researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1990
1991
1992
1993
1994
1995
1996
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
Filter by Tag
[+]
OR
AND
NOT
1
algebra
C++
Meta-Environment
Pascal
analysis
architecture
certification
data-flow
design
e-science
graph-rewriting
meta-model
protocol
redundancy
rewriting
rule-based
search
security
systematic-approach
testing
Filter by Author
[+]
OR
AND
NOT
1
Amit Sahai
Bart Mennink
Bart Preneel
Benoît Libert
Damien Stehlé
Dan Boneh
David Pointcheval
Hideki Imai
Huaxiong Wang
Jonathan Katz
Josef Pieprzyk
Kaoru Kurosawa
Marc Fischlin
Masayuki Abe
Mihir Bellare
Moti Yung
Mridul Nandi
Pierre-Alain Fouque
Serge Vaudenay
Yu Sasaki
Filter by Top terms
[+]
OR
AND
NOT
1
advances
application
applications
asiacrypt
attacks
conference
cryptanalysis
cryptology
efficient
encryption
functions
information
key
proceedings
quantum
schemes
secure
security
signatures
theory
ASIACRYPT (asiacrypt)
Editions
Publications
Viewing Publication 1 - 100 from 1770
2025
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VIII
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15491 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15489 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part V
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15488 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part IV
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15487 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15484 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15485 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15490 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15486 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part IX
Kai-Min Chung
,
Yu Sasaki
, editors,
Volume 15492 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
2024
Toward Full n-bit Security and Nonce Misuse Resistance of Block Cipher-Based MACs
Wonseok Choi 0002
,
Jooyoung Lee 0001
,
Yeongmin Lee
.
asiacrypt 2025
:
251-279
[doi]
SQIsign2D-West - The Fast, the Small, and the Safer
Andrea Basso 0002
,
Pierrick Dartois
,
Luca De Feo
,
Antonin Leroux
,
Luciano Maino
,
Giacomo Pope
,
Damien Robert 0001
,
Benjamin Wesolowski
.
asiacrypt 2025
:
339-370
[doi]
Traitor Tracing Without Trusted Authority from Registered Functional Encryption
Pedro Branco 0005
,
Russell W. F. Lai
,
Monosij Maitra
,
Giulio Malavolta
,
Ahmadreza Rahimi
,
Ivy K. Y. Woo
.
asiacrypt 2025
:
33-66
[doi]
Interactive Threshold Mercurial Signatures and Applications
Masayuki Abe
,
Masaya Nanri
,
Octavio Perez-Kempner
,
Mehdi Tibouchi
.
asiacrypt 2025
:
69-103
[doi]
Concurrent Encrypted Multimaps
Archita Agarwal
,
Seny Kamara
,
Tarik Moataz
.
asiacrypt 2025
:
169-201
[doi]
Honest Majority GOD MPC with O(sfdepth(C)) Rounds and Low Online Communication
Amit Agarwal
,
Alexander Bienstock
,
Ivan Damgård
,
Daniel Escudero 0001
.
asiacrypt 2025
:
234-265
[doi]
Verifiable Oblivious Pseudorandom Functions from Lattices: Practical-Ish and Thresholdisable
Martin R. Albrecht
,
Kamil Doruk Gür
.
asiacrypt 2025
:
205-237
[doi]
Randomness in Private Sequential Stateless Protocols
Hari Krishnan P. Anilkumar
,
Varun Narayanan
,
Manoj Prabhakaran 0001
,
Vinod M. Prabhakaran
.
asiacrypt 2025
:
36-66
[doi]
MinRank Gabidulin Encryption Scheme on Matrix Codes
Nicolas Aragon
,
Alain Couvreur
,
Victor Dyseryn
,
Philippe Gaborit
,
Adrien Vinçotte
.
asiacrypt 2025
:
68-100
[doi]
C'est Très CHIC: A Compact Password-Authenticated Key Exchange from Lattice-Based KEM
Afonso Arriaga
,
Manuel Barbosa
,
Stanislaw Jarecki
,
Marjan Skrobot
.
asiacrypt 2025
:
3-33
[doi]
Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity
Saikrishna Badrinarayanan
,
Peihan Miao 0001
,
Xinyi Shi
,
Max Tromanhauser
,
Ruida Zeng
.
