Advances in cryptology -- EUROCRYPT 2021 : Part II / 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings. Anne Canteaut, François-Xavier Standaert (eds.).

The 3-volume-set LNCS 12696 - 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceed...

Full description

Saved in:
Bibliographic Details
Corporate Author: EUROCRYPT (Conference) Zagreb, Croatia)
Other Authors: Canteaut, Anne (Editor), Standaert, François-Xavier (Editor)
Format: eBook
Language:English
Published: Cham, Switzerland : Springer, 2021.
Series:Lecture notes in computer science ; 12697.
LNCS sublibrary. Security and cryptology.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Symmetric Designs
  • Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
  • Mind the Middle Layer: The HADES Design Strategy Revisited
  • Password Hashing and Preprocessing
  • Compactness of Hashing Modes and Efficiency beyond Merkle Tree
  • Real-World Cryptanalysis
  • Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
  • Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
  • Implementation Issues
  • Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited
  • Dummy Shuffling against Algebraic Attacks in White-box Implementations
  • Advanced Lattice Sieving on GPUs, with Tensor Cores
  • Masking and Secret-Sharing
  • Fast verification of masking schemes in characteristic two
  • On the Power of Expansion: More Efficient Constructions in the Random Probing Model
  • Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages
  • Leakage, Faults and Tampering
  • Leakage Resilient Value Comparison With Application to Message Authentication
  • The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
  • Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
  • Multi-Source Non-Malleable Extractors and Applications
  • Quantum Constructions and Proofs
  • Secure Software Leasing
  • Oblivious Transfer is in MiniQCrypt
  • Security Analysis of Quantum Lightning
  • Classical vs Quantum Random Oracles
  • On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
  • Classical proofs of quantum knowledge
  • Multiparty Computation
  • Order-C Secure Multiparty Computation for Highly Repetitive Circuits
  • The More The Merrier: Reducing the Cost of Large Scale MPC
  • Multi-Party Reusable Non-Interactive Secure Computation from LWE
  • Unbounded Multi-Party Computation from Learning with Errors
  • Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
  • Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields
  • Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN
  • Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
  • VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.