Takashima, Katsuyuki Post-quantum constant-round group key exchange from static assumptions. (English) Zbl 07315594 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 251-272 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Takashima}, Math. Ind. (Tokyo) 33, 251--272 (2021; Zbl 07315594) Full Text: DOI
Jo, Hyungrok; Sugiyama, Shingo; Yamasaki, Yoshinori Ramanujan graphs for post-quantum cryptography. (English) Zbl 07315593 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 231-250 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Jo} et al., Math. Ind. (Tokyo) 33, 231--250 (2021; Zbl 07315593) Full Text: DOI
Hashimoto, Yasufumi Recent developments in multivariate public key cryptosystems. (English) Zbl 07315592 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 209-229 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Hashimoto}, Math. Ind. (Tokyo) 33, 209--229 (2021; Zbl 07315592) Full Text: DOI
Yasuda, Masaya A survey of solving SVP algorithms and recent strategies for solving the SVP challenge. (English) Zbl 07315591 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 189-207 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Yasuda}, Math. Ind. (Tokyo) 33, 189--207 (2021; Zbl 07315591) Full Text: DOI
Kimoto, Kazufumi Generalized group-subgroup pair graphs. (English) Zbl 07315589 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 169-185 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Kimoto}, Math. Ind. (Tokyo) 33, 169--185 (2021; Zbl 07315589) Full Text: DOI
Reyes-Bustos, Cid Extended divisibility relations for constraint polynomials of the asymmetric quantum Rabi model. (English) Zbl 07315588 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 149-168 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Reyes-Bustos}, Math. Ind. (Tokyo) 33, 149--168 (2021; Zbl 07315588) Full Text: DOI
Frisk Kockum, Anton Quantum optics with giant atoms – the first five years. (English) Zbl 07315587 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 125-146 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Frisk Kockum}, Math. Ind. (Tokyo) 33, 125--146 (2021; Zbl 07315587) Full Text: DOI
Fujii, Tomohiro; Hirokawa, Masao A data concealing technique with random noise disturbance and a restoring technique for the concealed data by stochastic process estimation. (English) Zbl 07315586 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 103-124 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Fujii} and \textit{M. Hirokawa}, Math. Ind. (Tokyo) 33, 103--124 (2021; Zbl 07315586) Full Text: DOI
Wakayama, Masato Number theoretic study in quantum interactions. (English) Zbl 07315585 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 95-101 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Wakayama}, Math. Ind. (Tokyo) 33, 95--101 (2021; Zbl 07315585) Full Text: DOI
García-Álvarez, L.; Ferraro, A.; Ferrini, G. From the Bloch sphere to phase-space representations with the Gottesman-Kitaev-Preskill encoding. (English) Zbl 07315584 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 79-92 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{L. García-Álvarez} et al., Math. Ind. (Tokyo) 33, 79--92 (2021; Zbl 07315584) Full Text: DOI
Nuida, Koji Towards constructing fully homomorphic encryption without ciphertext noise from group theory. (English) Zbl 07315583 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 57-78 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Nuida}, Math. Ind. (Tokyo) 33, 57--78 (2021; Zbl 07315583) Full Text: DOI
Kunihiro, Noboru Quantum factoring algorithm: resource estimation and survey of experiments. (English) Zbl 07315582 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 39-55 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Kunihiro}, Math. Ind. (Tokyo) 33, 39--55 (2021; Zbl 07315582) Full Text: DOI
Tamura, Kentaro; Shikano, Yutaka Quantum random numbers generated by a cloud superconducting quantum computer. (English) Zbl 07315581 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 17-37 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Tamura} and \textit{Y. Shikano}, Math. Ind. (Tokyo) 33, 17--37 (2021; Zbl 07315581) Full Text: DOI
Muramatsu, Jun A review of secret key distribution based on bounded observability. (English) Zbl 07315580 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 13-14 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Muramatsu}, Math. Ind. (Tokyo) 33, 13--14 (2021; Zbl 07315580) Full Text: DOI