asiacrypt 2025
:
200-233
[doi]
Bootstrapping Small Integers With CKKS
Youngjin Bae
,
Jaehyung Kim 0002
,
Damien Stehlé
,
Elias Suvanto
.
asiacrypt 2025
:
330-360
[doi]
+, Formally Verified
Manuel Barbosa
,
François Dupressoir
,
Andreas Hülsing
,
Matthias Meijers
,
Pierre-Yves Strub
.
asiacrypt 2025
:
35-67
[doi]
On the Semidirect Discrete Logarithm Problem in Finite Groups
Christopher Battarbee
,
Giacomo Borin
,
Julian Brough
,
Ryann Cartor
,
Tobias Hemmert
,
Nadia Heninger
,
David Jao
,
Delaram Kahrobaei
,
Laura Maddison
,
Edoardo Persichetti
,
Angela Robinson
,
Daniel Smith-Tone
,
Rainer Steinwandt
.
asiacrypt 2025
:
330-357
[doi]
On Security Proofs of Existing Equivalence Class Signature Schemes
Balthazar Bauer
,
Georg Fuchsbauer
,
Fabian Regen
.
asiacrypt 2025
:
3-37
[doi]
Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic
Mariya Georgieva Belorgey
,
Sergiu Carpov
,
Nicolas Gama
,
Sandra Guasch
,
Dimitar Jetchev
.
asiacrypt 2025
:
176-207
[doi]
Ultrametric Integral Cryptanalysis
Tim Beyne
,
Michiel Verbauwhede
.
asiacrypt 2025
:
392-423
[doi]
Mind the Bad Norms - Revisiting Compressed Oracle-Based Quantum Indistinguishability Proofs
Ritam Bhaumik
,
Benoît Cogliati
,
Jordan Ethan
,
Ashwin Jha 0001
.
asiacrypt 2025
:
215-247
[doi]
Leakage-Resilient Incompressible Cryptography: Constructions and Barriers
Kaartik Bhushan
,
Rishab Goyal
,
Venkata Koppula
,
Varun Narayanan
,
Manoj Prabhakaran 0001
,
Mahesh Sreekumar Rajasree
.
asiacrypt 2025
:
201-234
[doi]
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank
Loïc Bidoux
,
Thibauld Feneuil
,
Philippe Gaborit
,
Romaric Neveu
,
Matthieu Rivain
.
asiacrypt 2025
:
38-69
[doi]
Interval Key-Encapsulation Mechanism
Alexander Bienstock
,
Yevgeniy Dodis
,
Paul Rösler
,
Daniel Wichs
.
asiacrypt 2025
:
361-393
[doi]
FOLEAGE: $\mathbb {F}_{\scriptstyle 4}$OLE-Based Multi-party Computation for Boolean Circuits
Maxime Bombar
,
Dung Bui
,
Geoffroy Couteau
,
Alain Couvreur
,
Clément Ducros
,
Sacha Servan-Schreiber
.
asiacrypt 2025
:
69-101
[doi]
Multiple-Tweak Differential Attack Against SCARF
Christina Boura
,
Shahram Rasoolzadeh
,
Dhiman Saha
,
Yosuke Todo
.
asiacrypt 2025
:
330-360
[doi]
Post-quantum Asynchronous Remote Key Generation for FIDO2
Jacqueline Brendel
,
Sebastian Clermont
,
Marc Fischlin
.
asiacrypt 2025
:
465-493
[doi]
Evasive LWE Assumptions: Definitions, Classes, and Counterexamples
Chris Brzuska
,
Akin Ünal
,
Ivy K. Y. Woo
.
asiacrypt 2025
:
418-449
[doi]
Don't Use it Twice! Solving Relaxed Linear Equivalence Problems
Alessandro Budroni
,
Jesús-Javier Chi-Domínguez
,
Giuseppe D'Alconzo
,
Antonio J. Di Scala
,
Mukul Kulkarni
.
asiacrypt 2025
:
35-65
[doi]
Faster Signatures from MPC-in-the-Head
Dung Bui
,
Eliana Carozza
,
Geoffroy Couteau
,
Dahmun Goudarzi
,
Antoine Joux
.
asiacrypt 2025
:
396-428
[doi]
Proofs for Deep Thought: Accumulation for Large Memories and Deterministic Computations
Benedikt Bünz
,
Jessica Chen
.
