会议文集


文集名Advances in Cryptology - CRYPTO 2025
会议名45th Annual International Cryptology Conference (CRYPTO 2025)
中译名《第四十五届国际密码学年会,卷5》
机构International Association for Cryptologic Research (IACR)
会议日期August 17-21, 2025
会议地点Santa Barbara, CA, USA
出版年2025
馆藏号358578


题名作者出版年
Finding and Protecting the Weakest Link On Side-Channel Attacks on y in Masked ML-DSAJulius Hermelink; Kai-Chun Ning; Richard Petri2025
Leakage-Resilient Circuits Against NC1, RevisitedYuyu Wang2025
Key Recovery from Side-Channel Power Analysis Attacks on Non-SIMD HQC DecryptionNathan Maillet; Cyrius Nugier; Vincent Migliore; Jean-Christophe Deneuville2025
Crowhammer: Full Key Recovery Attack on FALCON with a Single Rowhammer Bit FlipCalvin Abou Haidar; Quentin Payet; Mehdi Tibouchi2025
Guess-and-Determine Rebound: Applications to Key Collisions on AESLingyue Qin; Wenquan Bi; Xiaoyang Dong2025
Breaking the IEEE Encryption Standard XCB-AES in Two QueriesAmit Singh Bhati; Elena Andreeva2025
New Collision Attacks on Round-Reduced SHA-512Yingxin Li; Fukang Liu; Gaoli Wang; Haifeng Qian; Keting Jia; Xiangyu Kong2025
How to Recover the Full Plaintext of XCBPeng Wang; Shuping Mao; Ruozhou Xu; Jiwu Jing; Yuewu Wang2025
Triangulating Meet-in-the-Middle AttackBoxin Zhao; Qingliang Hou; Lingyue Qin; Xiaoyang Dong2025
Unlocking Mix-Basis Potential: Geometric Approach for Combined AttacksKai Hu; Chi Zhang; Chengcheng Chang; Jiashu Zhang; Meiqin Wang; Thomas Peyrin2025
Improved Resultant Attack Against Arithmetization-Oriented PrimitivesAugustin Bariant; Aurelien Boeuf; Pierre Briaud; Mael Hostettler; Morten Oygarden; Havard Raddum2025
Cryptographic Treatment of Key Control Security In Light of NIST SP 800-108Ritam Bhaumik; Avijit Dutta; Akiko Inoue; Tetsu Iwata; Ashwin Jha; Kazuhiko Minematsu; Mridul Nandi; Yu Sasaki; Meltem Sonmez Turan; Stefano Tessaro2025
The Exact Multi-User Security of Key-Alternating Feistel Ciphers with a Single PermutationYusuke Naito; Yu Sasaki; Takeshi Sugawara2025
Tweakable Permutation-Based Luby-Rackoff ConstructionsBishwajit Chakraborty; Abishanka Saha2025
Enhancing Provable Security and Efficiency of Permutation-Based DRBGsWoohyuk Chung; Seongha Hwang; Hwigyeom Kim; Jooyoung Lee2025
Integral Resistance of Block Ciphers with Key Whitening by Modular AdditionChristof Beierle; Phil Hebborn; Gregor Leander; Yevhen Perehuda2025
Transistor: a TFHE-Friendly Stream CipherJules Baudrin; Sonia Belaid; Nicolas Bon; Christina Boura; Anne Canteaut; Gaetan Leurent; Pascal Paillier; Leo Perrin; Matthieu Rivain; Yann Rotella; Samuel Tap2025
A Fully-Adaptive Threshold Partially-Oblivious PRFRuben Baecker; Paul Gerhart; Daniel Rausch; Dominique Schroder2025
Adaptive Security for Constrained PRFsKaishuo Cheng; Joseph Jaeger2025
Succinct PPRFs via Memory-Tight ReductionsJoel Alwen; Chris Brzuska; Jerome Govinden; Patrick Harasser; Stefano Tessaro2025
12