researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
Filter by Tag
[+]
OR
AND
NOT
1
algebra
C++
Markov
Pascal
access control
analysis
architecture
caching
data-flow
design
discovery
e-science
logic
optimization
protocol
rule-based
search
security
tagging
testing
Filter by Author
[+]
OR
AND
NOT
1
Alex Biryukov
Amr M. Youssef
Andrey Bogdanov
Bart Preneel
Charles Bouillaguet
Christian Rechberger
Christoph Dobraunig
Douglas R. Stinson
Florian Mendel
Guang Gong
Kazuhiko Minematsu
Kazumaro Aoki
María Naya-Plasencia
Meiqin Wang
Nigel P. Smart
Orr Dunkelman
Pierre-Alain Fouque
Serge Vaudenay
Wenling Wu
Yu Sasaki
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
attack
attacks
block
cipher
ciphers
cryptanalysis
cryptography
curves
differential
efficient
encryption
functions
hash
improved
key
new
reduced
round
security
Selected Areas in Cryptography (sacrypt)
Editions
Publications
Viewing Publication 1 - 100 from 657
2024
Selected Areas in Cryptography - SAC 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers
Claude Carlet
,
Kalikinkar Mandal
,
Vincent Rijmen
, editors,
Volume 14201 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
2023
Generalized Implicit Factorization Problem
Yansong Feng 0001
,
Abderrahmane Nitaj
,
Yanbin Pan
.
sacrypt 2024
:
369-384
[doi]
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies
Andrea Basso 0002
.
sacrypt 2024
:
147-168
[doi]
CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives
Emanuele Bellini 0002
,
David Gérault
,
Juan Grados 0002
,
Yun-Ju Huang
,
Rusydi H. Makarim
,
Mohamed Rachidi
,
Sharwan K. Tiwari
.
sacrypt 2024
:
387-408
[doi]
Improving the Rectangle Attack on GIFT-64
Yincen Chen
,
Nana Zhang
,
Xuanyu Liang
,
Ling Song 0001
,
Qianqian Yang 0003
,
Zhuohui Feng
.
sacrypt 2024
:
43-61
[doi]
SMAUG: Pushing Lattice-Based Key Encapsulation Mechanisms to the Limits
Jung Hee Cheon
,
Hyeongmin Choe
,
Dongyeon Hong
,
MinJune Yi
.
sacrypt 2024
:
127-146
[doi]
On the Precision Loss in Approximate Homomorphic Encryption
Anamaria Costache
,
Benjamin R. Curtis
,
Erin Hales
,
Sean Murphy
,
Tabitha Ogilvie
,
Rachel Player
.
sacrypt 2024
:
325-345
[doi]
Fast and Efficient Hardware Implementation of HQC
Sanjay Deshpande
,
Chuanqi Xu
,
Mamuri Nawan
,
Kashif Nawaz
,
Jakub Szefer
.
sacrypt 2024
:
297-321
[doi]
Threshold Implementations with Non-uniform Inputs
Siemen Dhooghe
,
Artemii Ovchinnikov
.
sacrypt 2024
:
97-123
[doi]
The Random Fault Model
Siemen Dhooghe
,
Svetla Nikova
.
sacrypt 2024
:
191-212
[doi]
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon
Amirhossein Ebrahimi
,
David Gérault
,
Paolo Palmieri 0001
.
sacrypt 2024
:
429-450
[doi]
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
Shoichi Hirose
,
Kazuhiko Minematsu
.
sacrypt 2024
:
233-252
[doi]
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
Melanie Jauch
,
Varun Maram
.
sacrypt 2024
:
275-296
[doi]
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities
Hao Lei
,
Jiahui He
,
Kai Hu 0001
,
Meiqin Wang
.
sacrypt 2024
:
3-21
[doi]
Probabilistic Related-Key Statistical Saturation Cryptanalysis
Muzhou Li
,
Nicky Mouha
,
Ling Sun 0001
,
Meiqin Wang
.
