


default search action
26th ASIACRYPT 2020: Daejeon, South Korea - Part I
- Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12491, Springer 2020, ISBN 978-3-030-64836-7
Best Paper Awards
- Akinori Hosoyamada, Takashi Yamakawa:
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness. 3-32 - Antonio Flórez-Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras:
New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions. 33-63 - Luca De Feo
, David Kohel, Antonin Leroux, Christophe Petit
, Benjamin Wesolowski:
SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies. 64-93
Encryption Schemes
- Olivier Blazy, Patrick Towa, Damien Vergnaud:
Public-Key Generation with Verifiable Randomness. 97-127 - Benoît Libert, Khoa Nguyen
, Alain Passelègue, Radu Titiu:
Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security. 128-158 - Valerio Cini, Sebastian Ramacher
, Daniel Slamanig
, Christoph Striecks
:
CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors. 159-190 - Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. 191-220 - Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels:
Security Reductions for White-Box Key-Storage in Mobile Payments. 221-252 - Fuyuki Kitagawa, Takahiro Matsuda:
Circular Security Is Complete for KDM Security. 253-285
Post-quantum Cryptography
- Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore
, Thomas Prest
:
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications. 289-320 - Dominique Unruh:
Post-Quantum Verification of Fujisaki-Okamoto. 321-352 - Qian Guo
, Thomas Johansson
:
A New Decryption Failure Attack Against HQC. 353-382
Cryptanalysis
- Seyyed Arash Azimi, Adrián Ranea
, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
:
A Bit-Vector Differential Model for the Modular Addition by a Constant. 385-414 - Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. 415-445 - Kai Hu, Siwei Sun, Meiqin Wang, Qingju Wang
:
An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums. 446-476 - Maria Eichlseder
, Lorenzo Grassi
, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
:
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC. 477-506 - Magali Bardet, Maxime Bros
, Daniel Cabarcas, Philippe Gaborit, Ray A. Perlner, Daniel Smith-Tone, Jean-Pierre Tillich, Javier A. Verbel:
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems. 507-536 - Phil Hebborn, Baptiste Lambin, Gregor Leander
, Yosuke Todo
:
Lower Bounds on the Degree of Block Ciphers. 537-566 - Chun Guo, Jian Guo, Eik List, Ling Song:
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT). 567-597
Symmetric Key Cryptography
- Avijit Dutta:
Minimizing the Two-Round Tweakable Even-Mansour Cipher. 601-629 - Bart Mennink:
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption. 630-661 - Yusai Wu, Liqing Yu, Zhenfu Cao
, Xiaolei Dong:
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation. 662-693
Message Authentication Codes
- Wonseok Choi, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee:
Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs. 697-723 - Andrew Morgan, Rafael Pass
, Elaine Shi:
On the Adaptive Security of MACs and PRFs. 724-753 - Benoît Cogliati, Ashwin Jha, Mridul Nandi:
How to Build Optimally Secure PRFs Using Block Ciphers. 754-784
Side-Channel Analysis
- David Knichel
, Pascal Sasdrich
, Amir Moradi
:
SILVER - Statistical Independence and Leakage Verification. 787-816 - Tim Beyne
, Siemen Dhooghe
, Zhenda Zhang
:
Cryptanalysis of Masked Ciphers: A Not So Random Idea. 817-850 - Weijia Wang
, Chun Guo, François-Xavier Standaert
, Yu Yu, Gaëtan Cassiers:
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking? 851-880 - Norman Lahr
, Ruben Niederhagen, Richard Petri, Simona Samardjiska:
Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation. 881-910

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.