default search action
CT-RSA 2022: Virtual Event
- Steven D. Galbraith:
Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings. Lecture Notes in Computer Science 13161, Springer 2022, ISBN 978-3-030-95311-9 - Alexander Bienstock, Yevgeniy Dodis, Yi Tang:
Multicast Key Agreement, Revisited. 1-25 - Benoît Chevallier-Mames:
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption. 26-48 - Rami Elkhatib, Brian Koziel, Reza Azarderakhsh:
Faster Isogenies for Post-quantum Cryptography: SIKE. 49-72 - Jesús-Javier Chi-Domínguez, Krijn Reijnders:
Fully Projective Radical Isogenies in Constant-Time. 73-95 - Shahla Atapoor, Nigel P. Smart, Younes Talibi Alaoui:
Private Liquidity Matching Using MPC. 96-119 - Andrey Kim, Antonis Papadimitriou, Yuriy Polyakov:
Approximate Homomorphic Encryption with Reduced Approximation Error. 120-144 - Florette Martinez:
Attacks on Pseudo Random Number Generators Hiding a Linear Structure. 145-168 - Weiqiong Cao, Hongsong Shi, Hua Chen, Jiazhe Chen, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA. 169-195 - Han Wu, Guangwu Xu:
More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes. 196-222 - Jiamin Cui, Kai Hu, Qingju Wang, Meiqin Wang:
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128. 223-246 - Yanhong Fan, Muzhou Li, Chao Niu, Zhenyu Lu, Meiqin Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3. 247-271 - Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom, Zhiyuan Zhang:
Side-Channeling the Kalyna Key Expansion. 272-296 - Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. 297-321 - Tako Boris Fouotsa, Christophe Petit:
A New Adaptive Attack on SIDH. 322-344 - Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten:
On Fingerprinting Attacks and Length-Hiding Encryption. 345-369 - Xavier Bultel:
CCA Secure A Posteriori Openable Encryption in the Standard Model. 370-394 - Giuseppe Vitto, Alex Biryukov:
Dynamic Universal Accumulator with Batch Update over Bilinear Groups. 395-426 - Razvan Rosie:
Adaptively Secure Laconic Function Evaluation for NC1. 427-450 - Carlos Cid, John Petter Indrøy, Håvard Raddum:
FASTA - A Stream Cipher for Fast FHE Evaluation. 451-483 - Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
New Attacks from Old Distinguishers Improved Attacks on Serpent. 484-510 - Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz:
Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function. 511-536 - David Galindo, Jia Liu:
Robust Subgroup Multi-signatures for Consensus. 537-561 - Antonio Faonio, Dario Fiore, Luca Nizzardo, Claudio Soriente:
Subversion-Resilient Enhanced Privacy ID. 562-588 - Kristian Gjøsteen, Mayank Raikwar, Shuang Wu:
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. 589-619
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.