×

Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part IV. (English) Zbl 07831380

Lecture Notes in Computer Science 14441. Singapore: Springer (ISBN 978-981-9987-29-0/pbk; 978-981-9987-30-6/ebook). xviii, 469 p. (2023).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1517.94002; Zbl 1517.94001; Zbl 1517.94003; Zbl 1517.94004]. For Parts I, II, III, V, VI, VII and VIII of the proceedings of the present conference see [Zbl 07831378; Zbl 1540.94003; Zbl 07831379; Zbl 07831381; Zbl 07831382; Zbl 07831383; Zbl 1540.94004].
Indexed articles:
Couvreur, Alain; Mora, Rocco; Tillich, Jean-Pierre, A new approach based on quadratic forms to attack the McEliece cryptosystem, 3-38 [Zbl 07913124]
Meers, Jonas; Nowakowski, Julian, Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith, 39-71 [Zbl 07913125]
Esser, Andre; Girme, Rahul; Mukherjee, Arindam; Sarkar, Santanu, Memory-efficient attacks on small LWE keys, 72-105 [Zbl 07913126]
May, Alexander; Nowakowski, Julian, Too many hints – when LLL breaks LWE, 106-137 [Zbl 07913127]
Bouillaguet, Charles; Fleury, Ambroise; Fouque, Pierre-Alain; Kirchner, Paul, We are on the same side. Alternative sieving strategies for the number field sieve, 138-166 [Zbl 07913128]
Jiang, Kaijie; Wang, Anyu; Luo, Hengyi; Liu, Guoxiao; Yu, Yang; Wang, Xiaoyun, Exploiting the symmetry of \(\mathbb{Z}^n\): randomization and the automorphism problem, 167-200 [Zbl 07913129]
Guo, Qian; Nabokov, Denis; Nilsson, Alexander; Johansson, Thomas, SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes, 203-236 [Zbl 07913130]
Plançon, Maxime, Exploiting algebraic structures in probing security, 237-267 [Zbl 07913131]
Dörre, Felix; Mechler, Jeremias; Müller-Quade, Jörn, Practically efficient private set intersection from trusted hardware with side-channels, 268-301 [Zbl 07913132]
Feldtkeller, Jakob; Güneysu, Tim; Schaumont, Patrick, Quantitative fault injection analysis, 302-336 [Zbl 07913133]
Afshar, Abtin; Chung, Kai-Min; Hsieh, Yao-Ching; Lin, Yao-Ting; Mahmoody, Mohammad, On the (im)possibility of time-lock puzzles in the quantum random oracle model, 339-368 [Zbl 07913134]
Unruh, Dominique, Towards compressed permutation oracles, 369-400 [Zbl 07913135]
Pan, Jiaxin; Wagner, Benedikt; Zeng, Runzhi, Tighter security for generic authenticated key exchange in the QROM, 401-433 [Zbl 07913136]
Jiang, Haodong; Ma, Zhi; Zhang, Zhenfeng, Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query, 434-468 [Zbl 07913137]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI