Tags. 407-440 - Yufeng Tang

, Zheng Gong, Jian Guo, Xiaoyang Dong, Liangju Zhao:
Towards Combined Countermeasures against Differential Computation and Fault Analyses: An Approach with the ASASA Structure. 441-474 - Haoyu Liao, Qingbin Luo:

Quantum Circuit Synthesis for AES with Low DW-Cost. 475-507
Design and Analysis of Implementations
- Jens Groth, Harjasleen Malvai, Andrew Miller, Yi-Nuo Zhang:

Constraint-Friendly Map-to-Elliptic-Curve-Group Relations and Their Applications. 511-543 - Sebastian Faust, Loïc Masure, Elena Michel, Hai Hoang Nguyen, Maximilian Orlt, François-Xavier Standaert:

IP Masking with Generic Security Guarantees Under Minimum Assumptions, and Applications. 544-575 - Yi Chen

, Xiaoyang Dong
, Ruijie Ma, Yantian Shen
, Anyu Wang
, Hongbo Yu
, Xiaoyun Wang
:
Delving into Cryptanalytic Extraction of PReLU Neural Networks. 576-607 - Simon Damm

, Asja Fischer
, Alexander May
, Soundes Marzougui
, Leander Schwarz, Henning Seidler, Jean-Pierre Seifert
, Jonas Thietke
, Vincent Quentin Ulitzsch
:
Solving Concealed ILWE and Its Application for Breaking Masked Dilithium. 608-640 - Haruhisa Kosuge, Keita Xagawa

:
The Security of ML-DSA Against Fault-Injection Attacks. 641-674

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














