default search action
41st CRYPTO 2021: Virtual Event - Part III
- Tal Malkin, Chris Peikert:
Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part III. Lecture Notes in Computer Science 12827, Springer 2021, ISBN 978-3-030-84251-2
Models
- Christian Badertscher, Yun Lu, Vassilis Zikas:
A Rational Protocol Treatment of 51% Attacks. 3-32 - Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrótniak:
MoSS: Modular Security Specifications Framework. 33-63 - Ashrujit Ghoshal, Stefano Tessaro:
Tight State-Restoration Soundness in the Algebraic Group Model. 64-93 - Haim Kaplan, Yishay Mansour, Kobbi Nissim, Uri Stemmer:
Separating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage Model. 94-121
Applied Cryptography and Side Channels
- Manuel Barbosa, Alexandra Boldyreva, Shan Chen, Bogdan Warinschi:
Provable Security Analysis of FIDO2. 125-156 - Angèle Bossuat, Raphael Bost, Pierre-Alain Fouque, Brice Minaud, Michael Reichle:
SSE and SSD: Page-Efficient Searchable Symmetric Encryption. 157-184 - Gaëtan Cassiers, Sebastian Faust, Maximilian Orlt, François-Xavier Standaert:
Towards Tight Random Probing Security. 185-214 - Jean-Sébastien Coron, Lorenzo Spignoli:
Secure Wire Shuffling in the Probing Model. 215-244
Cryptanalysis
- Meicheng Liu, Xiaojuan Lu, Dongdai Lin:
Differential-Linear Cryptanalysis from an Algebraic Perspective. 247-277 - Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. 278-308 - Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting. 309-336 - Nicolas Bordes, Joan Daemen, Daniël Kuijsters, Gilles Van Assche:
Thinking Outside the Superbox. 337-367 - Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. 368-401 - Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. 402-431 - Victoria de Quehen, Péter Kutas, Chris Leonardi, Chloe Martindale, Lorenz Panny, Christophe Petit, Katherine E. Stange:
Improved Torsion-Point Attacks on SIDH Variants. 432-470
Codes and Extractors
- Yu Yu, Jiang Zhang:
Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for LPN. 473-501 - Geoffroy Couteau, Peter Rindal, Srinivasan Raghuraman:
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes. 502-534 - Dana Dachman-Soled, Ilan Komargodski, Rafael Pass:
Non-malleable Codes for Bounded Parallel-Time Tampering. 535-565 - Dakshita Khurana, Akshayaram Srinivasan:
Improved Computational Extractors and Their Applications. 566-594 - Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing. 595-624
Secret Sharing
- Benny Applebaum, Oded Nir:
Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n. 627-655 - Ronald Cramer, Matthieu Rambaud, Chaoping Xing:
Asymptotically-Good Arithmetic Secret Sharing over $\mathbb {Z}/p^{\ell }\mathbb {Z}$ with Strong Multiplication and Its Applications to Efficient MPC. 656-686 - Lawrence Roy, Jaspal Singh:
Large Message Homomorphic Secret Sharing from DCR and Applications. 687-717 - Vipul Goyal, Yifan Song, Akshayaram Srinivasan:
Traceable Secret Sharing and Applications. 718-747 - Amos Beimel, Hussien Othman, Naty Peter:
Quadratic Secret Sharing and Conditional Disclosure of Secrets. 748-778 - Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes. 779-808
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.