Skip to main content
  • Conference proceedings
  • © 2020

Advances in Cryptology – ASIACRYPT 2020

26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12491)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2020.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

    Pages i-xxvii
  2. Best Paper Awards

    1. Front Matter

      Pages 1-1
    2. New Results on Gimli: Full-Permutation Distinguishers and Improved Collisions

      • Antonio Flórez Gutiérrez, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, André Schrottenloher, Ferdinand Sibleyras
      Pages 33-63
    3. SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies

      • Luca De Feo, David Kohel, Antonin Leroux, Christophe Petit, Benjamin Wesolowski
      Pages 64-93
  3. Encryption Schemes

    1. Front Matter

      Pages 95-95
    2. Public-Key Generation with Verifiable Randomness

      • Olivier Blazy, Patrick Towa, Damien Vergnaud
      Pages 97-127
    3. Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security

      • Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
      Pages 128-158
    4. CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors

      • Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
      Pages 159-190
    5. Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting

      • Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo
      Pages 191-220
    6. Security Reductions for White-Box Key-Storage in Mobile Payments

      • Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels
      Pages 221-252
    7. Circular Security Is Complete for KDM Security

      • Fuyuki Kitagawa, Takahiro Matsuda
      Pages 253-285
  4. Post-quantum Cryptography

    1. Front Matter

      Pages 287-287
    2. Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications

      • Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest
      Pages 289-320
    3. Post-Quantum Verification of Fujisaki-Okamoto

      • Dominique Unruh
      Pages 321-352
    4. A New Decryption Failure Attack Against HQC

      • Qian Guo, Thomas Johansson
      Pages 353-382
  5. Cryptanalysis

    1. Front Matter

      Pages 383-383
    2. A Bit-Vector Differential Model for the Modular Addition by a Constant

      • Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
      Pages 385-414
    3. Mind the Propagation of States

      • Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang
      Pages 415-445

About this book

The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.

The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows:

Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis.

Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange.

Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.

 

Editors and Affiliations

  • Network Security Research Institute (NICT), Tokyo, Japan

    Shiho Moriai

  • Nanyang Technological University, Singapore, Singapore

    Huaxiong Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access