default search action
28th ASIACRYPT 2022: Taipei, Taiwan - Part II
- Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13792, Springer 2022, ISBN 978-3-031-22965-7
Isogeny Based Cryptography
- Antonin Leroux:
A New Isogeny Representation and Applications to Cryptography. 3-35 - Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. 36-66 - Wouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren:
Horizontal Racewalking Using Radical Isogenies. 67-96
Homomorphic Encryption
- Guilhem Castagnos, Fabien Laguillaumie, Ida Tucker:
Threshold Linearly Homomorphic Encryption on bfZ/2kbfZ. 99-129 - Zeyu Liu, Daniele Micciancio, Yuriy Polyakov:
Large-Precision Homomorphic Sign Evaluation Using FHEW/TFHE Bootstrapping. 130-160 - Seonghak Kim, Minji Park, Jaehyung Kim, Taekyung Kim, Chohong Min:
EvalRound Algorithm in CKKS Bootstrapping. 161-187 - Charlotte Bonte, Ilia Iliashenko, Jeongeun Park, Hilder V. L. Pereira, Nigel P. Smart:
FINAL: Faster FHE Instantiated with NTRU and LWE. 188-215
NIZK and SNARKs
- Nan Wang, Sid Chi-Kin Chau:
Flashproofs: Efficient Zero-Knowledge Arguments of Range and Polynomial Evaluation with Transparent Setup. 219-248 - Helger Lipmaa, Janno Siim, Michal Zajac:
Counting Vampires: From Univariate Sumcheck to Updatable ZK-SNARK. 249-278 - Yashvanth Kondi, Abhi Shelat:
Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature Aggregation. 279-309 - Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig:
SIDH Proof of Knowledge. 310-339 - Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng:
DAG-Σ: A DAG-Based Sigma Protocol for Relations in CNF. 340-370 - Thibauld Feneuil, Jules Maire, Matthieu Rivain, Damien Vergnaud:
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection. 371-402 - Sungwook Kim, Hyeonbum Lee, Jae Hong Seo:
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier. 403-433
Non Interactive Zero Knowledge
- Yuyu Wang, Jiaxin Pan:
Unconditionally Secure NIZK in the Fine-Grained Setting. 437-465 - Ran Canetti, Pratik Sarkar, Xiao Wang:
Triply Adaptive UC NIZK. 466-495 - Riddhi Ghosal, Paul Lou, Amit Sahai:
Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head". 496-521
Symmetric Cryptography
- Yaobin Shen, Ferdinand Sibleyras:
Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security. 525-554 - Norica Bacuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer:
Jammin' on the Deck. 555-584 - Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. 585-619 - Lorenzo Grassi, Bart Mennink:
Security of Truncated Permutation Without Initial Value. 620-650 - Matilda Backendal, Felix Günther, Kenneth G. Paterson:
Puncturable Key Wrapping and Its Applications. 651-681 - Wonseok Choi, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee:
Multi-user Security of the Sum of Truncated Random Permutations. 682-710
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.