sacrypt 2024
:
213-232
[doi]
Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks
Ruiqi Mi
,
Haodong Jiang
,
Zhenfeng Zhang
.
sacrypt 2024
:
255-274
[doi]
Secure Function Extensions to Additively Homomorphic Cryptosystems
Mounika Pratapa
,
Aleksander Essex
.
sacrypt 2024
:
346-366
[doi]
Mask Compression: High-Order Masking on Memory-Constrained Devices
Markku-Juhani O. Saarinen
,
Mélissa Rossi
.
sacrypt 2024
:
65-81
[doi]
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
Kosei Sakamoto
,
Ryoma Ito 0001
,
Takanori Isobe 0001
.
sacrypt 2024
:
409-428
[doi]
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant
Wei Wei
,
Min Luo 0002
,
Zijian Bao
,
Cong Peng 0005
,
Debiao He
.
sacrypt 2024
:
169-188
[doi]
Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme
Lichao Wu
,
Guilherme Perin
,
Stjepan Picek
.
sacrypt 2024
:
82-96
[doi]
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH
Xiaorui Yu
,
Fukang Liu
,
Gaoli Wang
,
Siwei Sun
,
Willi Meier
.
sacrypt 2024
:
22-42
[doi]
2022
Selected Areas in Cryptography - 28th International Conference, SAC 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers
Riham AlTawy
,
Andreas Hülsing
, editors,
Volume 13203 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
2021
Improved Attacks on GIFT-64
Ling Sun 0001
,
Wei Wang
,
Meiqin Wang
.
sacrypt 2022
:
246-265
[doi]
How Do the Arbiter PUFs Sample the Boolean Function Class?
Animesh Roy 0004
,
Dibyendu Roy 0001
,
Subhamoy Maitra
.
sacrypt 2022
:
111-130
[doi]
Zaytun: Lattice Based PKE and KEM with Shorter Ciphertext Size
Parhat Abla
,
Mingsheng Wang
.
sacrypt 2022
:
398-418
[doi]
MAYO: Practical Post-quantum Signatures from Oil-and-Vinegar Maps
Ward Beullens
.
sacrypt 2022
:
355-376
[doi]
A Low-Randomness Second-Order Masked AES
Tim Beyne
,
Siemen Dhooghe
,
Adrián Ranea
,
Danilo Sijacic
.
sacrypt 2022
:
87-110
[doi]
Multi-user Security of the Elephant v2 Authenticated Encryption Mode
Tim Beyne
,
Yu Long Chen
,
Christoph Dobraunig
,
Bart Mennink
.
sacrypt 2022
:
155-178
[doi]
Automated Truncation of Differential Trails and Trail Clustering in ARX
Alex Biryukov
,
Luan Cardoso dos Santos
,
Daniel Feher
,
Vesselin Velichkov
,
Giuseppe Vitto
.
sacrypt 2022
:
286-307
[doi]
A Polynomial Time Key-Recovery Attack on the Sidon Cryptosystem
Pierre Briaud
,
Jean-Pierre Tillich
,
Javier A. Verbel
.
sacrypt 2022
:
419-438
[doi]
Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF
Jorge Chávez-Saab
,
Francisco Rodríguez-Henríquez
,
Mehdi Tibouchi
.
sacrypt 2022
:
441-460
[doi]
A Simpler Model for Recovering Superpoly on Trivium
Stéphanie Delaune
,
Patrick Derbez
,
Arthur Gontier
,
Charles Prud'homme
.
sacrypt 2022
:
266-285
[doi]
Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers
Orr Dunkelman
,
Michael J. Jacobson Jr.
