


default search action
9th LATINCRYPT 2025: Medellín, Colombia
- Daniel Escudero

, Ivan Damgård:
Progress in Cryptology - LATINCRYPT 2025 - 9th International Conference on Cryptology and Information Security in Latin America, Medellín, Colombia, October 1-3, 2025, Proceedings. Lecture Notes in Computer Science 16129, Springer 2026, ISBN 978-3-032-06753-1
Position Paper
- Leah Namisa Rosenbloom:

Cryptography and Collective Power. 3-39
Zero-Knowledge Proofs and Distributed Computation
- Prabhanjan Ananth, Alex B. Grilo:

Post-Quantum Zero-Knowledge with Space-Bounded Simulation. 43-75 - Anna Lysyanskaya, Leah Namisa Rosenbloom:

Adaptive UC NIZK for Practical Applications. 76-108 - Liam Eagen, Youssef El Housni, Simon Masson, Thomas Piellard:

Fast Elliptic Curve Scalar Multiplications in SN(T)ARK Circuits. 109-129 - Matthias Geihs:

Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR. 130-142
Quantum and Post-quantum Cryptography
- Wouter Castryck

, Riccardo Invernizzi
, Gioella Lorenzon
, Jonas Meers
, Frederik Vercauteren
:
Orient Express: Using Frobenius to Express Oriented Isogenies. 145-173 - Steven D. Galbraith, Valerie Gilchrist, Damien Robert:

Improved Algorithms for Ascending Isogeny Volcanoes, and Applications. 174-208 - Krijn Reijnders

:
The Tate Profile. 209-233 - Razvan Barbulescu, Mugurel Barcau, Vicentiu Pasol:

Extending Regev's Quantum Algorithm to Elliptic Curves. 234-266 - Anne Broadbent, Alex B. Grilo, Supartha Podder, Jamie Sikora

:
The Role of Piracy in Quantum Proofs. 267-295
Symmetric-Key Cryptography and Attacks
- Simone Colombo

, Damian Vizár:
(Im)Possibility of Symmetric Encryption Against Coordinated Algorithm Substitution Attacks and Key Exfiltration. 299-332 - Orr Dunkelman

:
A Simple Forgery Attack on Pelican. 333-344 - Pierrick Méaux

:
From at Least n/3 to at Most 3n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$3\sqrt{n}$$\end{document}: Correcting the Algebraic Immunity of the Hidden Weight Bit Function - Algebraic Immunity Upper Bounds on Weightwise Degree-d Functions and Their Implications. 345-369
Machine Learning and Cryptanalysis
- Emanuele Bellini

, Rocco Brunelli
, David Gérault
, Anna Hambitzer
, Marco Pedicini
:
Generic Partial Decryption as Feature Engineering for Neural Distinguishers. 373-398 - Isaac A. Canales-Martínez

, David Santos:
Extracting Some Layers of Deep Neural Networks in the Hard-Label Setting. 399-421
Implementation and Efficiency
- Armando Faz-Hernández

:
Rhizomes and the Roots of Efficiency - Improving Prio. 425-449 - Décio Luiz Gazzoni Filho, Rafael G. Flores e Silva, Alessandro Budroni, Marco Palumbi, Gora Adj:

Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU. 450-487

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














