Advances in Cryptology – EUROCRYPT 2021 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II /

The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceed...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Canteaut, Anne. (Editor, http://id.loc.gov/vocabulary/relators/edt), Standaert, François-Xavier. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2021.
Edition:1st ed. 2021.
Series:Security and Cryptology ; 12697
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-77886-6
Table of Contents:
  • Symmetric Designs
  • Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
  • Mind the Middle Layer: The HADES Design Strategy Revisited
  • Password Hashing and Preprocessing
  • Compactness of Hashing Modes and Efficiency beyond Merkle Tree
  • Real-World Cryptanalysis
  • Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
  • Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
  • Implementation Issues
  • Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited
  • Dummy Shuffling against Algebraic Attacks in White-box Implementations
  • Advanced Lattice Sieving on GPUs, with Tensor Cores
  • Masking and Secret-Sharing
  • Fast verification of masking schemes in characteristic two
  • On the Power of Expansion: More Efficient Constructions in the Random Probing Model
  • Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages
  • Leakage, Faults and Tampering
  • Leakage Resilient Value Comparison With Application to Message Authentication
  • The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
  • Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
  • Multi-Source Non-Malleable Extractors and Applications
  • Quantum Constructions and Proofs
  • Secure Software Leasing
  • Oblivious Transfer is in MiniQCrypt
  • Security Analysis of Quantum Lightning
  • Classical vs Quantum Random Oracles
  • On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
  • Classical proofs of quantum knowledge
  • Multiparty Computation
  • Order-C Secure Multiparty Computation for Highly Repetitive Circuits
  • The More The Merrier: Reducing the Cost of Large Scale MPC
  • Multi-Party Reusable Non-Interactive Secure Computation from LWE
  • Unbounded Multi-Party Computation from Learning with Errors
  • Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
  • Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields
  • Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN
  • Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
  • VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.