,
Colin O'Flynn
, editors,
Volume 12804 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies
Edward Eaton
,
David Jao
,
Chelsea Komlo
,
Youcef Mokrani
.
sacrypt 2022
:
461-482
[doi]
ZKAttest: Ring and Group Signatures for Existing ECDSA Keys
Armando Faz-Hernández
,
Watson Ladd
,
Deepak Maram
.
sacrypt 2022
:
68-83
[doi]
Quantum Boomerang Attacks and Some Applications
Paul Frixons
,
María Naya-Plasencia
,
André Schrottenloher
.
sacrypt 2022
:
332-352
[doi]
2 Access Structures over Rings and Fields
Robin Jadoul
,
Nigel P. Smart
,
Barry Van Leeuwen
.
sacrypt 2022
:
131-151
[doi]
Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS^{MT}}$
Haruhisa Kosuge
,
Hidema Tanaka
.
sacrypt 2022
:
377-397
[doi]
Revisiting Driver Anonymity in ORide
Deepak Kumaraswamy
,
Shyam Murthy
,
Srinivas Vivek 0001
.
sacrypt 2022
:
25-46
[doi]
Secret Keys in Genus-2 SIDH
Sabrina Kunzweiler
,
Yan Bo Ti
,
Charlotte Weitkämper
.
sacrypt 2022
:
483-507
[doi]
On Evaluating Anonymity of Onion Routing
Alessandro Melloni
,
Martijn Stam
,
Øyvind Ytrehus
.
sacrypt 2022
:
3-24
[doi]
Parallel Verification of Serial MAC and AE Modes
Kazuhiko Minematsu
,
Akiko Inoue
,
Katsuya Moriwaki
,
Maki Shigeri
,
Hiroyasu Kubo
.
sacrypt 2022
:
200-219
[doi]
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES
Chao Niu
,
Muzhou Li
,
Meiqin Wang
,
Qingju Wang 0001
,
Siu-Ming Yiu
.
sacrypt 2022
:
223-245
[doi]
Improved Quantum Algorithms for the k-XOR Problem
André Schrottenloher
.
sacrypt 2022
:
311-331
[doi]
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR
Yosuke Todo
,
Yu Sasaki
.
sacrypt 2022
:
179-199
[doi]
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application
Keita Xagawa
.
sacrypt 2022
:
47-67
[doi]
2020
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode
Elena Andreeva 0001
,
Amit Singh Bhati
,
Damian Vizár
.
sacrypt 2021
:
512-534
[doi]
Weak-Key Distinguishers for AES
Lorenzo Grassi 0001
,
Gregor Leander
,
Christian Rechberger
,
Cihangir Tezcan
,
Friedrich Wiemer
.
sacrypt 2021
:
141-170
[doi]
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions
Arnab Roy 0005
,
Elena Andreeva 0001
,
Jan Ferdinand Sauer
.
sacrypt 2021
:
273-300
[doi]
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions
Hao Cheng 0009
,
Johann Großschädl
,
Jiaqi Tian
,
Peter B. Rønne
,
Peter Y. A. Ryan
.
sacrypt 2021
:
698-719
[doi]
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher
Subhadeep Banik
,
Zhenzhen Bao
,
Takanori Isobe 0001
,
Hiroyasu Kubo
,
Fukang Liu
,
Kazuhiko Minematsu
,
Kosei Sakamoto
,
Nao Shibata
,
Maki Shigeri
.
sacrypt 2021
:
535-564
[doi]
Unintended Features of APIs: Cryptanalysis of Incremental HMAC
Gal Benmocha
,
Eli Biham
,
Stav Perle
.
sacrypt 2021
:
301-325
[doi]
Not Enough LESS: An Improved Algorithm for Solving Code Equivalence Problems over $\mathbb {F}_q$
Ward Beullens
.
sacrypt 2021
:
387-403
[doi]
PRINCEv2 - More Security for (Almost) No Overhead
Dusan Bozilov
,
Maria Eichlseder
,
Miroslav Knezevic
,
Baptiste Lambin
,
Gregor Leander
,
Thorben Moos
,
Ventzislav Nikov
,
Shahram Rasoolzadeh
,
Yosuke Todo
,
Friedrich Wiemer
.