Oishi, Shin’ichi Verified numerical computations and related applications. (English) Zbl 07315579 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 11-12 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Oishi}, Math. Ind. (Tokyo) 33, 11--12 (2021; Zbl 07315579) Full Text: DOI
Semba, Kouichi Emerging ultrastrong coupling between light and matter observed in circuit quantum electrodynamics. (English) Zbl 07315578 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 7-8 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{K. Semba}, Math. Ind. (Tokyo) 33, 7--8 (2021; Zbl 07315578) Full Text: DOI
Braak, Daniel What kind of insight provide analytical solutions of quantum models? (English) Zbl 07315577 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 5-6 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Braak}, Math. Ind. (Tokyo) 33, 5--6 (2021; Zbl 07315577) Full Text: DOI
Buchmann, Johannes Sustainable cryptography. (English) Zbl 07315576 Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). Mathematics for Industry 33, 3 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Buchmann}, Math. Ind. (Tokyo) 33, 3 (2021; Zbl 07315576) Full Text: DOI
Özbudak, Ferruh; Sălăgean, Ana New generalized almost perfect nonlinear functions. (English) Zbl 07313152 Finite Fields Appl. 70, Article ID 101796, 33 p. (2021). MSC: 94A60 11T71 11T06 PDF BibTeX XML Cite \textit{F. Özbudak} and \textit{A. Sălăgean}, Finite Fields Appl. 70, Article ID 101796, 33 p. (2021; Zbl 07313152) Full Text: DOI
Aubry, Yves; Berardini, Elena; Herbaut, Fabien; Perret, Marc Algebraic geometry codes over abelian surfaces containing no absolutely irreducible curves of low genus. (English) Zbl 07313149 Finite Fields Appl. 70, Article ID 101791, 21 p. (2021). MSC: 14K05 14G50 94B27 PDF BibTeX XML Cite \textit{Y. Aubry} et al., Finite Fields Appl. 70, Article ID 101791, 21 p. (2021; Zbl 07313149) Full Text: DOI
Smith-Tone, Daniel; Tone, Cristina A multivariate cryptosystem inspired by random linear codes. (English) Zbl 07313141 Finite Fields Appl. 69, Article ID 101778, 35 p. (2021). MSC: 12E20 14G50 PDF BibTeX XML Cite \textit{D. Smith-Tone} and \textit{C. Tone}, Finite Fields Appl. 69, Article ID 101778, 35 p. (2021; Zbl 07313141) Full Text: DOI
Taniguchi, Hiroaki Distance regular graphs arising from dimensional dual hyperovals. (English) Zbl 07313139 Finite Fields Appl. 69, Article ID 101776, 15 p. (2021). MSC: 51E20 11T71 20B25 05E18 05E30 PDF BibTeX XML Cite \textit{H. Taniguchi}, Finite Fields Appl. 69, Article ID 101776, 15 p. (2021; Zbl 07313139) Full Text: DOI
Carvalho, Cícero; Neumann, Victor G. L. Completing the determination of the next-to-minimal weights of affine cartesian codes. (English) Zbl 07313138 Finite Fields Appl. 69, Article ID 101775, 14 p. (2021). MSC: 11T71 14G50 94B60 PDF BibTeX XML Cite \textit{C. Carvalho} and \textit{V. G. L. Neumann}, Finite Fields Appl. 69, Article ID 101775, 14 p. (2021; Zbl 07313138) Full Text: DOI
Koshelev, Dmitrii New point compression method for elliptic \(\mathbb{F}_{q^2}\)-curves of \(j\)-invariant 0. (English) Zbl 07313137 Finite Fields Appl. 69, Article ID 101774, 25 p. (2021). MSC: 12 14 94 PDF BibTeX XML Cite \textit{D. Koshelev}, Finite Fields Appl. 69, Article ID 101774, 25 p. (2021; Zbl 07313137) Full Text: DOI
Alfarano, Gianira N.; Lobillo, F. J.; Neri, Alessandro Roos bound for skew cyclic codes in Hamming and rank metric. (English) Zbl 07313136 Finite Fields Appl. 69, Article ID 101772, 24 p. (2021). MSC: 11T71 94B65 16S36 PDF BibTeX XML Cite \textit{G. N. Alfarano} et al., Finite Fields Appl. 69, Article ID 101772, 24 p. (2021; Zbl 07313136) Full Text: DOI
Chen, Shangdi; Liang, Junying Construction of spread codes based on abelian non-cyclic orbit codes. (English) Zbl 07309765 Linear Algebra Appl. 608, 54-67 (2021). MSC: 94B25 94B27 11T71 PDF BibTeX XML Cite \textit{S. Chen} and \textit{J. Liang}, Linear Algebra Appl. 608, 54--67 (2021; Zbl 07309765) Full Text: DOI
Renner, Julian; Neri, Alessandro; Puchinger, Sven Low-rank parity-check codes over Galois rings. (English) Zbl 07308515 Des. Codes Cryptography 89, No. 2, 351-386 (2021). MSC: 11T71 PDF BibTeX XML Cite \textit{J. Renner} et al., Des. Codes Cryptography 89, No. 2, 351--386 (2021; Zbl 07308515) Full Text: DOI
