Advances in Cryptology – ASIACRYPT 2020
Springer International Publishing (Verlag)
978-3-030-64836-7 (ISBN)
The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:
Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.
Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.
Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
Best Paper Awards.- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness.- New results on Gimli: full-permutation distinguishers and improved collisions.- SQISign: Compact Post-Quantum signatures from Quaternions and Isogenies.- Encryption Schemes.- Public-Key Generation with Verifiable Randomness.- Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security.- CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors.- Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting.- Security Reductions for White-Box Key-Storage in Mobile Payments.- Circular Security Is Complete for KDM Security.- Post-Quantum Cryptography.- Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications.- Post-Quantum Veri cation of Fujisaki-Okamoto.- A New Decryption Failure Attack against HQC.- Cryptanalysis.- A Bit-Vector Differential Model for the Modular Addition by a Constant.- Mind the Propagation of States New Automatic Search Tool for Impossible Di erentials and Impossible Polytopic Transitions.- An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums.- An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC.- Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems.- Lower Bounds on the Degree of Block Ciphers.- Towards Closing The Security Gap of Tweak-aNd-Tweak (TNT).- Symmetric Key Cryptography.- Minimizing the Two-Round Tweakable Even-Mansour Cipher.- Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption.- Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation.- Message Authentication Codes.- Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs.- On the Adaptive Security of MACs and PRFs.- How to BuildOptimally Secure PRFs Using Block Ciphers.- Side-Channel Analysis.- SILVER - Statistical Independence and Leakage Verification.- Cryptanalysis of Masked Ciphers: A not so Random Idea.- Packed Multiplication: How to Amortize the Cost of Side-channel Masking.- Side Channel Information Set Decoding using Iterative Chunking.
Erscheinungsdatum | 04.01.2021 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XXVII, 914 p. 123 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1419 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Applications • authentication • ciphertexts • Communication Systems • Computer Science • Computer Security • conference proceedings • cryptography • Data Security • Encryption • Hash Functions • Informatics • Network Protocols • Network Security • Public Key Cryptography • Research • security analysis • Security Systems • Signal Processing • Software engineering |
ISBN-10 | 3-030-64836-2 / 3030648362 |
ISBN-13 | 978-3-030-64836-7 / 9783030648367 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich