Advances in Cryptology – EUROCRYPT 2021 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I
The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceed...
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer International Publishing
2021, 2021
|
Edition: | 1st ed. 2021 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Symmetric Cryptanalysis
- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
- Rotational Cryptanalysis From a Differential-Linear Perspective – Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette
- Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
- A Deeper Look at Machine Learning-Based Cryptanalysis.
- Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
- Post-Quantum Multi-Party Computation
- Lattices
- A 2ⁿ/² -Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP
- New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption – Stronger Security and Smaller Ciphertexts
- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem
- On the ideal shortest vector problem over random rational primes
- Homomorphic Encryption
- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys
- High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function
- On the Security of Homomorphic Encryption on Approximate Numbers
- The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
- Non-Interactive Zero Knowledge from Sub-exponential DDH
- On the (in)security of ROS
- New Representations of the AES Key Schedule
- Public-Key Cryptography
- Analysing the HPKE Standard
- Tightly-Secure Authenticated Key Exchange, Revisited
- Aggregatable Distributed Key Generation
- Decentralized Multi-Authority ABE for DNFs from LWE
- Isogenies
- Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
- One-way functions and malleability oracles: Hidden shift attacks on isogenybased protocols
- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem
- Delay Encryption
- Post-Quantum Cryptography
- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes
- Improved cryptanalysis of UOV and Rainbow
- Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)