Ye, Chen-Dong; Tian, Tian; Zeng, Fan-Yang The MILP-aided conditional differential attack and its application to Trivium. (English) Zbl 07308513 Des. Codes Cryptography 89, No. 2, 317-339 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{C.-D. Ye} et al., Des. Codes Cryptography 89, No. 2, 317--339 (2021; Zbl 07308513) Full Text: DOI
Carvalho, Cícero; Neumann, Victor G. L. Towards the complete determination of next-to-minimal weights of projective Reed-Muller codes. (English) Zbl 07308512 Des. Codes Cryptography 89, No. 2, 301-315 (2021). MSC: 94B05 94B27 11T71 14G50 PDF BibTeX XML Cite \textit{C. Carvalho} and \textit{V. G. L. Neumann}, Des. Codes Cryptography 89, No. 2, 301--315 (2021; Zbl 07308512) Full Text: DOI
Jaramillo, Delio; Vaz Pinto, Maria; Villarreal, Rafael H. Evaluation codes and their basic parameters. (English) Zbl 07308511 Des. Codes Cryptography 89, No. 2, 269-300 (2021). MSC: 13P25 14G50 94B27 11T71 PDF BibTeX XML Cite \textit{D. Jaramillo} et al., Des. Codes Cryptography 89, No. 2, 269--300 (2021; Zbl 07308511) Full Text: DOI
Zhao, Xiaopeng; Cao, Zhenfu; Dong, Xiaolei; Shao, Jun Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity. (English) Zbl 07308509 Des. Codes Cryptography 89, No. 2, 241-253 (2021). MSC: 11T71 11R04 11R09 11R58 PDF BibTeX XML Cite \textit{X. Zhao} et al., Des. Codes Cryptography 89, No. 2, 241--253 (2021; Zbl 07308509) Full Text: DOI
Hasan, Sartaj Ul; Pal, Mohit; Riera, Constanza; Stănică, Pantelimon On the \(c\)-differential uniformity of certain maps over finite fields. (English) Zbl 07308508 Des. Codes Cryptography 89, No. 2, 221-239 (2021). MSC: 12E20 06E30 11T06 94A60 94C10 PDF BibTeX XML Cite \textit{S. U. Hasan} et al., Des. Codes Cryptography 89, No. 2, 221--239 (2021; Zbl 07308508) Full Text: DOI
Ballico, Edoardo; Favacchio, Giuseppe; Guardo, Elena; Milazzo, Lorenzo Steiner systems and configurations of points. (English) Zbl 07308507 Des. Codes Cryptography 89, No. 2, 199-219 (2021). MSC: 51E10 51E22 13F55 13F20 14G50 94B27 PDF BibTeX XML Cite \textit{E. Ballico} et al., Des. Codes Cryptography 89, No. 2, 199--219 (2021; Zbl 07308507) Full Text: DOI
Bitansky, Nir; Degwekar, Akshay; Vaikuntanathan, Vinod Structure versus hardness through the obfuscation Lens. (English) Zbl 07307642 SIAM J. Comput. 50, 98-144 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{N. Bitansky} et al., SIAM J. Comput. 50, 98--144 (2021; Zbl 07307642) Full Text: DOI
Applebaum, Benny; Brakerski, Zvika; Tsabary, Rotem Perfect secure computation in two rounds. (English) Zbl 07307641 SIAM J. Comput. 50, 68-97 (2021). MSC: 68Q01 94A60 PDF BibTeX XML Cite \textit{B. Applebaum} et al., SIAM J. Comput. 50, 68--97 (2021; Zbl 07307641) Full Text: DOI
Applebaum, Benny; Arkis, Barak; Raykov, Pavel; Vasudevan, Prashant Nalini Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations. (English) Zbl 07307640 SIAM J. Comput. 50, 32-67 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{B. Applebaum} et al., SIAM J. Comput. 50, 32--67 (2021; Zbl 07307640) Full Text: DOI
Leung, Ka Hin; Li, Shuxing; Prabowo, Theo Fanuela Nonexistence of strong external difference families in abelian groups of order being product of at most three primes. (English) Zbl 07304651 J. Comb. Theory, Ser. A 178, Article ID 105338, 28 p. (2021). MSC: 05B10 20C15 94A60 PDF BibTeX XML Cite \textit{K. H. Leung} et al., J. Comb. Theory, Ser. A 178, Article ID 105338, 28 p. (2021; Zbl 07304651) Full Text: DOI
Christandl, Matthias; Leditzky, Felix; Majenz, Christian; Smith, Graeme; Speelman, Florian; Walter, Michael Asymptotic performance of port-based teleportation. (English) Zbl 07303877 Commun. Math. Phys. 381, No. 1, 379-451 (2021). MSC: 81P48 81P17 81P68 81P40 81P94 81P73 60B20 94A24 PDF BibTeX XML Cite \textit{M. Christandl} et al., Commun. Math. Phys. 381, No. 1, 379--451 (2021; Zbl 07303877) Full Text: DOI
Bauer, Craig Secret history. The story of cryptology (to appear). 2nd edition. (English) Zbl 07302701 Chapman & Hall/CRC Cryptography and Network Security Series. Boca Raton, FL: CRC Press (ISBN 978-1-138-06123-1/hbk). 640 p. (2021). MSC: 94-03 94A60 01-01 01A60 11A51 11T71 81P94 00A09 97F60 97P20 PDF BibTeX XML Cite \textit{C. Bauer}, Secret history. The story of cryptology (to appear). 2nd edition. Boca Raton, FL: CRC Press (2021; Zbl 07302701)
Oblaukhov, Alexey On metric regularity of Reed-Muller codes. (English) Zbl 07300837 Des. Codes Cryptography 89, No. 1, 167-197 (2021). MSC: 94A60 06E30 68R01 94B05 PDF BibTeX XML Cite \textit{A. Oblaukhov}, Des. Codes Cryptography 89, No. 1, 167--197 (2021; Zbl 07300837) Full Text: DOI
