Showing 1 - 20 results of 53 for search '"Asiacrypt"', query time: 0.08s Refine Results
  1. 1
  2. 2

    Understanding the Duplex and Its Security by Bart Mennink

    Published 2023-06-01
    “…The construction was generalized to full-state absorption by Mennink et al. (ASIACRYPT 2015). Daemen et al. (ASIACRYPT 2017) generalized it further to cover much more use cases, and proved security of this general construction, and Dobraunig and Mennink (ASIACRYPT 2019) derived a leakage resilience security bound for this construction. …”
    Get full text
    Article
  3. 3

    Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption by Libert, Benoǐt, Ling, San, Mouhartem, Fabrice, Nguyen, Khoa, Wang, Huaxiong

    Published 2020
    “…As introduced by Kiayias, Tsiounis and Yung (Asiacrypt’07), GE is motivated by applications in the context of oblivious retriever storage systems, anonymous third parties and hierarchical group signatures. …”
    Get full text
    Conference Paper
  4. 4

    Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map by Jiseung Kim, Changmin Lee

    Published 2022-05-01
    “…To achieve the goal, the Coron and Notarnicola (Asiacrypt’19) algorithm is applied. However, because of parameter issues, the algorithm cannot be used directly. …”
    Get full text
    Article
  5. 5

    Integral Cryptanalysis Using Algebraic Transition Matrices by Tim Beyne, Michiel Verbauwhede

    Published 2023-12-01
    “… In this work we introduce algebraic transition matrices as the basis for a new approach to integral cryptanalysis that unifies monomial trails (Hu et al., Asiacrypt 2020) and parity sets (Boura and Canteaut, Crypto 2016). …”
    Get full text
    Article
  6. 6

    Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency by Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi

    Published 2021-11-01
    “…The main idea lies on a combination of the constructions given by Shahmirzadi and Moradi at CHES 2021, and the theory presented by Beyne et al. at Asiacrypt 2020. The presented masked designs only use a minimal number of shares, i.e., three to achieve second-order security, and we make use of a trick to pair a couple of S-boxes to reduce their latency. …”
    Get full text
    Article
  7. 7

    Lossy CSI-FiSh: Efficient signature scheme with tight reduction to decisional CSIDH-512 by El Kaafarani, A, Katsumata, S, Pintore, F

    Published 2020
    “…Recently, Beullens, Kleinjung, and Vercauteren (Asiacrypt'19) provided the first practical isogeny-based digital signature, obtained from the Fiat-Shamir (FS) paradigm. …”
    Conference item
  8. 8

    MILP-Based Differential Cryptanalysis on Round-Reduced Midori64 by Hongluan Zhao, Guoyong Han, Letian Wang, Wen Wang

    Published 2020-01-01
    “…Mixed integer linear programming (MILP) model was presented by Sun <italic>et al.</italic> at Asiacrypt 2014 to search for differential characteristics of block ciphers. …”
    Get full text
    Article
  9. 9
  10. 10

    New results on modular inversion hidden number problem and inversive congruential generator by Xu, Jun, Sarkar, Santanu, Hu, Lei, Wang, Huaxiong, Pan, Yanbin

    Published 2020
    “…The Modular Inversion Hidden Number Problem (MIHNP), introduced by Boneh, Halevi and Howgrave-Graham in Asiacrypt 2001, is briefly described as follows: Let MSB𝛿(𝑧) refer to the δ most significant bits of z. …”
    Get full text
    Conference Paper
  11. 11

    A Single-Key Variant of LightMAC_Plus by Haitao Song

    Published 2021-09-01
    “…LightMAC_Plus proposed by Naito (ASIACRYPT 2017) is a blockcipher-based MAC that has beyond the birthday bound security without message length in the sense of PRF (Pseudo-Random Function) security. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Revisiting modular inversion hidden number problem and its applications by Xu, Jun, Sarkar, Santanu, Hu, Lei, Wang, Huaxiong, Pan, Yanbin

    Published 2023
    “…The Modular Inversion Hidden Number Problem (MIHNP), which was proposed at Asiacrypt 2001 by Boneh, Halevi, and Howgrave-Graham, is summarized as follows: Assume that the δ most significant bits of z are denoted by MSBδ(z). …”
    Get full text
    Journal Article
  15. 15

    Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation by Milica Knežević, Siniša Tomović, Miodrag J. Mihaljević

    Published 2020-08-01
    “…We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). …”
    Get full text
    Article
  16. 16

    Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics by Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid

    Published 2021-07-01
    “…TFHE is a fast fully homomorphic encryption scheme proposed by Chillotti et al. in Asiacrypt’ 2018. Integer-wise TFHE is a generalized version of TFHE that can encrypt the plaintext of an integer that was implicitly presented by Chillotti et al., and Bourse et al. presented the actual form of the scheme in CRYPTO’ 2018. …”
    Get full text
    Article
  17. 17

    A new distinguishing attack on reduced round ChaCha permutation by Chandan Dey, Santanu Sarkar

    Published 2023-08-01
    “…(in: Advances in Cryptology—ASIACRYPT 2022—28nd International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2012, Springer, 2022), which achieved time complexity $$2^{214}$$ 2 214 . …”
    Get full text
    Article
  18. 18
  19. 19

    The Deoxys AEAD family by Jean, Jérémy, Nikolić, Ivica, Peyrin, Thomas, Seurin, Yannick

    Published 2022
    “…Deoxys uses a new family of tweakable block ciphers as internal primitive, Deoxys-TBC, which follows the TWEAKEY framework (Jean, Nikolić, and Peyrin, ASIACRYPT 2014) and relies on the AES round function. …”
    Get full text
    Journal Article
  20. 20

    Weak-keys and key-recovery attack for $$\text{ TinyJAMBU }$$ TinyJAMBU by Pranjal Dutta, Mahesh Sreekumar Rajasree, Santanu Sarkar

    Published 2022-09-01
    “…Finally, we give new key-recovery attacks against $$\text{ TinyJAMBU }$$ TinyJAMBU using the concepts of monomial trail presented by Hu et al. at ASIACRYPT 2020. Our attacks are unlikely to jeopardise the security of the entire 640 rounds $$\text{ TinyJAMBU }$$ TinyJAMBU , but we strongly anticipate that they will shed new lights on the cipher’s security.…”
    Get full text
    Article