


default search action
31st ASIACRYPT 2025: Melbourne, VIC, Australia - Part III
- Goichiro Hanaoka

, Bo-Yin Yang
:
Advances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8-12, 2025, Proceedings, Part III. Lecture Notes in Computer Science 16247, Springer 2026, ISBN 978-981-95-5098-2
Lattices
- Daniël M. H. van Gent, Wessel P. J. van Woerden:

A Search to Distinguish Reduction for the Isomorphism Problem on Direct Sum Lattices. 3-33 - Hongyuan Qu, Guangwu Xu:

On the Provable Dual Attack for LWE by Modulus Switching. 34-64 - Léo Ducas, Ludo N. Pulles, Marc Stevens:

Towards a Modern LLL Implementation. 65-99 - Alexander Karenin, Elena Kirshanova, Julian Nowakowski, Alexander May:

Fast Slicer for Batch-CVP: Making Lattice Hybrid Attacks Practical. 100-132 - Léo Ducas, Lynn Engelberts, Paola de Perthuis:

Predicting Module-Lattice Reduction. 133-166 - Zhedong Wang, Haoxiang Jin, Feng-Hao Liu, Yang Yu:

Revisiting the Robustness of (R/M)LWR Under Polynomial Moduli with Its Applications. 167-199 - Corentin Jeudy, Olivier Sanders:

Worst-Case Lattice Sampler with Truncated Gadgets and Applications. 200-232 - Shiduo Zhang, Huiwen Jia, Delong Ran, Yang Yu, Yu Yu, Xiaoyun Wang:

GPV Preimage Sampling with Weak Smoothness and Its Applications to Lattice Signatures. 233-264 - Martin R. Albrecht, Russell W. F. Lai, Oleksandra Lapiha, Ivy K. Y. Woo:

Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally. 265-296 - Michael Klooß, Russell W. F. Lai, Ngoc Khanh Nguyen, Michal Osadnik:

RoK and Roll - Verifier-Efficient Random Projection for O~(λ)-Size Lattice Arguments - (Extended Abstract). 297-329 - Dan Boneh, Binyi Chen:

LatticeFold: A Lattice-Based Folding Scheme and Its Applications to Succinct Proof Systems. 330-362 - Shuiyin Liu, Amin Sakzad:

Compact Lattice-Coded (Multi-recipient) Kyber Without CLT Independence Assumption. 363-395 - Yijian Liu, Yu Zhang, Xianhui Lu, Yao Cheng, Yongjian Yin:

DAWN: Smaller and Faster NTRU Encryption via Double Encoding. 396-427 - Zeyu Liu, Katerina Sotiraki, Eran Tromer, Yunhao Wang:

Lattice-Based Multi-message Multi-recipient KEM/PKE with Malicious Security. 428-460 - Oleksandra Lapiha, Thomas Prest:

A Lattice-Based IND-CCA Threshold KEM from the BCHK+ Transform. 461-494 - Weidan Ji, Zhedong Wang, Lin Lyu, Dawu Gu:

Revisiting Adaptively Secure IBE from Lattices with Smaller Modulus: A Conceptually Simple Framework with Low Overhead. 495-526

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