Bamiloshin, Michael; Ben-Efraim, Aner; Farràs, Oriol; Padró, Carles Common information, matroid representation, and secret sharing for matroid ports. (English) Zbl 07300836 Des. Codes Cryptography 89, No. 1, 143-166 (2021). MSC: 68P30 52B40 94A62 94A60 PDF BibTeX XML Cite \textit{M. Bamiloshin} et al., Des. Codes Cryptography 89, No. 1, 143--166 (2021; Zbl 07300836) Full Text: DOI
Chakraborty, Pranab; Maitra, Subhamoy Further clarification on Mantin’s digraph repetition bias in RC4. (English) Zbl 07300835 Des. Codes Cryptography 89, No. 1, 127-141 (2021). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Chakraborty} and \textit{S. Maitra}, Des. Codes Cryptography 89, No. 1, 127--141 (2021; Zbl 07300835) Full Text: DOI
Wang, Xin Improved upper bounds for parent-identifying set systems and separable codes. (English) Zbl 07300833 Des. Codes Cryptography 89, No. 1, 91-104 (2021). MSC: 94A60 94B25 PDF BibTeX XML Cite \textit{X. Wang}, Des. Codes Cryptography 89, No. 1, 91--104 (2021; Zbl 07300833) Full Text: DOI
Calderini, Marco Differentially low uniform permutations from known 4-uniform functions. (English) Zbl 07300830 Des. Codes Cryptography 89, No. 1, 33-52 (2021). MSC: 94A60 11T71 06E30 PDF BibTeX XML Cite \textit{M. Calderini}, Des. Codes Cryptography 89, No. 1, 33--52 (2021; Zbl 07300830) Full Text: DOI
Budaghyan, Lilya; Calderini, Marco; Carlet, Claude; Coulter, Robert; Villa, Irene Generalized isotopic shift construction for APN functions. (English) Zbl 07300829 Des. Codes Cryptography 89, No. 1, 19-32 (2021). MSC: 94A60 11T71 06E30 PDF BibTeX XML Cite \textit{L. Budaghyan} et al., Des. Codes Cryptography 89, No. 1, 19--32 (2021; Zbl 07300829) Full Text: DOI
Mesnager, Sihem; Su, Sihong; Zhang, Hui A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity. (English) Zbl 07300828 Des. Codes Cryptography 89, No. 1, 1-17 (2021). MSC: 94C10 14G50 94A60 94B27 94B40 PDF BibTeX XML Cite \textit{S. Mesnager} et al., Des. Codes Cryptography 89, No. 1, 1--17 (2021; Zbl 07300828) Full Text: DOI
Taleb, Abdul Rahman; Vergnaud, Damien Speeding-up verification of digital signatures. (English) Zbl 07300314 J. Comput. Syst. Sci. 116, 22-39 (2021). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{A. R. Taleb} and \textit{D. Vergnaud}, J. Comput. Syst. Sci. 116, 22--39 (2021; Zbl 07300314) Full Text: DOI
Berman, Abraham A problem based journey from elementary number theory to an introduction to matrix theory. The president problems (to appear). (English) Zbl 07291791 Hackensack, NJ: World Scientific (ISBN 978-981-12-3487-3/hbk). 130 p. (2021). MSC: 11-01 12-01 13-01 15-01 20-01 94A60 00A07 PDF BibTeX XML Cite \textit{A. Berman}, A problem based journey from elementary number theory to an introduction to matrix theory. The president problems (to appear). Hackensack, NJ: World Scientific (2021; Zbl 07291791) Full Text: DOI
Chen, Xi; Qu, Longjiang; Fu, Shaojing; Li, Chao The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions. (English) Zbl 07289405 Discrete Appl. Math. 289, 477-491 (2021). MSC: 94 03 PDF BibTeX XML Cite \textit{X. Chen} et al., Discrete Appl. Math. 289, 477--491 (2021; Zbl 07289405) Full Text: DOI
Chinen, Koji On some families of invariant polynomials divisible by three and their zeta functions. (English) Zbl 07287141 Math. J. Okayama Univ. 63, 175-182 (2021). MSC: 11T71 13A50 12D10 PDF BibTeX XML Cite \textit{K. Chinen}, Math. J. Okayama Univ. 63, 175--182 (2021; Zbl 07287141) Full Text: Link
Takayasu, Atsushi; Watanabe, Yohei Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more. (English) Zbl 07285597 Theor. Comput. Sci. 849, 64-98 (2021). MSC: 68Q PDF BibTeX XML Cite \textit{A. Takayasu} and \textit{Y. Watanabe}, Theor. Comput. Sci. 849, 64--98 (2021; Zbl 07285597) Full Text: DOI
Tregubov, P. A.; Trushechkin, A. S. Quantum stream ciphers: impossibility of unconditionally strong algorithms. (English. Russian original) Zbl 1453.81014 J. Math. Sci., New York 252, No. 1, 90-103 (2021); translation from Itogi Nauki Tekh., Ser. Sovrem. Mat. Prilozh., Temat. Obz. 151, 91-104 (2018). MSC: 81P94 94A60 81P68 81P70 81P18 PDF BibTeX XML Cite \textit{P. A. Tregubov} and \textit{A. S. Trushechkin}, J. Math. Sci., New York 252, No. 1, 90--103 (2021; Zbl 1453.81014); translation from Itogi Nauki Tekh., Ser. Sovrem. Mat. Prilozh., Temat. Obz. 151, 91--104 (2018) Full Text: DOI
