Year | Title | Venue |

2016 | Multi-key Homomorphic Authenticators | asiacrypt |

2016 | Side-Channel Analysis Protection and Low-Latency in Action - - Case Study of PRINCE and Midori - | asiacrypt |

2016 | How to Generate and Use Universal Samplers | asiacrypt |

2016 | Collapse-Binding Quantum Commitments Without Random Oracles | asiacrypt |

2016 | Size-Hiding Computation for Multiple Parties | asiacrypt |

2016 | A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile - and Why It Is Not | asiacrypt |

2016 | Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions | asiacrypt |

2016 | How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes | asiacrypt |

2016 | Zero-Knowledge Accumulators and Set Algebra | asiacrypt |

2016 | A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm | asiacrypt |

2016 | Universal Composition with Responsive Environments | asiacrypt |

2016 | Authenticated Encryption with Variable Stretch | asiacrypt |

2016 | Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes | asiacrypt |

2016 | Digital Signatures Based on the Hardness of Ideal Lattice Problems in All Rings | asiacrypt |

2016 | Design Strategies for ARX with Provable Bounds: Sparx and LAX | asiacrypt |

2016 | Efficient Public-Key Distance Bounding Protocol | asiacrypt |

2016 | Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting | asiacrypt |

2016 | Reactive Garbling: Foundation, Instantiation, Application | asiacrypt |

2016 | Reverse Cycle Walking and Its Applications | asiacrypt |

2016 | Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks | asiacrypt |

2016 | Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations | asiacrypt |

2016 | Trick or Tweak: On the (In)security of OTR's Tweaks | asiacrypt |

2016 | When Are Fuzzy Extractors Possible? | asiacrypt |

2016 | Structure-Preserving Smooth Projective Hashing | asiacrypt |

2016 | Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds | asiacrypt |

2015 | Cliptography: Clipping the Power of Kleptographic Attacks | eprint |

2016 | Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions | asiacrypt |

2016 | Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings | asiacrypt |

2016 | Verifiable Functional Encryption | asiacrypt |

2016 | Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64 | asiacrypt |

2016 | How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones | asiacrypt |

2016 | More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22 | asiacrypt |

2016 | Towards Tightly Secure Lattice Short Signature and Id-Based Encryption | asiacrypt |

2016 | Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions | asiacrypt |

2016 | From Identification to Signatures, Tightly: A Framework and Generic Transforms | asiacrypt |

2016 | Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations | asiacrypt |

2016 | Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials | asiacrypt |

2016 | Optimization of \mathsf LPN Solving Algorithms | asiacrypt |

2016 | Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions | asiacrypt |

2016 | Efficient and Provable White-Box Primitives | asiacrypt |

2016 | MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity | asiacrypt |

2016 | Multi-input Functional Encryption with Unbounded-Message Security | asiacrypt |

2016 | A Shuffle Argument Secure in the Generic Model | asiacrypt |

2016 | Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption | asiacrypt |

2016 | A New Algorithm for the Unbalanced Meet-in-the-Middle Problem | asiacrypt |

2016 | Selective Opening Security from Simulatable Data Encapsulation | asiacrypt |

2016 | Indistinguishable Proofs of Work or Knowledge | asiacrypt |

2016 | Adaptive Oblivious Transfer and Generalization | asiacrypt |

2016 | Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm | asiacrypt |

2016 | How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers | asiacrypt |

2016 | On the Security of Supersingular Isogeny Cryptosystems | asiacrypt |

2016 | Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps | asiacrypt |

2016 | Simpira v2: A Family of Efficient Permutations Using the AES Round Function | asiacrypt |

2016 | Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience | asiacrypt |

2016 | The Kernel Matrix Diffie-Hellman Assumption | asiacrypt |

2016 | A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors | asiacrypt |

2016 | From 5-Pass *MQ* -Based Identification to *MQ* -Based Signatures | asiacrypt |

2016 | Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness | asiacrypt |

2016 | Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction | asiacrypt |

2016 | Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF | asiacrypt |

2016 | Salvaging Weak Security Bounds for Blockcipher-Based Constructions | asiacrypt |

2016 | Selective-Opening Security in the Presence of Randomness Failures | asiacrypt |

2016 | Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions | asiacrypt |

2016 | NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion | asiacrypt |

2016 | Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak | asiacrypt |

2016 | Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions | asiacrypt |

2016 | Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers | asiacrypt |

2016 | Cliptography: Clipping the Power of Kleptographic Attacks | asiacrypt |

2016 | Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I | asiacrypt |

2016 | Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II | asiacrypt |

2015 | A Physical Approach for Stochastic Modeling of TERO-Based TRNG | ches |

2015 | Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance | asiacrypt |

2016 | Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC | fse |

2016 | Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough | ches |

2016 | Towards Easy Leakage Certification | ches |

2016 | Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis | ches |

2016 | Reducing the Number of Non-linear Multiplications in Masking Schemes | ches |

2016 | \mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers | ches |

2016 | - vatiCAN - Vetted, Authenticated CAN Bus | ches |

2016 | Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications | ches |

2016 | EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ | ches |

2016 | Mitigating SAT Attack on Logic Locking | ches |

2016 | Run-Time Accessible DRAM PUFs in Commodity Devices | ches |

2016 | Strong 8-bit Sboxes with Efficient Masking in Hardware | ches |

2016 | Masking AES with d+1 Shares in Hardware | ches |

2016 | Strong Machine Learning Attack Against PUFs with No Mathematical Model | ches |

2016 | A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation | ches |

2016 | Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields | ches |

2016 | Physical Layer Group Key Agreement for Automotive Controller Area Networks | ches |

2016 | On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking | ches |

2016 | Correlated Extra-Reductions Defeat Blinded Regular Exponentiation | ches |

2016 | Faster Evaluation of SBoxes via Common Shares | ches |

2016 | Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme | ches |

2016 | A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks | ches |

2016 | QcBits: Constant-Time Small-Key Code-Based Cryptography | ches |

2016 | CacheBleed: A Timing Attack on OpenSSL Constant Time RSA | ches |

2016 | No Place to Hide: Contactless Probing of Secret Data on FPGAs | ches |

2016 | Efficient High-Speed WPA2 Brute Force Attacks Using Scalable Low-Cost FPGA Clustering | ches |

2016 | Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture | ches |

2016 | Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme | ches |