


default search action
41st EUROCRYPT 2022: Trondheim, Norway - Part III
- Orr Dunkelman
, Stefan Dziembowski
:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13277, Springer 2022, ISBN 978-3-031-07081-5
Symmetric-Key Cryptanalysis
- Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. 3-33 - Zhen Shi
, Chenhui Jin
, Jiyan Zhang
, Ting Cui
, Lin Ding
, Yu Jin
:
A Correlation Attack on Full SNOW-V and SNOW-Vi. 34-56 - Dor Amzaleg, Itai Dinur:
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2. 57-85 - Sabyasachi Dey
, Hirendra Kumar Garai, Santanu Sarkar
, Nitin Kumar Sharma
:
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha. 86-114 - Ling Sun, Bart Preneel, Wei Wang, Meiqin Wang:
A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis. 115-144
Side Channel Attacks and Masking
- Alexander May
, Julian Nowakowski
, Santanu Sarkar
:
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents. 147-167 - Marcel Nageler
, Christoph Dobraunig
, Maria Eichlseder
:
Information-Combining Differential Fault Attacks on DEFAULT. 168-191 - Vipul Goyal, Yuval Ishai, Yifan Song:
Private Circuits with Quasilinear Randomness. 192-221 - Thomas Espitau
, Pierre-Alain Fouque
, François Gérard, Mélissa Rossi
, Akira Takahashi
, Mehdi Tibouchi
, Alexandre Wallet
, Yang Yu
:
Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon. 222-253 - Si Gao
, Elisabeth Oswald
:
A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators. 254-283 - Si Gao
, Elisabeth Oswald
, Dan Page
:
Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical. 284-311
Post-Quantum Cryptography
- Xavier Bonnetain, André Schrottenloher, Ferdinand Sibleyras:
Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes. 315-344 - Benjamin Wesolowski
:
Orientations and the Supersingular Endomorphism Ring Problem. 345-371 - Yilei Chen, Qipeng Liu, Mark Zhandry:
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering. 372-401 - Paul Grubbs, Varun Maram
, Kenneth G. Paterson:
Anonymous, Robust Post-quantum Public Key Encryption. 402-432 - Andre Esser, Alexander May
, Floyd Zweydinger:
McEliece Needs a Break - Solving McEliece-1284 and Quasi-Cyclic-2918 with Modern ISD. 433-457 - Gorjan Alagic, Chen Bai, Jonathan Katz
, Christian Majenz
:
Post-Quantum Security of the Even-Mansour Cipher. 458-487 - Fuyuki Kitagawa, Ryo Nishimaki:
Watermarking PRFs Against Quantum Adversaries. 488-518 - Nir Bitansky, Huijia Lin, Omri Shmueli:
Non-malleable Commitments Against Quantum Attacks. 519-550 - Keita Xagawa
:
Anonymity of NIST PQC Round 3 KEMs. 551-581 - Gang Tang
, Dung Hoang Duong
, Antoine Joux
, Thomas Plantard
, Youming Qiao
, Willy Susilo
:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. 582-612 - Loïs Huguenin-Dumittan, Serge Vaudenay:
On IND-qCCA Security in the ROM and Its Applications - CPA Security Is Sufficient for TLS 1.3. 613-642 - Léo Ducas
, Wessel P. J. van Woerden
:
On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography. 643-673
Information-Theoretic Security
- Jelle Don, Serge Fehr, Christian Majenz
, Christian Schaffner
:
Online-Extractability in the Quantum Random-Oracle Model. 677-706 - Kai-Min Chung
, Yi Lee
, Han-Hsuan Lin
, Xiaodi Wu
:
Constant-Round Blind Classical Verification of Quantum Sampling. 707-736 - Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. 737-766 - Hamidreza Amini Khorasgani, Hemanta K. Maji, Hai H. Nguyen:
Secure Non-interactive Simulation: Feasibility and Rate. 767-796 - Pratyush Agarwal, Varun Narayanan, Shreya Pathak, Manoj Prabhakaran, Vinod M. Prabhakaran
, Mohammad Ali Rehan
:
Secure Non-interactive Reduction and Spectral Analysis of Correlations. 797-827

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.