Mihailescu, Marius Iulian; Nita, Stefania Loredana Pro cryptography and cryptanalysis. Creating advanced algorithms with C# and .NET. (English) Zbl 1451.94001 Berkeley, CA: Apress (ISBN 978-1-4842-6366-2/pbk; 978-1-4842-6367-9/ebook). xxx, 556 p. (2021). MSC: 94-01 94-04 94A60 PDF BibTeX XML Cite \textit{M. I. Mihailescu} and \textit{S. L. Nita}, Pro cryptography and cryptanalysis. Creating advanced algorithms with C\# and .NET. Berkeley, CA: Apress (2021; Zbl 1451.94001) Full Text: DOI
Sun, Yujuan Improving high-meets-low technique to generate odd-variable resilient Boolean functions with currently best nonlinearity. (English) Zbl 07282517 Discrete Math. 344, No. 2, Article ID 112203, 12 p. (2021). MSC: 94D10 94A60 PDF BibTeX XML Cite \textit{Y. Sun}, Discrete Math. 344, No. 2, Article ID 112203, 12 p. (2021; Zbl 07282517) Full Text: DOI
Katz, Jonathan; Lindell, Yehuda Introduction to modern cryptography. 3rd edition. (English) Zbl 07274771 Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: CRC Press (ISBN 978-0-8153-5436-9/hbk). 648 p. (2021). MSC: 94-01 94A60 PDF BibTeX XML Cite \textit{J. Katz} and \textit{Y. Lindell}, Introduction to modern cryptography. 3rd edition. Boca Raton, FL: CRC Press (2021; Zbl 07274771)
Panhwar, Muhammad Aamir; Khuhro, Sijjad Ali; Mazhar, Tehseen; ZhongLiang, Deng; Qadir, Nabeel Quantum cryptography: a way of improving security of information. (English) Zbl 1444.81014 Int. J. Math. Comput. Sci. 16, No. 1, 9-21 (2021). MSC: 81P94 68P25 PDF BibTeX XML Cite \textit{M. A. Panhwar} et al., Int. J. Math. Comput. Sci. 16, No. 1, 9--21 (2021; Zbl 1444.81014) Full Text: Link
Takagi, Tsuyoshi (ed.); Wakayama, Masato (ed.); Tanaka, Keisuke (ed.); Kunihiro, Noboru (ed.); Kimoto, Kazufumi (ed.); Ikematsu, Yasuhiko (ed.) International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. (English) Zbl 07214671 Mathematics for Industry 33. Singapore: Springer (ISBN 978-981-15-5190-1/hbk; 978-981-15-5191-8/ebook). xii, 274 p. open access (2021). MSC: 94-06 94A60 00B25 81P68 81P94 PDF BibTeX XML Cite \textit{T. Takagi} (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25--27, 2019. Singapore: Springer (2021; Zbl 07214671) Full Text: DOI
Zhang, Aixian; Feng, Keqin A new criterion on \(k\)-normal elements over finite fields. (English) Zbl 07316408 Chin. Ann. Math., Ser. B 41, No. 5, 665-678 (2020). MSC: 11T71 97H40 PDF BibTeX XML Cite \textit{A. Zhang} and \textit{K. Feng}, Chin. Ann. Math., Ser. B 41, No. 5, 665--678 (2020; Zbl 07316408) Full Text: DOI
Xu, Liqing; Chen, Hao; Li, Chao; Qu, Longjiang Vulnerable public keys in NTRU cryptosystem. (English) Zbl 07316407 Chin. Ann. Math., Ser. B 41, No. 5, 657-664 (2020). MSC: 94A60 11H06 PDF BibTeX XML Cite \textit{L. Xu} et al., Chin. Ann. Math., Ser. B 41, No. 5, 657--664 (2020; Zbl 07316407) Full Text: DOI
Akishin, Aleksandr V. Group polynomials over rings. (English. Russian original) Zbl 07316002 Discrete Math. Appl. 30, No. 6, 357-364 (2020); translation from Diskretn. Mat. 31, No. 2, 3-13 (2019). MSC: 13 94 PDF BibTeX XML Cite \textit{A. V. Akishin}, Discrete Math. Appl. 30, No. 6, 357--364 (2020; Zbl 07316002); translation from Diskretn. Mat. 31, No. 2, 3--13 (2019) Full Text: DOI
Goswami, Partha Sarathi; Chakraborty, Tamal; Chattopadhyay, Abir Knapsack encoding for secured quantum key distribution protocol. (English) Zbl 07315270 Mod. Phys. Lett. A 35, No. 36, Article ID 2050295, 16 p. (2020). MSC: 81P94 PDF BibTeX XML Cite \textit{P. S. Goswami} et al., Mod. Phys. Lett. A 35, No. 36, Article ID 2050295, 16 p. (2020; Zbl 07315270) Full Text: DOI
Esiyok, Ilkan; Hanzlik, Lucjan; Künnemann, Robert; Budde, Lena Marie; Backes, Michael TrollThrottle – raising the cost of astroturfing. (English) Zbl 07314403 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 456-476 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{I. Esiyok} et al., Lect. Notes Comput. Sci. 12147, 456--476 (2020; Zbl 07314403) Full Text: DOI
Gennaro, Rosario; Hadaller, David; Jafarikhah, Tahereh; Liu, Zhuobang; Skeith, William E.; Timashova, Anastasiia Publicly evaluatable perceptual hashing. (English) Zbl 07314402 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 436-455 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{R. Gennaro} et al., Lect. Notes Comput. Sci. 12147, 436--455 (2020; Zbl 07314402) Full Text: DOI
Thao, Tran Phuong; Sawaya, Yukiko; Nguyen-Son, Hoang-Quoc; Yamada, Akira; Kubota, Ayumu; Van Sang, Tran; Yamaguchi, Rie Shigetomi Human factors in homograph attack recognition. (English) Zbl 07314401 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 408-435 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{T. P. Thao} et al., Lect. Notes Comput. Sci. 12147, 408--435 (2020; Zbl 07314401) Full Text: DOI
