Cryptography Track

This academically focused and refereed track for mathematicians and computer scientists offers presentations of the very latest papers about the science of cryptography.

We’re pleased to announce that the Cryptography papers for RSAC™ 2025 Conference are published and electronically available through Springer Publishing with no fee through May 25, 2025 and will be available on demand approximately four hours after the live occurrence.

Read Papers

If you are having trouble accessing the Cryptography papers for RSAC™ 2025 Conference, please contact Speakers@RSAConference.com.


Cryptanalysis 1

Features the authors of these papers: 1) The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs; and 2) Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT.

Authors: Dr. Thomas Peyrin, Chengcheng Chang
View Session Details | Read Papers

Cryptanalysis 2

Features the authors of these papers: 1) Comprehensive Robustness Analysis of GCM, CCM, and OCB3; and 2) Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer.

Authors: Akiko Inoue, Kuntong Li
View Session Details | Read Papers

Cryptanalysis 3

Features the authors of these papers: 1) Quantum Chosen-Ciphertext Attacks Based on Simon’s Algorithm against Unified Structures; and 2) Improved Key Recovery Attacks of Ascon.

Authors: Xiaoyu Wang, Shuo Peng
View Session Details | Read Papers

Symmetric-Key Cryptography

Features the authors of these papers: 1) How (not) to Hash into Class Groups of Imaginary Quadratic Fields; and 2) Sequential Indifferentiability of 7-round Misty Structures.

Authors: István Seres, Jiayi Ai
View Session Details | Read Papers

White Box Crypto

Features the author of this paper: 1) Affine Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher

Authors: Jiqiang Lyu
View Session Details | Read Papers

Public Key Cryptography 1

Features the authors of these papers: 1) Simplified Adaptively Secure Threshold BLS Signatures; and 2) DSKE: Digital Signatures with Key Extraction.

Authors: Dr. Benoit Libert, Dr. Duc Le
View Session Details | Read Papers

Public Key Cryptography 2

Features the authors of these papers: 1) Non-Interactive Threshold BBS+ From Pseudorandom Correlations; and 2) Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction.

Authors: Dr. Benjamin Scholosser, Kyoichi Asano
View Session Details | Read Papers

Hardware and Software Implementations

Features the authors of these papers: 1) Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC; and 2) Post-Quantum Online/Offline Signatures.

Authors: Quinten Norga, James Howe
View Session Details | Read Papers

Multi-Party Computation and Zero-Knowledge

Features the authors of these papers: 1) Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors; and 2) Universal Adaptor Signatures from Blackbox Multi-Party Computation.

Authors: Dr. Takeshi Nakai, Dr. Xiangyu Liu
View Session Details | Read Papers

*Full Conference Pass, Expo Plus Pass or On Demand Pass required.