先进制造业知识服务平台
国家科技图书文献中心机械分馆  工信部产业技术基础公共服务平台  国家中小企业公共服务示范平台

会议文集


文集名Advances in Cryptology - EUROCRYPT 2023
会议名42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2023)
中译名《第四十二届国际密码技术理论及应用年度会议,卷4》
机构International Association for Cryptologic Research (IACR)
会议日期April 23-27, 2023
会议地点Lyon, France
出版年2023
馆藏号349244


题名作者出版年
Truncated Boomerang Attacks and Application to AES-Based CiphersAugustin Bariant; Gaetan Leurent2023
Better Steady than Speedy: Full Break of SPEEDY-7-192Christina Boura; Nicolas David; Rachelle Heim Boissier; Maria Naya-Plasencia2023
Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNYDanping Shi; Siwei Sun; Ling Song; Lei Hu; Qianqian Yang2023
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate DifferentiationItai Dinur; Orr Dunkelman; Nathan Keller; Eyal Ronen; Adi Shamir2023
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral AttacksHosein Hadipour; Sadegh Sadeghi; Maria Eichlseder2023
Meet-in-the-Middle Preimage Attacks on Sponge-Based HashingLingyue Qin; Jialiang Hua; Xiaoyang Dong; Hailun Yan; Xiaoyun Wang2023
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILPFukang Liu; Gaoli Wang; Santanu Sarkar; Ravi Anand; Willi Meier; Yingxin Li; Takanori Isobe2023
Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal DifferentialsZhongyi Zhang; Chengan Hou; Meicheng Liu2023
From Farfalle to MEGAFONO via Ciminion: The PRF Hydra for MPC ApplicationsLorenzo Grassi; Morten Oygarden; Markus Schofnegger; Roman Walch2023
Coefficient Grouping: Breaking Chaghri and MoreFukang Liu; Ravi Anand; Libo Wang; Willi Meier; Takanori Isobe2023
Pitfalls and Shortcomings for Decompositions and AlignmentBaptiste Lambin; Gregor Leander; Patrick Neumann2023
Generic Attack on Duplex-Based AEAD Modes Using Random Function StatisticsHenri Gilbert; Rachelle Heim Boissier; Louiza Khati; Yann Rotella2023
Context Discovery and Commitment Attacks How to Break CCM, EAX, SIV, and MoreSanketh Menda; Julia Len; Paul Grubbs; Thomas Ristenpart2023
Impossibility of Indifferentiable Iterated Blockciphers from 3 or Less Primitive CallsChun Guo; Lei Wang; Dongdai Lin2023
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding CollisionsCody Freitag; Ashrujit Ghoshal; Ilan Komargodski2023
Proof of Mirror Theory for a Wide Range of ξmaxBenoit Cogliati; Avijit Dutta; Mridul Nandi; Jacques Patarin; Abishanka Saha2023
Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way FunctionsXinyu Mao; Noam Mazor; Jiapeng Zhang2023
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One ComputationZhenzhen Bao; Seongha Hwang; Akiko Inoue; Byeonghak Lee; Jooyoung Lee; Kazuhiko Minematsu2023
Improved Power Analysis Attacks on FalconShiduo Zhang; Xiuhan Lin; Yang Yu; Weijia Wang2023
Effective and Efficient Masking with Low Noise Using Small-Mersenne-Prime CiphersLoic Masure; Pierrick Meaux; Thorben Moos; Francois-Xavier Standaert2023
12