Debnath, Joyanta; Chau, Sze Yiu; Chowdhury, Omar When TLS meets proxy on mobile. (English) Zbl 07314400 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 387-407 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{J. Debnath} et al., Lect. Notes Comput. Sci. 12147, 387--407 (2020; Zbl 07314400) Full Text: DOI
Eldefrawy, Karim; Locasto, Michael; Rattanavipanon, Norrathep; Saidi, Hassen Towards automated augmentation and instrumentation of legacy cryptographic executables. (English) Zbl 07314399 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 364-384 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{K. Eldefrawy} et al., Lect. Notes Comput. Sci. 12147, 364--384 (2020; Zbl 07314399) Full Text: DOI
Zhang, Zhangkai; Cheng, Yueqiang; Li, Zhoujun Super root: a new stealthy rooting technique on ARM devices. (English) Zbl 07314398 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 344-363 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 12147, 344--363 (2020; Zbl 07314398) Full Text: DOI
Santucci, Pierpaolo; Ingrassia, Emiliano; Picierro, Giulio; Cesati, Marco MemShield: GPU-assisted software memory encryption. (English) Zbl 07314397 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 323-343 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{P. Santucci} et al., Lect. Notes Comput. Sci. 12147, 323--343 (2020; Zbl 07314397) Full Text: DOI
Rubio, Juan E.; Alcaraz, Cristina; Lopez, Javier Game theory-based approach for defense against APTs. (English) Zbl 07314396 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 297-320 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{J. E. Rubio} et al., Lect. Notes Comput. Sci. 12147, 297--320 (2020; Zbl 07314396) Full Text: DOI
Griffioen, Harm; Booij, Tim; Doerr, Christian Quality evaluation of cyber threat intelligence feeds. (English) Zbl 07314395 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 277-296 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{H. Griffioen} et al., Lect. Notes Comput. Sci. 12147, 277--296 (2020; Zbl 07314395) Full Text: DOI
De Gaspari, Fabio; Hitaj, Dorjan; Pagnotta, Giulio; De Carli, Lorenzo; Mancini, Luigi V. The Naked Sun: malicious cooperation between benign-looking processes. (English) Zbl 07314394 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 254-274 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{F. De Gaspari} et al., Lect. Notes Comput. Sci. 12147, 254--274 (2020; Zbl 07314394) Full Text: DOI
Hils, Maximilian; Böhme, Rainer Watching the weak link into your home: an inspection and monitoring toolkit for TR-069 (abridged conference version). (English) Zbl 07314393 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 233-253 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{M. Hils} and \textit{R. Böhme}, Lect. Notes Comput. Sci. 12147, 233--253 (2020; Zbl 07314393) Full Text: DOI
Hoffmann, Stefan; Müller, Jens; Schwenk, Jörg; Bumiller, Gerd Powerless security. A security analysis of in-home power line communications based on HomePlug AV2. (English) Zbl 07314392 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 213-232 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{S. Hoffmann} et al., Lect. Notes Comput. Sci. 12147, 213--232 (2020; Zbl 07314392) Full Text: DOI
Vatandas, Nihal; Gennaro, Rosario; Ithurburn, Bertrand; Krawczyk, Hugo On the cryptographic deniability of the Signal protocol. (English) Zbl 07314391 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 188-209 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{N. Vatandas} et al., Lect. Notes Comput. Sci. 12147, 188--209 (2020; Zbl 07314391) Full Text: DOI
Campion, Sébastien; Devigne, Julien; Duguey, Céline; Fouque, Pierre-Alain Multi-device for Signal. (English) Zbl 07314390 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 167-187 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{S. Campion} et al., Lect. Notes Comput. Sci. 12147, 167--187 (2020; Zbl 07314390) Full Text: DOI
Do, Xuan Thanh; Phan, Duong Hieu; Yung, Moti A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes. (English) Zbl 07314389 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 145-164 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{X. T. Do} et al., Lect. Notes Comput. Sci. 12147, 145--164 (2020; Zbl 07314389) Full Text: DOI
