Stop the war!
Остановите войну!
for scientists:
default search action
CT-RSA 2024: San Francisco, CA, USA
- Elisabeth Oswald:
Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings. Lecture Notes in Computer Science 14643, Springer 2024, ISBN 978-3-031-58867-9
Public Key Cryptography
- Olivier Blazy, Sayantan Mukherjee:
A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private. 3-24 - Loïc Ferreira:
Computational Security Analysis of the Full EDHOC Protocol. 25-48
Symmetric Cryptography
- Yusuke Naito:
The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model. 51-77 - Jiali Shi, Guoqiang Liu, Chao Li, Yingxin Li:
Automated-Based Rebound Attacks on ACE Permutation. 78-111 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
The Exact Multi-user Security of 2-Key Triple DES. 112-135 - Jiqiang Lu, Wenchang Zhou:
Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher. 136-159
Signatures
- Carlos Aguilar Melchor, Martin R. Albrecht, Thomas Bailleux, Nina Bindel, James Howe, Andreas Hülsing, David Joseph, Marc Manzano:
Batch Signatures, Revisited. 163-186 - Alessio Meneghetti, Edoardo Signorini:
History-Free Sequential Aggregation of Hash-and-Sign Signatures. 187-223 - Cécile Delerablée, Lénaïck Gouriou, David Pointcheval:
Attribute-Based Signatures with Advanced Delegation, and Tracing. 224-248 - Yingfei Yan, Yongjun Zhao, Wen Gao, Baocang Wang:
Lattice-Based Threshold, Accountable, and Private Signature. 249-274
Homomorphic Encryption
- Marc Joye:
TFHE Public-Key Encryption Revisited. 277-291 - Tabitha Ogilvie:
Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption. 292-315
Identity-Based Encryption
- Parhat Abla:
Identity-Based Encryption from LWE with More Compact Master Public Key. 319-353 - Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-Based Encryption on Ideal Lattices. 354-378
Constructions
- Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. 381-403 - Islam Faisal:
Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation. 404-429
Threshold Signatures and Fault Attacks
- Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice. 433-459 - Michele Battagliola, Giacomo Borin, Alessio Meneghetti, Edoardo Persichetti:
Cutting the GRASS: Threshold GRoup Action Signature Schemes. 460-489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.