sacrypt 2021
:
483-511
[doi]
Towards Post-Quantum Security for Signal's X3DH Handshake
Jacqueline Brendel
,
Marc Fischlin
,
Felix Günther 0001
,
Christian Janson
,
Douglas Stebila
.
sacrypt 2021
:
404-430
[doi]
Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
Tingting Cui
,
Lorenzo Grassi 0001
.
sacrypt 2021
:
171-197
[doi]
Improvements to Quantum Search Techniques for Block-Ciphers, with Applications to AES
James H. Davenport
,
Benjamin Pring
.
sacrypt 2021
:
360-384
[doi]
Practical Isogeny-Based Key-Exchange with Optimal Tightness
Bor de Kock
,
Kristian Gjøsteen
,
Mattia Veroni
.
sacrypt 2021
:
451-479
[doi]
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE
Yunsi Fei
,
Guang Gong
,
Cheng Gongye
,
Kalikinkar Mandal
,
Raghvendra Rohit 0001
,
Tianhong Xu
,
Yunjie Yi
,
Nusa Zidaric
.
sacrypt 2021
:
593-614
[doi]
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting
Ashley Fraser
,
Elizabeth A. Quaglia
.
sacrypt 2021
:
670-697
[doi]
On Index Calculus Algorithms for Subfield Curves
Steven D. Galbraith
,
Robert Granger
,
Simon-Philipp Merz
,
Christophe Petit
.
sacrypt 2021
:
115-138
[doi]
Obfuscating Finite Automata
Steven D. Galbraith
,
Lukas Zobernig
.
sacrypt 2021
:
90-114
[doi]
Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations
Aron Gohr
,
Sven Jacob
,
Werner Schindler
.
sacrypt 2021
:
567-592
[doi]
Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath
John Petter Indrøy
,
Nicolas Costes
,
Håvard Raddum
.
sacrypt 2021
:
229-251
[doi]
Low-Gate Quantum Golden Collision Finding
Samuel Jaques
,
André Schrottenloher
.
sacrypt 2021
:
329-359
[doi]
Improved (Related-key) Differential Cryptanalysis on GIFT
Fulei Ji
,
Wentao Zhang
,
Chunning Zhou
,
Tianyou Ding
.
sacrypt 2021
:
198-228
[doi]
FROST: Flexible Round-Optimized Schnorr Threshold Signatures
Chelsea Komlo
,
Ian Goldberg
.
sacrypt 2021
:
34-65
[doi]
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments
Veronika Kuchta
,
Amin Sakzad
,
Ron Steinfeld
,
Joseph K. Liu
.
sacrypt 2021
:
3-33
[doi]
Trapdoor DDH Groups from Pairings and Isogenies
Péter Kutas
,
Christophe Petit
,
Javier Silva 0001
.
sacrypt 2021
:
431-450
[doi]
Boolean Ring Cryptographic Equation Solving
Sean Murphy
,
Maura B. Paterson
,
Christine Swart
.
sacrypt 2021
:
252-272
[doi]
Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers
Kenneth G. Paterson
,
Douglas Stebila
, editors,
Volume 11959 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis
Guilherme Perin
,
Stjepan Picek
.
sacrypt 2021
:
615-636
[doi]
On Self-equivalence Encodings in White-Box Implementations
Adrián Ranea
,
Bart Preneel
.
sacrypt 2021
:
639-669
[doi]
Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM
Jonathan Takeshita
,
Dayane Reis
,
Ting Gong
,
Michael T. Niemier
,
X. Sharon Hu
,
Taeho Jung
.
sacrypt 2021
:
66-89
[doi]
2019
Plaintext Recovery Attacks Against XTS Beyond Collisions
Takanori Isobe 0001
,
Kazuhiko Minematsu
.
sacrypt 2020
:
103-123
[doi]
Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES
Lorenzo Grassi 0001
.