Fenteany, Peter; Fuller, Benjamin Same point composable and nonmalleable obfuscated point functions. (English) Zbl 07314388 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 124-144 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{P. Fenteany} and \textit{B. Fuller}, Lect. Notes Comput. Sci. 12147, 124--144 (2020; Zbl 07314388) Full Text: DOI
Hoang, Anh-Tu; Carminati, Barbara; Ferrari, Elena Cluster-based anonymization of knowledge graphs. (English) Zbl 07314387 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 104-123 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{A.-T. Hoang} et al., Lect. Notes Comput. Sci. 12147, 104--123 (2020; Zbl 07314387) Full Text: DOI
Vo, Viet; Lai, Shangqi; Yuan, Xingliang; Sun, Shi-Feng; Nepal, Surya; Liu, Joseph K. Accelerating forward and backward private searchable encryption using trusted execution. (English) Zbl 07314386 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 83-103 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{V. Vo} et al., Lect. Notes Comput. Sci. 12147, 83--103 (2020; Zbl 07314386) Full Text: DOI
Durak, F. Betül; Huguenin-Dumittan, Loïs; Vaudenay, Serge \(\mathsf{BioLocker}\): a practical biometric authentication mechanism based on 3D fingervein. (English) Zbl 07314385 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 62-80 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{F. B. Durak} et al., Lect. Notes Comput. Sci. 12147, 62--80 (2020; Zbl 07314385) Full Text: DOI
Gardham, Daniel; Manulis, Mark; Drăgan, Constantin Cătălin Biometric-authenticated searchable encryption. (English) Zbl 07314384 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 40-61 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{D. Gardham} et al., Lect. Notes Comput. Sci. 12147, 40--61 (2020; Zbl 07314384) Full Text: DOI
Bentafat, Elmahdi; Rathore, M. Mazhar; Bakiras, Spiridon A practical system for privacy-preserving video surveillance. (English) Zbl 07314383 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 21-39 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{E. Bentafat} et al., Lect. Notes Comput. Sci. 12147, 21--39 (2020; Zbl 07314383) Full Text: DOI
Benegui, Cezara; Ionescu, Radu Tudor A breach into the authentication with built-in camera (ABC) protocol. (English) Zbl 07314382 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 3-20 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{C. Benegui} and \textit{R. T. Ionescu}, Lect. Notes Comput. Sci. 12147, 3--20 (2020; Zbl 07314382) Full Text: DOI
Hutchinson, Aaron; LeGrow, Jason; Koziel, Brian; Azarderakhsh, Reza Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors. (English) Zbl 07314297 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 481-501 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{A. Hutchinson} et al., Lect. Notes Comput. Sci. 12146, 481--501 (2020; Zbl 07314297) Full Text: DOI
Büscher, Niklas; Demmler, Daniel; Karvelas, Nikolaos P.; Katzenbeisser, Stefan; Krämer, Juliane; Rathee, Deevashwer; Schneider, Thomas; Struck, Patrick Secure two-party computation in a quantum world. (English) Zbl 07314296 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 461-480 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{N. Büscher} et al., Lect. Notes Comput. Sci. 12146, 461--480 (2020; Zbl 07314296) Full Text: DOI
Alkim, Erdem; Barreto, Paulo S. L. M.; Bindel, Nina; Krämer, Juliane; Longa, Patrick; Ricardini, Jefferson E. The lattice-based digital signature scheme qTESLA. (English) Zbl 07314295 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 441-460 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{E. Alkim} et al., Lect. Notes Comput. Sci. 12146, 441--460 (2020; Zbl 07314295) Full Text: DOI
Wang, Bin; Gu, Xiaozhuo; Yang, Yingshan Saber on ESP32. (English) Zbl 07314294 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 421-440 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{B. Wang} et al., Lect. Notes Comput. Sci. 12146, 421--440 (2020; Zbl 07314294) Full Text: DOI
Bouman, Niek J.; de Vreede, Niels A practical approach to the secure computation of the Moore-Penrose pseudoinverse over the rationals. (English) Zbl 07314293 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 398-417 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{N. J. Bouman} and \textit{N. de Vreede}, Lect. Notes Comput. Sci. 12146, 398--417 (2020; Zbl 07314293) Full Text: DOI
