


default search action
43rd EUROCRYPT 2024: Zurich, Switzerland - Part I
- Marc Joye
, Gregor Leander
:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14651, Springer 2024, ISBN 978-3-031-58715-3
Awarded Papers
- Pierrick Dartois
, Antonin Leroux
, Damien Robert
, Benjamin Wesolowski
:
SQIsignHD: New Dimensions in Cryptography. 3-32 - Itai Dinur:
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis. 33-62 - Maria Corte-Real Santos
, Jonathan Komada Eriksen, Michael Meyer
, Krijn Reijnders:
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing. 63-93
Symmetric Cryptology
- Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation. 97-127 - Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard:
Partial Sums Meet FFT: Improved Attack on 6-Round AES. 128-157 - Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on SHA-2. 158-186 - Antonio Flórez-Gutiérrez
, Yosuke Todo
:
Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing. 187-216 - Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia:
A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool. 217-248 - Ashwin Jha
, Mustafa Khairallah
, Mridul Nandi
, Abishanka Saha
:
Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm. 249-279 - Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia:
Improved Differential Meet-in-the-Middle Cryptanalysis. 280-309 - Gorjan Alagic, Chen Bai
, Jonathan Katz
, Christian Majenz
, Patrick Struck
:
Post-quantum Security of Tweakable Even-Mansour, and Applications. 310-338 - Ling Song
, Qianqian Yang
, Yincen Chen
, Lei Hu
, Jian Weng
:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. 339-367 - Jiahui He
, Kai Hu
, Hao Lei, Meiqin Wang:
Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium. 368-397 - Shiyao Chen
, Jian Guo
, Eik List, Danping Shi
, Tianyu Zhang
:
Diving Deep into the Preimage Security of AES-Like Hashing. 398-426
Public Key Primitives with Advanced Functionalities (I/II)
- Renas Bacho
, Julian Loss
, Stefano Tessaro
, Benedikt Wagner
, Chenzhi Zhu
:
Twinkle: Threshold Signatures from DDH with Full Adaptive Security. 429-459 - Jiaxin Pan
, Benedikt Wagner
:
Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures. 460-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.