asiacrypt 2025
:
269-301
[doi]
Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity
Ignacio Cascudo
,
Daniele Cozzo
,
Emanuele Giunta
.
asiacrypt 2025
:
100-128
[doi]
Partially Non-interactive Two-Round Lattice-Based Threshold Signatures
Rutchathon Chairattana-Apirom
,
Stefano Tessaro
,
Chenzhi Zhu
.
asiacrypt 2025
:
268-302
[doi]
Homomorphic Sign Evaluation with a RNS Representation of Integers
Philippe Chartier
,
Michel Koskas
,
Mohammed Lemou
,
Florian Méhats
.
asiacrypt 2025
:
271-296
[doi]
Reducing the Number of Qubits in Quantum Information Set Decoding
Clémence Chevignard
,
Pierre-Alain Fouque
,
André Schrottenloher
.
asiacrypt 2025
:
299-329
[doi]
Provable Security of Linux-DRBG in the Seedless Robustness Model
Woohyuk Chung
,
Hwigyeom Kim
,
Jooyoung Lee 0001
,
Yeongmin Lee
.
asiacrypt 2025
:
461-490
[doi]
Unbounded ABE for Circuits from LWE, Revisited
Valerio Cini
,
Hoeteck Wee
.
asiacrypt 2025
:
238-267
[doi]
Improved Quantum Lifting by Coherent Measure-and-Reprogram
Alexandru Cojocaru
,
Juan A. Garay
,
Qipeng Liu
,
Fang Song 0001
.
asiacrypt 2025
:
158-184
[doi]
QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup
Geoffroy Couteau
,
Lalita Devadas
,
Srinivas Devadas
,
Alexander Koch 0001
,
Sacha Servan-Schreiber
.
asiacrypt 2025
:
197-231
[doi]
An Algorithmic Approach to (2, 2)-Isogenies in the Theta Model and Applications to Isogeny-Based Cryptography
Pierrick Dartois
,
Luciano Maino
,
Giacomo Pope
,
Damien Robert 0001
.
asiacrypt 2025
:
304-338
[doi]
Registered FE Beyond Predicates: (Attribute-Based) Linear Functions and More
Pratish Datta
,
Tapas Pal
,
Shota Yamada
.
asiacrypt 2025
:
65-104
[doi]
MuxProofs: Succinct Arguments for Machine Computation from Vector Lookups
Zijing Di
,
Lucas Xia
,
Wilson D. Nguyen
,
Nirvan Tyagi
.
asiacrypt 2025
:
236-265
[doi]
SQIPrime: A Dimension 2 Variant of SQISignHD with Non-smooth Challenge Isogenies
Max Duparc
,
Tako Boris Fouotsa
.
asiacrypt 2025
:
396-429
[doi]
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs
Moumita Dutta
,
Chaya Ganesh
,
Sikhar Patranabis
,
Nitin Singh
.
asiacrypt 2025
:
133-166
[doi]
Strongly Secure Universal Thresholdizer
Ehsan Ebrahimi
,
Anshu Yadav
.
asiacrypt 2025
:
207-239
[doi]
Lova: Lattice-Based Folding Scheme from Unstructured Lattices
Giacomo Fenzi
,
Christian Knabenhans
,
Ngoc Khanh Nguyen 0001
,
Duc Tu Pham
.
asiacrypt 2025
:
303-326
[doi]
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT
Nils Fleischhacker
,
Mathias Hall-Andersen
,
Mark Simkin 0001
.
asiacrypt 2025
:
423-453
[doi]
Jackpot: Non-interactive Aggregatable Lotteries
Nils Fleischhacker
,
Mathias Hall-Andersen
,
Mark Simkin 0001
,
Benedikt Wagner
.
asiacrypt 2025
:
365-397
[doi]
General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES
Antonio Flórez-Gutiérrez
,
Lorenzo Grassi 0001
,
Gregor Leander
,
Ferdinand Sibleyras
,
Yosuke Todo
.
asiacrypt 2025
:
280-311
[doi]
Evolving Secret Sharing Made Short
Danilo Francati
,
Daniele Venturi 0001
.
asiacrypt 2025
:
69-99
[doi]
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-Based Attacks
Yiming Gao
,
Jinghui Wang
,
Honggang Hu
,
Binang He
.
asiacrypt 2025
:
3-34
[doi]
FLI: Folding Lookup Instances
Albert Garreta
,
Ignacio Manzur
.
