


default search action
30th SAC 2023: Fredericton, Canada
- Claude Carlet

, Kalikinkar Mandal
, Vincent Rijmen
:
Selected Areas in Cryptography - SAC 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14201, Springer 2024, ISBN 978-3-031-53367-9
Cryptanalysis of Lightweight Ciphers
- Hao Lei, Jiahui He, Kai Hu, Meiqin Wang:

More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities. 3-21 - Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:

A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH. 22-42 - Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang, Zhuohui Feng:

Improving the Rectangle Attack on GIFT-64. 43-61
Side-Channel Attacks and Countermeasures
- Markku-Juhani O. Saarinen

, Mélissa Rossi:
Mask Compression: High-Order Masking on Memory-Constrained Devices. 65-81 - Lichao Wu, Guilherme Perin, Stjepan Picek:

Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme. 82-96 - Siemen Dhooghe

, Artemii Ovchinnikov
:
Threshold Implementations with Non-uniform Inputs. 97-123
Post-Quantum Constructions
- Jung Hee Cheon

, Hyeongmin Choe
, Dongyeon Hong, MinJune Yi:
SMAUG: Pushing Lattice-Based Key Encapsulation Mechanisms to the Limits. 127-146 - Andrea Basso

:
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies. 147-168 - Wei Wei

, Min Luo
, Zijian Bao
, Cong Peng
, Debiao He
:
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant. 169-188
Symmetric Cryptography and Fault Attacks
- Siemen Dhooghe

, Svetla Nikova
:
The Random Fault Model. 191-212 - Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:

Probabilistic Related-Key Statistical Saturation Cryptanalysis. 213-232 - Shoichi Hirose

, Kazuhiko Minematsu
:
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. 233-252
Post-Quantum Analysis and Implementations
- Ruiqi Mi

, Haodong Jiang, Zhenfeng Zhang:
Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks. 255-274 - Melanie Jauch, Varun Maram

:
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery. 275-296 - Sanjay Deshpande

, Chuanqi Xu
, Mamuri Nawan
, Kashif Nawaz
, Jakub Szefer
:
Fast and Efficient Hardware Implementation of HQC. 297-321
Homomorphic Encryption
- Anamaria Costache

, Benjamin R. Curtis
, Erin Hales
, Sean Murphy, Tabitha Ogilvie, Rachel Player
:
On the Precision Loss in Approximate Homomorphic Encryption. 325-345 - Mounika Pratapa

, Aleksander Essex
:
Secure Function Extensions to Additively Homomorphic Cryptosystems. 346-366
Public-Key Cryptography
- Yansong Feng, Abderrahmane Nitaj, Yanbin Pan:

Generalized Implicit Factorization Problem. 369-384
Differential Cryptanalysis
- Emanuele Bellini

, David Gérault
, Juan Grados
, Yun Ju Huang
, Rusydi H. Makarim
, Mohamed Rachidi
, Sharwan K. Tiwari
:
CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives. 387-408 - Kosei Sakamoto, Ryoma Ito

, Takanori Isobe:
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications. 409-428 - Amirhossein Ebrahimi

, David Gérault
, Paolo Palmieri
:
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon. 429-450

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














