×

Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. (English) Zbl 1510.94003

Lecture Notes in Computer Science 13091. Cham: Springer (ISBN 978-3-030-92074-6/pbk; 978-3-030-92075-3/ebook). xvii, 728 p. (2021).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1507.94004; Zbl 1507.94005; Zbl 1507.94006]. For Parts I, III and IV of the proceedings of the present conference see [Zbl 1510.94002; Zbl 1510.94004; Zbl 1511.94004].
Indexed articles:
Gigerl, Barbara; Primas, Robert; Mangard, Stefan, Secure and efficient software masking on superscalar pipelined processors, 3-32 [Zbl 07684775]
Xagawa, Keita; Ito, Akira; Ueno, Rei; Takahashi, Junko; Homma, Naofumi, Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates, 33-61 [Zbl 1514.94140]
Saha, Sayandeep; Bag, Arnab; Jap, Dirmanto; Mukhopadhyay, Debdeep; Bhasin, Shivam, Divided we stand, united we fall: security analysis of some SCA+SIFA countermeasures against SCA-enhanced fault template attacks, 62-94 [Zbl 1514.94128]
Berti, Francesco; Guo, Chun; Peters, Thomas; Standaert, François-Xavier, Efficient leakage-resilient MACs without idealized assumptions, 95-123 [Zbl 1514.94040]
Baksi, Anubhab; Bhasin, Shivam; Breier, Jakub; Khairallah, Mustafa; Peyrin, Thomas; Sarkar, Sumanta; Sim, Siang Meng, DEFAULT: cipher level resistance against differential fault attack, 124-156 [Zbl 1514.94034]
Belaïd, Sonia; Rivain, Matthieu; Taleb, Abdul Rahman; Vergnaud, Damien, Dynamic random probing expansion with quasi linear asymptotic complexity, 157-188 [Zbl 1514.94039]
Eriguchi, Reo; Nuida, Koji, Homomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomials, 191-221 [Zbl 1514.94152]
Abspoel, Mark; Cramer, Ronald; Escudero, Daniel; Damgård, Ivan; Xing, Chaoping, Improved single-round secure multiplication using regenerating codes, 222-244 [Zbl 1535.94070]
Heath, David; Kolesnikov, Vladimir; Peceny, Stanislav, Garbling, stacked and staggered. Faster \(k\)-out-of-\(n\) garbled function evaluation, 245-274 [Zbl 1514.94098]
Chen, Yu Long; Tessaro, Stefano, Better security-efficiency trade-offs in permutation-based two-party computation, 275-304 [Zbl 07684784]
Alamati, Navid; Montgomery, Hart; Patranabis, Sikhar; Sarkar, Pratik, Two-round adaptively secure MPC from isogenies, LPN, or CDH, 305-334 [Zbl 1514.94029]
Chakraborty, Suvradip; Ganesh, Chaya; Pancholi, Mahak; Sarkar, Pratik, Reverse firewalls for adaptively secure MPC without setup, 335-364 [Zbl 1514.94061]
van Baarsen, Aron; Stevens, Marc, On time-lock cryptographic assumptions in abelian hidden-order groups, 367-397 [Zbl 1514.94135]
Arapinis, Myrto; Lamprou, Nikolaos; Zacharias, Thomas, Astrolabous: a universally composable time-lock encryption scheme, 398-426 [Zbl 1514.94031]
Wang, Yi; Chen, Rongmao; Huang, Xinyi; Ning, Jianting; Wang, Baosheng; Yung, Moti, Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE, 427-455 [Zbl 1514.94138]
Lai, Junzuo; Yang, Rupeng; Huang, Zhengan; Weng, Jian, Simulation-based bi-selective opening security for public key encryption, 456-482 [Zbl 1514.94111]
Han, Shuai; Liu, Shengli; Gu, Dawu, Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness, 483-513 [Zbl 1514.94094]
Chen, Yu; Tang, Qiang; Wang, Yuyu, Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds), 514-543 [Zbl 1514.94148]
Blum, Erica; Katz, Jonathan; Loss, Julian, Tardigrade: an atomic broadcast protocol for arbitrary network conditions, 547-572 [Zbl 1514.94047]
Kuhn, Christiane; Hofheinz, Dennis; Rupp, Andy; Strufe, Thorsten, Onion routing with replies, 573-604 [Zbl 1514.94110]
Lepoint, Tancrède; Patel, Sarvar; Raykova, Mariana; Seth, Karn; Trieu, Ni, Private join and compute from PIR with default, 605-634 [Zbl 1514.94112]
Aumayr, Lukas; Ersoy, Oguzhan; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash, Generalized channels from limited blockchain scripts and adaptor signatures, 635-664 [Zbl 1514.94032]
Beskorovajnov, Wasilij; Dörre, Felix; Hartung, Gunnar; Koch, Alexander; Müller-Quade, Jörn; Strufe, Thorsten, ConTra corona: contact tracing against the coronavirus by bridging the centralized-decentralized divide for stronger privacy, 665-695 [Zbl 1514.94041]
Fischlin, Marc; Sanina, Olga, Cryptographic analysis of the Bluetooth secure connection protocol suite, 696-725 [Zbl 07684798]

MSC:

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
00B25 Proceedings of conferences of miscellaneous specific interest
Full Text: DOI