{"title":"Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT","authors":"Antonio Flórez-Gutiérrez, M. Naya-Plasencia","doi":"10.1007/978-3-030-45721-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_9","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Template Attacks on Block Ciphers Exploiting Fault Propagation","authors":"Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay","doi":"10.1007/978-3-030-45721-1_22","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_22","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff
{"title":"Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations","authors":"Sonia Belaïd, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain, Raphaël Wintersdorff","doi":"10.1007/978-3-030-45727-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-45727-3_11","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tight Security Bounds for Double-Block Hash-then-Sum MACs","authors":"Seong-Hak Kim, ByeongHak Lee, Jooyoung Lee","doi":"10.1007/978-3-030-45721-1_16","DOIUrl":"https://doi.org/10.1007/978-3-030-45721-1_16","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133274421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classical Proofs of Quantum Knowledge","authors":"Thomas Vidick, Tina Zhang","doi":"10.1007/978-3-030-77886-6_22","DOIUrl":"https://doi.org/10.1007/978-3-030-77886-6_22","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128125411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Divesh Aggarwal, Nico Döttling, J. Nielsen, Maciej Obremski, Erick Purwanto
{"title":"Continuous Non-Malleable Codes in the 8-Split-State Model","authors":"Divesh Aggarwal, Nico Döttling, J. Nielsen, Maciej Obremski, Erick Purwanto","doi":"10.1007/978-3-030-17653-2_18","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_18","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computationally Volume-Hiding Structured Encryption","authors":"S. Kamara, Tarik Moataz","doi":"10.1007/978-3-030-17656-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-17656-3_7","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129616668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Leverage Hardness of Constant-Degree Expanding Polynomials over mathbb R R to build i풪 i O","authors":"Aayush Jain, Huijia Lin, Christian Matt, A. Sahai","doi":"10.1007/978-3-030-17653-2_9","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_9","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114400616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compact Adaptively Secure ABE for mathsf NC^1 from k-Lin","authors":"Lucas Kowalczyk, H. Wee","doi":"10.1007/978-3-030-17653-2_1","DOIUrl":"https://doi.org/10.1007/978-3-030-17653-2_1","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symbolic Encryption with Pseudorandom Keys","authors":"Daniele Micciancio","doi":"10.1007/978-3-030-17659-4_3","DOIUrl":"https://doi.org/10.1007/978-3-030-17659-4_3","url":null,"abstract":"","PeriodicalId":117521,"journal":{"name":"International Conference on the Theory and Application of Cryptographic Techniques","volume":"66 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120840611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}