


default search action
44th EUROCRYPT 2025: Madrid, Spain - Part I
- Serge Fehr, Pierre-Alain Fouque

:
Advances in Cryptology - EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part I. Lecture Notes in Computer Science 15601, Springer 2025, ISBN 978-3-031-91106-4
Symmetric Cryptography
- Yu Long Chen

, Avijit Dutta
, Ashwin Jha
, Mridul Nandi
:
Towards Optimally Secure Deterministic Authenticated Encryption Schemes. 3-32 - Woohyuk Chung

, Seongha Hwang
, Seongkwang Kim
, Byeonghak Lee
, Jooyoung Lee
:
Making GCM Great Again: Toward Full Security and Longer Nonces. 33-61 - Christoph Dobraunig

, Krystian Matusiewicz, Bart Mennink
, Alexander Tereschenko:
Efficient Instances of Docked Double Decker with AES, and Application to Authenticated Encryption. 62-92 - Shan Chen

, Vukasin Karadzic
:
Committing Authenticated Encryption: Generic Transforms with Hash Functions. 93-123 - Jeremiah Blocki

, Blake Holman
, Seunghoon Lee
:
The Impact of Reversibility on Parallel Pebbling. 124-154 - Zhenyu Huang, Fuxin Zhang, Dongdai Lin:

Constructing Quantum Implementations with the Minimal T-depth or Minimal Width and Their Applications. 155-185 - Jad Silbak, Daniel Wichs:

Binary Codes for Error Detection and Correction in a Computationally Bounded World. 186-211 - Yanis Belkheyar

, Patrick Derbez
, Shibam Ghosh
, Gregor Leander
, Silvia Mella
, Léo Perrin
, Shahram Rasoolzadeh
, Lukas Stennes
, Siwei Sun
, Gilles Van Assche
, Damian Vizár:
ChiLow and ChiChi: New Constructions for Code Encryption. 212-243 - Itai Dinur:

Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis. 244-273 - Yevgeniy Dodis

, Eli Goldin
, Peter Hall:
Random Oracle Combiners: Merkle-Damgård Style. 274-302 - Luca Campa

, Arnab Roy
:
Gröbner Basis Cryptanalysis of Anemoi. 303-332 - Zhongyi Zhang

, Chengan Hou
, Meicheng Liu
:
Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials. 333-363 - Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Adi Shamir:

Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting. 364-396 - Antonio Flórez-Gutiérrez, Eran Lambooij, Gaëtan Leurent

, Håvard Raddum
, Tyge Tiessen
, Michiel Verbauwhede
:
Cryptanalysis of Full SCARF. 397-426 - Antonio Flórez-Gutiérrez, Yosuke Todo

:
Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing. 427-457

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














