


default search action
27th SAC 2020: Virtual Event
- Orr Dunkelman

, Michael J. Jacobson Jr.
, Colin O'Flynn
:
Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12804, Springer 2021, ISBN 978-3-030-81651-3
Public-Key Cryptography
- Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:

Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments. 3-33 - Chelsea Komlo, Ian Goldberg:

FROST: Flexible Round-Optimized Schnorr Threshold Signatures. 34-65 - Jonathan Takeshita, Dayane Reis

, Ting Gong, Michael T. Niemier, X. Sharon Hu
, Taeho Jung:
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM. 66-89 - Steven D. Galbraith

, Lukas Zobernig
:
Obfuscating Finite Automata. 90-114 - Steven D. Galbraith, Robert Granger

, Simon-Philipp Merz
, Christophe Petit
:
On Index Calculus Algorithms for Subfield Curves. 115-138
Symmetric-Key Analysis
- Lorenzo Grassi

, Gregor Leander
, Christian Rechberger, Cihangir Tezcan
, Friedrich Wiemer
:
Weak-Key Distinguishers for AES. 141-170 - Tingting Cui, Lorenzo Grassi

:
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff. 171-197 - Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding:

Improved (Related-key) Differential Cryptanalysis on GIFT. 198-228 - John Petter Indrøy, Nicolas Costes, Håvard Raddum:

Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath. 229-251 - Sean Murphy, Maura B. Paterson, Christine Swart:

Boolean Ring Cryptographic Equation Solving. 252-272 - Arnab Roy

, Elena Andreeva
, Jan Ferdinand Sauer:
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions. 273-300 - Gal Benmocha, Eli Biham, Stav Perle:

Unintended Features of APIs: Cryptanalysis of Incremental HMAC. 301-325
Quantum Cryptanalysis
- Samuel Jaques, André Schrottenloher:

Low-Gate Quantum Golden Collision Finding. 329-359 - James H. Davenport

, Benjamin Pring:
Improvements to Quantum Search Techniques for Block-Ciphers, with Applications to AES. 360-384
Post-Quantum Constructions
- Ward Beullens:

Not Enough LESS: An Improved Algorithm for Solving Code Equivalence Problems over $\mathbb {F}_q$. 387-403 - Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila

:
Towards Post-Quantum Security for Signal's X3DH Handshake. 404-430 - Péter Kutas

, Christophe Petit
, Javier Silva:
Trapdoor DDH Groups from Pairings and Isogenies. 431-450 - Bor de Kock

, Kristian Gjøsteen
, Mattia Veroni
:
Practical Isogeny-Based Key-Exchange with Optimal Tightness. 451-479
Symmetric-Key Design
- Dusan Bozilov, Maria Eichlseder

, Miroslav Knezevic, Baptiste Lambin, Gregor Leander
, Thorben Moos
, Ventzislav Nikov, Shahram Rasoolzadeh
, Yosuke Todo
, Friedrich Wiemer
:
PRINCEv2 - More Security for (Almost) No Overhead. 483-511 - Elena Andreeva

, Amit Singh Bhati
, Damian Vizár:
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode. 512-534 - Subhadeep Banik

, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. 535-564
Side Channel Attacks
- Aron Gohr, Sven Jacob, Werner Schindler

:
Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations. 567-592 - Yunsi Fei

, Guang Gong, Cheng Gongye
, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric
:
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE. 593-614 - Guilherme Perin, Stjepan Picek:

On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis. 615-636
Cryptographic Applications
- Adrián Ranea

, Bart Preneel:
On Self-equivalence Encodings in White-Box Implementations. 639-669 - Ashley Fraser, Elizabeth A. Quaglia

:
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting. 670-697 - Hao Cheng, Johann Großschädl, Jiaqi Tian, Peter B. Rønne

, Peter Y. A. Ryan:
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. 698-719

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














