|
Symmetric-Key Cryptography |
|
|
|
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256 |
|
|
3 | (21) |
|
|
|
|
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES |
|
|
24 | (22) |
|
|
|
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher |
|
|
46 | (21) |
|
|
|
|
Improved Differential Attack on Round-Reduced LEA |
|
|
67 | (18) |
|
|
|
|
Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints |
|
|
85 | (21) |
|
|
|
|
Improved Division Property for Ciphers with Complex Linear Layers |
|
|
106 | (19) |
|
|
|
|
|
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation |
|
|
125 | (22) |
|
|
|
|
|
|
Handle the Traces: Revisiting the Attack on ECDSA with EHNP |
|
|
147 | (21) |
|
|
|
|
|
Hybrid Dual and Meet-LWE Attack |
|
|
168 | (21) |
|
|
|
|
|
Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018 |
|
|
189 | (20) |
|
|
|
|
|
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption |
|
|
209 | (20) |
|
|
|
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace |
|
|
229 | (15) |
|
|
|
|
TIDE: A Novel Approach to Constructing Timed-Release Encryption |
|
|
244 | (21) |
|
|
|
|
|
Multi-signatures for ECDSA and Its Applications in Blockchain |
|
|
265 | (24) |
|
|
|
|
|
Post-quantum Cryptography |
|
|
|
Fiat-Shamir Signatures Based on Module-NTRU |
|
|
289 | (20) |
|
|
|
|
|
|
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using Precedence-Constrained Scheduling |
|
|
309 | (23) |
|
|
|
|
An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security |
|
|
332 | (23) |
|
|
|
|
Ron Steinfeld Cryptographic Protocols |
|
|
Verifiable Decryption in the Head |
|
|
355 | (20) |
|
|
|
|
|
|
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives |
|
|
375 | (24) |
|
|
|
|
|
|
|
|
On Security of Fuzzy Commitment Scheme for Biometric Authentication |
|
|
399 | (21) |
|
|
|
|
|
SoK: Decentralized Randomness Beacon Protocols |
|
|
420 | (29) |
|
|
|
|
|
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts |
|
|
449 | (20) |
|
|
|
|
|
|
|
|
|
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding |
|
|
469 | (20) |
|
|
|
|
|
Garrison: A Novel Watchtower Scheme for Bitcoin |
|
|
489 | (20) |
|
|
|
|
|
Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics |
|
|
509 | (20) |
|
|
|
|
|
|
Author Index |
|
529 | |