asiacrypt 2025
:
402-435
[doi]
Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model
Jiangxia Ge
,
Heming Liao
,
Rui Xue 0001
.
asiacrypt 2025
:
3-34
[doi]
Delegatable Anonymous Credentials from Mercurial Signatures with Stronger Privacy
Scott Griffy
,
Anna Lysyanskaya
,
Omid Mir
,
Octavio Perez-Kempner
,
Daniel Slamanig
.
asiacrypt 2025
:
296-325
[doi]
Threshold PAKE with Security Against Compromise of All Servers
Yanqi Gu
,
Stanislaw Jarecki
,
Pawel Kedzior
,
Phillip Nazarian
,
Jiayu Xu
.
asiacrypt 2025
:
66-100
[doi]
Revisiting OKVS-Based OPRF and PSI: Cryptanalysis and Better Construction
Kyoohyung Han
,
Seongkwang Kim
,
ByeongHak Lee
,
Yongha Son
.
asiacrypt 2025
:
266-296
[doi]
sfLogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK
Carmit Hazay
,
David Heath
,
Vladimir Kolesnikov
,
Muthuramakrishnan Venkitasubramaniam
,
Yibin Yang 0001
.
asiacrypt 2025
:
367-401
[doi]
Robust AE With Committing Security
Viet Tung Hoang
,
Sanketh Menda
.
asiacrypt 2025
:
312-342
[doi]
Quantum Algorithms for Fast Correlation Attacks on LFSR-Based Stream Ciphers
Akinori Hosoyamada
.
asiacrypt 2025
:
396-430
[doi]
Dictators? Friends? Forgers. - Breaking and Fixing Unforgeability Definitions for Anamorphic Signature Schemes
Joseph Jaeger
,
Roy Stracovsky
.
asiacrypt 2025
:
105-137
[doi]
More Vulnerabilities of Linear Structure Sbox-Based Ciphers Reveal Their Inability to Resist DFA
Amit Jana
,
Anup Kumar Kundu
,
Goutam Paul 0001
.
asiacrypt 2025
:
168-203
[doi]
Unclonable Non-interactive Zero-Knowledge
Ruta Jawale
,
Dakshita Khurana
.
asiacrypt 2025
:
94-128
[doi]
Analysis on Sliced Garbling via Algebraic Approach
Taechan Kim
.
asiacrypt 2025
:
237-265
[doi]
RoK, Paper, SISsors Toolkit for Lattice-Based Succinct Arguments - (Extended Abstract)
Michael Klooß
,
Russell W. F. Lai
,
Ngoc Khanh Nguyen
,
Michal Osadnik
.
asiacrypt 2025
:
203-235
[doi]
Practical Blind Signatures in Pairing-Free Groups
Michael Klooß
,
Michael Reichle
,
Benedikt Wagner
.
asiacrypt 2025
:
363-395
[doi]
The First Practical Collision for 31-Step SHA-256
Yingxin Li
,
Fukang Liu
,
Gaoli Wang
,
Xiaoyang Dong 0001
,
Siwei Sun
.
asiacrypt 2025
:
237-266
[doi]
Non-malleable Subvector Commitments
Benoît Libert
.
asiacrypt 2025
:
3-32
[doi]
Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation
Fuchun Lin
,
Chaoping Xing
,
Yizhou Yao
.
asiacrypt 2025
:
337-366
[doi]
On the Spinor Genus and the Distinguishing Lattice Isomorphism Problem
Cong Ling
,
Jingbo Liu
,
Andrew Mendelsohn
.
asiacrypt 2025
:
329-358
[doi]
Relaxed Functional Bootstrapping: A New Perspective on BGV/BFV Bootstrapping
Zeyu Liu
,
Yunhao Wang
.
asiacrypt 2025
:
208-240
[doi]
Dishonest Majority Multiparty Computation over Matrix Rings
Hongqing Liu
,
Chaoping Xing
,
Chen Yuan 0003
,
Taoxu Zou
.
asiacrypt 2025
:
299-327
[doi]
Adaptor Signatures: New Security Definition and a Generic Construction for NP Relations
Xiangyu Liu
,
Ioannis Tzannetos
,
Vassilis Zikas
.
asiacrypt 2025
:
168-193
[doi]
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit
Fukang Liu
,
Mohammad Mahzoun
,
Willi Meier
.
