default search action
28th ASIACRYPT 2022: Taipei, Taiwan - Part II
- Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13792, Springer 2022, ISBN 978-3-031-22965-7
Isogeny Based Cryptography
- Antonin Leroux:
A New Isogeny Representation and Applications to Cryptography. 3-35 - Julien Duman
, Dominik Hartmann
, Eike Kiltz
, Sabrina Kunzweiler
, Jonas Lehmann
, Doreen Riepel
:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. 36-66 - Wouter Castryck, Thomas Decru, Marc Houben
, Frederik Vercauteren:
Horizontal Racewalking Using Radical Isogenies. 67-96
Homomorphic Encryption
- Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker:
Threshold Linearly Homomorphic Encryption on bfZ/2kbfZ. 99-129 - Zeyu Liu
, Daniele Micciancio
, Yuriy Polyakov
:
Large-Precision Homomorphic Sign Evaluation Using FHEW/TFHE Bootstrapping. 130-160 - Seonghak Kim
, Minji Park, Jaehyung Kim
, Taekyung Kim
, Chohong Min
:
EvalRound Algorithm in CKKS Bootstrapping. 161-187 - Charlotte Bonte
, Ilia Iliashenko
, Jeongeun Park
, Hilder V. L. Pereira
, Nigel P. Smart
:
FINAL: Faster FHE Instantiated with NTRU and LWE. 188-215
NIZK and SNARKs
- Nan Wang
, Sid Chi-Kin Chau
:
Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup. 219-248 - Helger Lipmaa
, Janno Siim
, Michal Zajac:
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK. 249-278 - Yashvanth Kondi, Abhi Shelat:
Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature Aggregation. 279-309 - Luca De Feo
, Samuel Dobson
, Steven D. Galbraith
, Lukas Zobernig
:
SIDH Proof of Knowledge. 310-339 - Gongxian Zeng
, Junzuo Lai
, Zhengan Huang
, Yu Wang, Zhiming Zheng:
DAG-Σ: A DAG-Based Sigma Protocol for Relations in CNF. 340-370 - Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud:
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection. 371-402 - Sungwook Kim
, Hyeonbum Lee
, Jae Hong Seo
:
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier. 403-433
Non Interactive Zero Knowledge
- Yuyu Wang
, Jiaxin Pan
:
Unconditionally Secure NIZK in the Fine-Grained Setting. 437-465 - Ran Canetti, Pratik Sarkar, Xiao Wang:
Triply Adaptive UC NIZK. 466-495 - Riddhi Ghosal, Paul Lou, Amit Sahai:
Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head". 496-521
Symmetric Cryptography
- Yaobin Shen
, Ferdinand Sibleyras:
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security. 525-554 - Norica Bacuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer:
Jammin' on the Deck. 555-584 - Akinori Hosoyamada, Takanori Isobe, Yosuke Todo
, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. 585-619 - Lorenzo Grassi
, Bart Mennink:
Security of Truncated Permutation Without Initial Value. 620-650 - Matilda Backendal
, Felix Günther
, Kenneth G. Paterson
:
Puncturable Key Wrapping and Its Applications. 651-681 - Wonseok Choi
, Hwigyeom Kim
, Jooyoung Lee
, Yeongmin Lee
:
Multi-user Security of the Sum of Truncated Random Permutations. 682-710
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.