


default search action
ASIACRYPT 2018: Brisbane, QLD, Australia
- Thomas Peyrin, Steven D. Galbraith:

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11272, Springer 2018, ISBN 978-3-030-03325-5
Asiacrypt 2018 Best Paper
- Tim Beyne

:
Block Cipher Invariants as Eigenvectors of Correlation Matrices. 3-31
Post-Quantum Cryptanalysis
- Ward Beullens, Simon R. Blackburn:

Practical Attacks Against the Walnut Digital Signature Scheme. 35-61 - Thomas Debris-Alazard, Jean-Pierre Tillich:

Two Attacks on Rank Metric Code-Based Schemes: RankSign and an IBE Scheme. 62-92 - Élise Barelli, Alain Couvreur:

An Efficient Structural Attack on NIST Submission DAGS. 93-118
Encrypted Storage
- Nicolas Desmoulins, Pierre-Alain Fouque

, Cristina Onete, Olivier Sanders:
Pattern Matching on Encrypted Streams. 121-148 - Seny Kamara, Tarik Moataz:

SQL on Structurally-Encrypted Databases. 149-180 - David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry

, Cong Zhang:
Parameter-Hiding Order Revealing Encryption. 181-210
Symmetric-Key Constructions
- Chun Guo, Lei Wang:

Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security. 213-243 - Yu Long Chen, Bart Mennink, Mridul Nandi

:
Short Variable Length Domain Extenders with Beyond Birthday Bound Security. 244-274 - Akinori Hosoyamada

, Kan Yasuda:
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions. 275-304 - ByeongHak Lee, Jooyoung Lee:

Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model. 305-335 - Ritam Bhaumik, Eik List, Mridul Nandi

:
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls. 336-366
Lattice-Based Cryptography
- Shi Bai, Damien Stehlé, Weiqiang Wen:

Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ. 369-404 - Yoshinori Aono, Phong Q. Nguyen, Yixin Shen

:
Quantum Lattice Enumeration and Tweaking Discrete Pruning. 405-434 - Long Chen, Zhenfeng Zhang, Zhenfei Zhang:

On the Hardness of the Computational Ring-LWR Problem and Its Applications. 435-464 - Léo Ducas, Alice Pellet-Mary:

On the Statistical Leak of the GGH13 Multilinear Map and Some Variants. 465-493 - Jonathan Bootle

, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque
, Mehdi Tibouchi:
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS. 494-524
Quantum Symmetric Cryptanalysis
- Lorenzo Grassi

, María Naya-Plasencia, André Schrottenloher:
Quantum Algorithms for the k -xor Problem. 527-559 - Xavier Bonnetain, María Naya-Plasencia:

Hidden Shift Quantum Cryptanalysis and Implications. 560-592
Zero-Knowledge
- Jonathan Bootle

, Andrea Cerulli, Jens Groth
, Sune K. Jakobsen, Mary Maller:
Arya: Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution. 595-626 - Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy:

Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications. 627-656

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