asiacrypt 2025
:
424-456
[doi]
Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms
Hengyi Luo
,
Kaijie Jiang
,
Yanbin Pan
,
Anyu Wang 0001
.
asiacrypt 2025
:
359-385
[doi]
Efficient Asymmetric PAKE Compiler from KEM and AE
You Lyu
,
Shengli Liu 0001
,
Shuai Han 0001
.
asiacrypt 2025
:
34-65
[doi]
Faster BGV Bootstrapping for Power-of-Two Cyclotomics Through Homomorphic NTT
Shihe Ma
,
Tairong Huang
,
Anyu Wang 0001
,
Xiaoyun Wang 0001
.
asiacrypt 2025
:
143-175
[doi]
Extending Class Group Action Attacks via Sesquilinear Pairings
Joseph Macula
,
Katherine E. Stange
.
asiacrypt 2025
:
371-395
[doi]
ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature Schemes
Puja Mondal
,
Supriya Adhikary
,
Suparna Kundu
,
Angshuman Karmakar
.
asiacrypt 2025
:
132-167
[doi]
Quantum Money from Class Group Actions on Elliptic Curves
Hart Montgomery
,
Shahed Sharif
.
asiacrypt 2025
:
33-64
[doi]
Quantum Unpredictability
Tomoyuki Morimae
,
Shogo Yamada
,
Takashi Yamakawa
.
asiacrypt 2025
:
3-32
[doi]
SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies
Kohei Nakagawa
,
Hiroshi Onuki
,
Wouter Castryck
,
Mingjie Chen
,
Riccardo Invernizzi
,
Gioella Lorenzon
,
Frederik Vercauteren
.
asiacrypt 2025
:
272-303
[doi]
One-More Unforgeability for Multi - and Threshold Signatures
Sela Navot
,
Stefano Tessaro
.
asiacrypt 2025
:
429-462
[doi]
Ideal-to-Isogeny Algorithm Using 2-Dimensional Isogenies and Its Application to SQIsign
Hiroshi Onuki
,
Kohei Nakagawa
.
asiacrypt 2025
:
243-271
[doi]
Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus
Duong Hieu Phan
,
Weiqiang Wen
,
Xingyu Yan
,
Jinwei Zheng
.
asiacrypt 2025
:
185-214
[doi]
Digital Signatures with Outsourced Hashing
Bertram Poettering
,
Simon Rastikian
.
asiacrypt 2025
:
138-167
[doi]
Rare Structures in Tensor Graphs - Bermuda Triangles for Cryptosystems Based on the Tensor Isomorphism Problem
Lars Ran
,
Simona Samardjiska
.
asiacrypt 2025
:
66-96
[doi]
Actively Secure Polynomial Evaluation from Shared Polynomial Encodings
Pascal Reisert
,
Marc Rivinius
,
Toomas Krips
,
Sebastian Hasler
,
Ralf Küsters
.
asiacrypt 2025
:
3-35
[doi]
Crooked Indifferentiability of the Feistel Construction
Alexander Russell
,
Qiang Tang 0005
,
Jiadong Zhu
.
asiacrypt 2025
:
427-460
[doi]
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions
Sacha Servan-Schreiber
.
asiacrypt 2025
:
232-265
[doi]
Quantum Circuits of AES with a Low-Depth Linear Layer and a New Structure
Haotian Shi
,
Xiutao Feng
.
asiacrypt 2025
:
358-395
[doi]
Key Collisions on AES and Its Applications
Kodai Taiyama
,
Kosei Sakamoto
,
Ryoma Ito 0001
,
Kazuma Taka
,
Takanori Isobe 0001
.
asiacrypt 2025
:
267-300
[doi]
Dense and Smooth Lattices in Any Genus
Wessel P. J. van Woerden
.
asiacrypt 2025
:
386-417
[doi]
The Boomerang Chain Distinguishers: New Record for 6-Round AES
Xueping Yan
,
Lin Tan 0003
,
Hong Xu 0008
,
Wen-Feng Qi 0001
.
asiacrypt 2025
:
301-329
[doi]
CPA-Secure KEMs are also Sufficient for Post-quantum TLS 1.3
Biming Zhou
,
Haodong Jiang
,
Yunlei Zhao
.
asiacrypt 2025
:
433-464
[doi]
Sign in
or
sign up
to see more results.