sacrypt 2020
:
53-84
[doi]
XMSS and Embedded Systems
Wen Wang 0007
,
Bernhard Jungk
,
Julian Wälde
,
Shuwen Deng
,
Naina Gupta 0001
,
Jakub Szefer
,
Ruben Niederhagen
.
sacrypt 2020
:
523-550
[doi]
A DFA Attack on White-Box Implementations of AES with External Encodings
Alessandro Amadori
,
Wil Michiels
,
Peter Roelse
.
sacrypt 2020
:
591-617
[doi]
Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ
Carsten Baum
,
Daniele Cozzo
,
Nigel P. Smart
.
sacrypt 2020
:
274-302
[doi]
Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack
Eli Biham
,
Lior Neumann
.
sacrypt 2020
:
250-273
[doi]
On Quantum Slide Attacks
Xavier Bonnetain
,
María Naya-Plasencia
,
André Schrottenloher
.
sacrypt 2020
:
492-519
[doi]
Ternary Syndrome Decoding with Large Weight
Rémi Bricout
,
André Chailloux
,
Thomas Debris-Alazard
,
Matthieu Lequesne
.
sacrypt 2020
:
437-466
[doi]
Towards Practical GGM-Based PRF from (Module-)Learning-with-Rounding
Chitchanok Chuengsatiansup
,
Damien Stehlé
.
sacrypt 2020
:
693-713
[doi]
Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers
Carlos Cid
,
Michael J. Jacobson Jr.
, editors,
Volume 11349 of
Lecture Notes in Computer Science
, Springer,
2019.
[doi]
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition
Patrick Derbez
,
Virginie Lallemand
,
Aleksei Udovenko
.
sacrypt 2020
:
124-145
[doi]
Algebraic Cryptanalysis of Variants of Frit
Christoph Dobraunig
,
Maria Eichlseder
,
Florian Mendel
,
Markus Schofnegger
.
sacrypt 2020
:
149-170
[doi]
Tight Security Bounds for Generic Stream Cipher Constructions
Matthias Hamann
,
Matthias Krause 0001
,
Alexander Moch
.
sacrypt 2020
:
335-364
[doi]
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Benjamin Hettwer
,
Stefan Gehrer
,
Tim Güneysu
.
sacrypt 2020
:
645-666
[doi]
Parallelizable Authenticated Encryption with Small State Size
Akiko Inoue
,
Kazuhiko Minematsu
.
sacrypt 2020
:
618-644
[doi]
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
Tibor Jager
,
David Niehues
.
sacrypt 2020
:
303-332
[doi]
A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules
Jung-Keun Lee
,
Bonwook Koo
,
Woo-Hwan Kim
.
sacrypt 2020
:
194-224
[doi]
Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
Chaoyun Li
,
Bart Preneel
.
sacrypt 2020
:
171-193
[doi]
Iterative Differential Characteristic of TRIFLE-BC
Fukang Liu
,
Takanori Isobe 0001
.
sacrypt 2020
:
85-100
[doi]
A Lightweight Alternative to PMAC
Kazuhiko Minematsu
.
sacrypt 2020
:
393-417
[doi]
An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks
Akifumi Muroi
,
Shinya Okumura
,
Atsuko Miyaji
.
sacrypt 2020
:
421-436
[doi]
A Timing Attack on the HQC Encryption Scheme
Thales Bandiera Paiva
,
Routo Terada
.
sacrypt 2020
:
551-573
[doi]
Looking Back - My Life as a Mathematician and Cryptographer
Douglas R. Stinson
.
sacrypt 2020
:
3-20
[doi]
Block-Anti-Circulant Unbalanced Oil and Vinegar
Alan Szepieniec
,
Bart Preneel
.
sacrypt 2020
:
574-588
[doi]
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Yosuke Todo
,
Willi Meier
,
Kazumaro Aoki
.
sacrypt 2020
:
365-392
[doi]
Sign in
or
sign up
to see more results.