


default search action
25th SAC 2018: Calgary, AB, Canada
- Carlos Cid, Michael J. Jacobson Jr.

:
Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11349, Springer 2019, ISBN 978-3-030-10969-1
Design of Symmetric Key Primitives
- Sarah Miracle, Scott Yilek:

Targeted Ciphers for Format-Preserving Encryption. 3-26 - Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin:

Variants of the AES Key Schedule for Better Truncated Differential Bounds. 27-49 - Louiza Khati, Damien Vergnaud

:
Analysis and Improvement of an Authentication Scheme in Incremental Cryptography. 50-70
Cryptanalysis of Symmetric Key Primitives
- Muhammad ElSheikh

, Mohamed Tolba, Amr M. Youssef:
Integral Attacks on Round-Reduced Bel-T-256. 73-91 - Yunwen Liu

, Yu Sasaki, Ling Song, Gaoli Wang:
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. 92-114 - Zahra Eskandari, Andreas Brasen Kidmose

, Stefan Kölbl, Tyge Tiessen
:
Finding Integral Distinguishers with Ease. 115-138 - Kai Hu, Tingting Cui, Chao Gao, Meiqin Wang:

Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES. 139-162 - Ralph Ankele

, Stefan Kölbl
:
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis. 163-190
Side Channel and Fault Attacks
- Dor Fledel, Avishai Wool

:
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock. 193-215 - Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam:

Assessing the Feasibility of Single Trace Power Analysis of Frodo. 216-234 - Ben Lapid, Avishai Wool

:
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. 235-256 - Christoph Dobraunig

, Stefan Mangard
, Florian Mendel
, Robert Primas:
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje. 257-277
Post-Quantum Cryptography
- Ryann Cartor

, Daniel Smith-Tone:
EFLASH: A New Multivariate Encryption Scheme. 281-299 - Ward Beullens, Bart Preneel

, Alan Szepieniec:
Public Key Compression for Constrained Linear Signature Schemes. 300-321 - Gora Adj, Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez

, Alfred Menezes, Francisco Rodríguez-Henríquez:
On the Cost of Computing Isogenies Between Supersingular Elliptic Curves. 322-343
Lattice-Based Cryptography
- Jung Hee Cheon, Kyoohyung Han

, Andrey Kim, Miran Kim
, Yongsoo Song
:
A Full RNS Variant of Approximate Homomorphic Encryption. 347-368 - Tim Fritzmann

, Thomas Pöppelmann, Johanna Sepúlveda
:
Analysis of Error-Correcting Codes for Lattice-Based Key Exchange. 369-390 - Yang Wang

, Mingqiang Wang
:
Provably Secure NTRUEncrypt over Any Cyclotomic Field. 391-417
Classical Public Key Cryptography
- Abderrahmane Nitaj, Yanbin Pan, Joseph Tonien

:
A Generalized Attack on Some Variants of the RSA Cryptosystem. 421-433 - Mojtaba Fadavi, Reza Rezaeian Farashahi

, Soheila Sabbaghian:
Injective Encodings to Binary Ordinary Elliptic Curves. 434-449
Machine Learning and Cryptography
- Angela Jäschke, Frederik Armknecht

:
Unsupervised Machine Learning on Encrypted Data. 453-478 - Benjamin Hettwer

, Stefan Gehrer
, Tim Güneysu
:
Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge. 479-498

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














