Login / Signup
ASIACRYPT (3)
2017
2020
2023
2017
2023
Keyphrases
Publications
2023
Zhenzhen Bao
,
Jinyu Lu
,
Yiran Yao
,
Liu Zhang
More Insight on Deep Learning-Aided Cryptanalysis.
ASIACRYPT (3)
(2023)
Yaobin Shen
,
François-Xavier Standaert
,
Lei Wang
Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs.
ASIACRYPT (3)
(2023)
Kaiyi Zhang
,
Qingju Wang
,
Yu Yu
,
Chun Guo
,
Hongrui Cui
Algebraic Attacks on Round-Reduced Rain and Full AIM-III.
ASIACRYPT (3)
(2023)
Henri Gilbert
,
Rachelle Heim Boissier
,
Jérémy Jean
,
Jean-René Reinhard
Cryptanalysis of Elisabeth-4.
ASIACRYPT (3)
(2023)
Shi Bai
,
Iggy van Hoof
,
Floyd Johnson
,
Tanja Lange
,
Tran Ngo
Concrete Analysis of Quantum Lattice Enumeration.
ASIACRYPT (3)
(2023)
Yi Chen
,
Zhenzhen Bao
,
Hongbo Yu
Differential-Linear Approximation Semi-unconstrained Searching and Partition Tree: Application to LEA and Speck.
ASIACRYPT (3)
(2023)
Akinori Hosoyamada
Quantum Speed-Up for Multidimensional (Zero Correlation) Linear Distinguishers.
ASIACRYPT (3)
(2023)
Jianhua Wang
,
Lu Qin
,
Baofeng Wu
Correlation Cube Attack Revisited - Improved Cube Search and Superpoly Recovery Techniques.
ASIACRYPT (3)
(2023)
Qun Liu
,
Bart Preneel
,
Zheng Zhao
,
Meiqin Wang
Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits.
ASIACRYPT (3)
(2023)
Mingjie Chen
,
Muhammad Imran
,
Gábor Ivanyos
,
Péter Kutas
,
Antonin Leroux
,
Christophe Petit
Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH.
ASIACRYPT (3)
(2023)
Ritam Bhaumik
,
Benoît Cogliati
,
Jordan Ethan
,
Ashwin Jha
On Quantum Secure Compressing Pseudorandom Functions.
ASIACRYPT (3)
(2023)
Xiaoyang Dong
,
Shun Li
,
Phuong Pham
,
Guoyan Zhang
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory.
ASIACRYPT (3)
(2023)
Bishwajit Chakraborty
,
Chandranan Dhar
,
Mridul Nandi
Exact Security Analysis of ASCON.
ASIACRYPT (3)
(2023)
Qingliang Hou
,
Xiaoyang Dong
,
Lingyue Qin
,
Guoyan Zhang
,
Xiaoyun Wang
Automated Meet-in-the-Middle Attack Goes to Feistel.
ASIACRYPT (3)
(2023)
Kai Hu
,
Thomas Peyrin
,
Quan Quan Tan
,
Trevor Yap
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective.
ASIACRYPT (3)
(2023)
volume 14440, 2023
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III
ASIACRYPT (3)
14440 (2023)
2022
Sarah Miracle
,
Scott Yilek
New Algorithms and Analyses for Sum-Preserving Encryption.
ASIACRYPT (3)
(2022)
Barbara Jiabao Benedikt
,
Marc Fischlin
,
Moritz Huppert
Nostradamus Goes Quantum.
ASIACRYPT (3)
(2022)
Arasu Arun
,
Joseph Bonneau
,
Jeremy Clark
Short-lived Zero-Knowledge Proofs and Signatures.
ASIACRYPT (3)
(2022)
Jun Xu
,
Santanu Sarkar
,
Huaxiong Wang
,
Lei Hu
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.
ASIACRYPT (3)
(2022)
Zhenyu Huang
,
Siwei Sun
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits.
ASIACRYPT (3)
(2022)
Henri Devillez
,
Olivier Pereira
,
Thomas Peters
Traceable Receipt-Free Encryption.
ASIACRYPT (3)
(2022)
Orel Cosseron
,
Clément Hoffmann
,
Pierrick Méaux
,
François-Xavier Standaert
Towards Case-Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher.
ASIACRYPT (3)
(2022)
Julia Len
,
Paul Grubbs
,
Thomas Ristenpart
Authenticated Encryption with Key Identification.
ASIACRYPT (3)
(2022)
Charanjit S. Jutla
,
Sikhar Patranabis
Efficient Searchable Symmetric Encryption for Join Queries.
