


default search action
29th ASIACRYPT 2023: Guangzhou, China - Part IV
- Jian Guo

, Ron Steinfeld
:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14441, Springer 2023, ISBN 978-981-99-8729-0
Cryptanalysis of Post-quantum and Public-Key Systems
- Alain Couvreur, Rocco Mora, Jean-Pierre Tillich:

A New Approach Based on Quadratic Forms to Attack the McEliece Cryptosystem. 3-38 - Jonas Meers

, Julian Nowakowski
:
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith. 39-71 - Andre Esser

, Rahul Girme, Arindam Mukherjee
, Santanu Sarkar
:
Memory-Efficient Attacks on Small LWE Keys. 72-105 - Alexander May

, Julian Nowakowski
:
Too Many Hints - When LLL Breaks LWE. 106-137 - Charles Bouillaguet

, Ambroise Fleury, Pierre-Alain Fouque
, Paul Kirchner
:
We are on the Same Side. Alternative Sieving Strategies for the Number Field Sieve. 138-166 - Kaijie Jiang, Anyu Wang

, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang:
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. 167-200
Side-Channels
- Qian Guo

, Denis Nabokov
, Alexander Nilsson
, Thomas Johansson
:
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes. 203-236 - Maxime Plançon:

Exploiting Algebraic Structures in Probing Security. 237-267 - Felix Dörre

, Jeremias Mechler, Jörn Müller-Quade:
Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels. 268-301 - Jakob Feldtkeller

, Tim Güneysu
, Patrick Schaumont
:
Quantitative Fault Injection Analysis. 302-336
Quantum Random Oracle Model
- Abtin Afshar, Kai-Min Chung, Yao-Ching Hsieh, Yao-Ting Lin, Mohammad Mahmoody:

On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model. 339-368 - Dominique Unruh

:
Towards Compressed Permutation Oracles. 369-400 - Jiaxin Pan

, Benedikt Wagner
, Runzhi Zeng
:
Tighter Security for Generic Authenticated Key Exchange in the QROM. 401-433 - Haodong Jiang, Zhi Ma, Zhenfeng Zhang:

Post-quantum Security of Key Encapsulation Mechanism Against CCA Attacks with a Single Decapsulation Query. 434-468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














