Advances in Cryptology – EUROCRYPT 2021 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I

The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceed...

Full description

Bibliographic Details
Other Authors: Canteaut, Anne (Editor), Standaert, François-Xavier (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2021, 2021
Edition:1st ed. 2021
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Symmetric Cryptanalysis
  • Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
  • Rotational Cryptanalysis From a Differential-Linear Perspective – Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
  • Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
  • A Deeper Look at Machine Learning-Based Cryptanalysis.
  • Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
  • Post-Quantum Multi-Party Computation
  • Lattices
  • A 2ⁿ/² -Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP
  • New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption – Stronger Security and Smaller Ciphertexts
  • On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem
  • On the ideal shortest vector problem over random rational primes
  • Homomorphic Encryption
  • Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys
  • High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function
  • On the Security of Homomorphic Encryption on Approximate Numbers
  • The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
  • Non-Interactive Zero Knowledge from Sub-exponential DDH
  • On the (in)security of ROS
  • New Representations of the AES Key Schedule
  • Public-Key Cryptography
  • Analysing the HPKE Standard
  • Tightly-Secure Authenticated Key Exchange, Revisited
  • Aggregatable Distributed Key Generation
  • Decentralized Multi-Authority ABE for DNFs from LWE
  • Isogenies
  • Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
  • One-way functions and malleability oracles: Hidden shift attacks on isogenybased protocols
  • Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem
  • Delay Encryption
  • Post-Quantum Cryptography
  • The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes
  • Improved cryptanalysis of UOV and Rainbow
  • Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)