ASIACRYPT (3)
(2022)
Jeroen Pijnenburg
,
Bertram Poettering
On Secure Ratcheting with Immediate Decryption.
ASIACRYPT (3)
(2022)
Jiamin Cui
,
Kai Hu
,
Meiqin Wang
,
Puwen Wei
On the Field-Based Division Property: Applications to MiMC, Feistel MiMC and GMiMC.
ASIACRYPT (3)
(2022)
Kang Yang
,
Xiao Wang
Non-interactive Zero-Knowledge Proofs to Multiple Verifiers.
ASIACRYPT (3)
(2022)
Brian Chen
,
Yevgeniy Dodis
,
Esha Ghosh
,
Eli Goldin
,
Balachandar Kesavan
,
Antonio Marcedone
,
Merry Ember Mou
Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency.
ASIACRYPT (3)
(2022)
Yi Deng
,
Xinxuan Zhang
Knowledge Encryption and Its Applications to Simulatable Protocols with Low Round-Complexity.
ASIACRYPT (3)
(2022)
You Lyu
,
Shengli Liu
,
Shuai Han
,
Dawu Gu
Privacy-Preserving Authenticated Key Exchange in the Standard Model.
ASIACRYPT (3)
(2022)
Hanlin Liu
,
Yu Yu
A Non-heuristic Approach to Time-Space Tradeoffs and Optimizations for BKW.
ASIACRYPT (3)
(2022)
Matteo Campanelli
,
Bernardo David
,
Hamidreza Khoshakhlagh
,
Anders Konring
,
Jesper Buus Nielsen
Encryption to the Future - A Paradigm for Sending Secret Messages to Future (Anonymous) Committees.
ASIACRYPT (3)
(2022)
Joël Felderhoff
,
Alice Pellet-Mary
,
Damien Stehlé
On Module Unique-SVP and NTRU.
ASIACRYPT (3)
(2022)
Jiaxin Pan
,
Runzhi Zeng
Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.
ASIACRYPT (3)
(2022)
Jie Chen
,
Yu Li
,
Jinming Wen
,
Jian Weng
Identity-Based Matchmaking Encryption from Standard Assumptions.
ASIACRYPT (3)
(2022)
Joseph Jaeger
,
Akshaya Kumar
Memory-Tight Multi-challenge Security of Public-Key Encryption.
ASIACRYPT (3)
(2022)
Zhengan Huang
,
Junzuo Lai
,
Shuai Han
,
Lin Lyu
,
Jian Weng
Anonymous Public Key Encryption Under Corruptions.
ASIACRYPT (3)
(2022)
Patrick Derbez
,
Marie Euler
,
Pierre-Alain Fouque
,
Phuong Hoa Nguyen
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool.
ASIACRYPT (3)
(2022)
Olivier Bernard
,
Andrea Lesavourey
,
Tuong-Huy Nguyen
,
Adeline Roux-Langlois
-unit Lattices Using Explicit Stickelberger Generators to Solve Approx Ideal-SVP.
ASIACRYPT (3)
(2022)
Jian Guo
,
Guozhen Liu
,
Ling Song
,
Yi Tu
Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks Against 6-Round SHA-3.
ASIACRYPT (3)
(2022)
Benjamin Dowling
,
Eduard Hauck
,
Doreen Riepel
,
Paul Rösler
Strongly Anonymous Ratcheted Key Exchange.
ASIACRYPT (3)
(2022)
volume 13793, 2022
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III
ASIACRYPT (3)
13793 (2022)
2021
Stefano Tessaro
,
Xihu Zhang
Tight Security for Key-Alternating Ciphers with Correlated Sub-keys.
ASIACRYPT (3)
(2021)
Soumya Chattopadhyay
,
Ashwin Jha
,
Mridul Nandi
Fine-Tuning the ISO/IEC Standard LightMAC.
ASIACRYPT (3)
(2021)
Benedikt Bünz
,
Mary Maller
,
Pratyush Mishra
,
Nirvan Tyagi
,
Psi Vesely
Proofs for Inner Pairing Products and Applications.
ASIACRYPT (3)
(2021)
Matteo Campanelli
,
Antonio Faonio
,
Dario Fiore
,
Anaïs Querol
,
Hadrián Rodríguez
Lunar: A Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions.
ASIACRYPT (3)
(2021)
Rishab Goyal
,
Sam Kim
,
Brent Waters
,
David J. Wu
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions.
ASIACRYPT (3)
(2021)
Srimanta Bhattacharya
,
Mridul Nandi
Luby-Rackoff Backwards with More Users and More Security.
ASIACRYPT (3)
(2021)
volume 13092, 2021
Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III
ASIACRYPT (3)
13092 (2021)