|
Asiacrypt 2016 Best Paper |
|
|
|
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds |
|
|
3 | (34) |
|
|
|
|
|
|
|
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm |
|
|
37 | (26) |
|
|
|
On the Security of Supersingular Isogeny Cryptosystems |
|
|
63 | (32) |
|
|
|
|
|
|
|
Simpira v2: A Family of Efficient Permutations Using the AES Round Function |
|
|
95 | (31) |
|
|
|
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness |
|
|
126 | (33) |
|
|
|
|
Efficient and Provable White-Box Primitives |
|
|
159 | (32) |
|
|
|
|
|
|
|
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity |
|
|
191 | (29) |
|
|
|
|
|
|
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks |
|
|
220 | (29) |
|
|
|
|
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak |
|
|
249 | (28) |
|
|
|
|
|
|
When Are Fuzzy Extractors Possible? |
|
|
277 | (30) |
|
|
|
|
More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22 |
|
|
307 | (26) |
|
|
|
|
|
|
|
|
Trick or Tweak: On the (In)security of OTR's Tweaks |
|
|
333 | (21) |
|
|
|
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm |
|
|
354 | (15) |
|
|
|
|
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes |
|
|
369 | (27) |
|
|
|
|
|
|
Authenticated Encryption with Variable Stretch |
|
|
396 | (33) |
|
|
|
|
|
|
Salvaging Weak Security Bounds for Blockcipher-Based Constructions |
|
|
429 | (26) |
|
|
|
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers |
|
|
455 | (29) |
|
|
|
|
|
|
Design Strategies for ARX with Provable Bounds: Sparx and LAX |
|
|
484 | (33) |
|
|
|
|
|
|
|
SCA and Leakage Resilience I |
|
|
|
Side-Channel Analysis Protection and Low-Latency in Action: -- Case Study of PRINCE and Midori |
|
|
517 | (31) |
|
|
|
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations |
|
|
548 | (25) |
|
|
|
|
|
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations |
|
|
573 | (29) |
|
|
|
|
|
Francois-Xavier Standaert |
|
|
|
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF |
|
|
602 | (25) |
|
|
Francois-Xavier Standaert |
|
|
|
|
|
|
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem |
|
|
627 | (21) |
|
|
|
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers |
|
|
648 | (31) |
|
|
|
|
|
Reverse Cycle Walking and Its Applications |
|
|
679 | (24) |
|
|
|
|
|
Optimization of LPN Solving Algorithms |
|
|
703 | (26) |
|
|
|
The Kernel Matrix Diffie-Hellman Assumption |
|
|
729 | (30) |
|
|
|
|
Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials |
|
|
759 | (30) |
|
|
|
|
|
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors |
|
|
789 | (30) |
|
|
|
|
SCA and Leakage Resilience II |
|
|
|
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not |
|
|
819 | (25) |
|
|
|
|
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions |
|
|
844 | (33) |
|
|
|
|
|
|
|
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience |
|
|
877 | (31) |
|
|
|
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions |
|
|
908 | (31) |
|
|
Author Index |
|
939 | |