Blanton, Marina; Kang, Ahreum; Yuan, Chen Improved building blocks for secure multi-party computation based on secret sharing with honest majority. (English) Zbl 07314292 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 377-397 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{M. Blanton} et al., Lect. Notes Comput. Sci. 12146, 377--397 (2020; Zbl 07314292) Full Text: DOI
Hiwatashi, Keitaro; Ohata, Satsuya; Nuida, Koji An efficient secure division protocol using approximate multi-bit product and new constant-round building blocks. (English) Zbl 07314291 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 357-376 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{K. Hiwatashi} et al., Lect. Notes Comput. Sci. 12146, 357--376 (2020; Zbl 07314291) Full Text: DOI
Abadi, Aydin; Ciampi, Michele; Kiayias, Aggelos; Zikas, Vassilis Timed signatures and zero-knowledge proofs – timestamping in the blockchain era. (English) Zbl 07314290 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 335-354 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{A. Abadi} et al., Lect. Notes Comput. Sci. 12146, 335--354 (2020; Zbl 07314290) Full Text: DOI
Deuber, Dominic; Döttling, Nico; Magri, Bernardo; Malavolta, Giulio; Thyagarajan, Sri Aravinda Krishnan Minting mechanism for proof of stake blockchains. (English) Zbl 07314289 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 315-334 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{D. Deuber} et al., Lect. Notes Comput. Sci. 12146, 315--334 (2020; Zbl 07314289) Full Text: DOI
Hohenberger, Susan; Waters, Brent New methods and abstractions for RSA-based forward secure signatures. (English) Zbl 07314288 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 292-312 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{S. Hohenberger} and \textit{B. Waters}, Lect. Notes Comput. Sci. 12146, 292--312 (2020; Zbl 07314288) Full Text: DOI
Faonio, Antonio; Fiore, Dario Improving the efficiency of re-randomizable and replayable CCA secure public key encryption. (English) Zbl 07314287 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 271-291 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{A. Faonio} and \textit{D. Fiore}, Lect. Notes Comput. Sci. 12146, 271--291 (2020; Zbl 07314287) Full Text: DOI
Kim, Intae; Hwang, Seong Oun; Susilo, Willy; Baek, Joonsang; Kim, Jongkil Efficient anonymous multi-group broadcast encryption. (English) Zbl 07314286 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 251-270 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{I. Kim} et al., Lect. Notes Comput. Sci. 12146, 251--270 (2020; Zbl 07314286) Full Text: DOI
Chvojka, Peter; Jager, Tibor; Kakvi, Saqib A. Offline witness encryption with semi-adaptive security. (English) Zbl 07314285 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 231-250 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{P. Chvojka} et al., Lect. Notes Comput. Sci. 12146, 231--250 (2020; Zbl 07314285) Full Text: DOI
Huguenin-Dumittan, Loïs; Vaudenay, Serge Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes. (English) Zbl 07314284 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 208-227 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{L. Huguenin-Dumittan} and \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 12146, 208--227 (2020; Zbl 07314284) Full Text: DOI
Fujita, Rintaro; Isobe, Takanori; Minematsu, Kazuhiko ACE in chains: how risky is CBC encryption of binary executable files? (English) Zbl 07314283 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 187-207 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{R. Fujita} et al., Lect. Notes Comput. Sci. 12146, 187--207 (2020; Zbl 07314283) Full Text: DOI
Azarderakhsh, Reza; Jao, David; Koziel, Brian; LeGrow, Jason T.; Soukharev, Vladimir; Taraskin, Oleg How not to create an isogeny-based PAKE. (English) Zbl 07314282 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 169-186 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{R. Azarderakhsh} et al., Lect. Notes Comput. Sci. 12146, 169--186 (2020; Zbl 07314282) Full Text: DOI
Kraleva, Liliya; Ashur, Tomer; Rijmen, Vincent Rotational cryptanalysis on MAC algorithm chaskey. (English) Zbl 07314281 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer (ISBN 978-3-030-57807-7/pbk; 978-3-030-57808-4/ebook). Lecture Notes in Computer Science 12146, 153-168 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{L. Kraleva} et al., Lect. Notes Comput. Sci. 12146, 153--168 (2020; Zbl 07314281) Full Text: DOI