


default search action
43rd EUROCRYPT 2024: Zurich, Switzerland - Part I
- Marc Joye

, Gregor Leander
:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14651, Springer 2024, ISBN 978-3-031-58715-3
Awarded Papers
- Pierrick Dartois

, Antonin Leroux
, Damien Robert
, Benjamin Wesolowski
:
SQIsignHD: New Dimensions in Cryptography. 3-32 - Itai Dinur:

Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis. 33-62 - Maria Corte-Real Santos

, Jonathan Komada Eriksen, Michael Meyer
, Krijn Reijnders:
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing. 63-93
Symmetric Cryptology
- Yusuke Naito, Yu Sasaki, Takeshi Sugawara

:
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation. 97-127 - Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard:

Partial Sums Meet FFT: Improved Attack on 6-Round AES. 128-157 - Yingxin Li, Fukang Liu, Gaoli Wang:

New Records in Collision Attacks on SHA-2. 158-186 - Antonio Flórez-Gutiérrez

, Yosuke Todo
:
Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing. 187-216 - Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia:

A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool. 217-248 - Ashwin Jha

, Mustafa Khairallah
, Mridul Nandi
, Abishanka Saha
:
Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm. 249-279 - Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia:

Improved Differential Meet-in-the-Middle Cryptanalysis. 280-309 - Gorjan Alagic, Chen Bai

, Jonathan Katz
, Christian Majenz
, Patrick Struck
:
Post-quantum Security of Tweakable Even-Mansour, and Applications. 310-338 - Ling Song

, Qianqian Yang
, Yincen Chen
, Lei Hu
, Jian Weng
:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. 339-367 - Jiahui He

, Kai Hu
, Hao Lei, Meiqin Wang:
Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium. 368-397 - Shiyao Chen

, Jian Guo
, Eik List, Danping Shi
, Tianyu Zhang
:
Diving Deep into the Preimage Security of AES-Like Hashing. 398-426
Public Key Primitives with Advanced Functionalities (I/II)
- Renas Bacho

, Julian Loss
, Stefano Tessaro
, Benedikt Wagner
, Chenzhi Zhu
:
Twinkle: Threshold Signatures from DDH with Full Adaptive Security. 429-459 - Jiaxin Pan

, Benedikt Wagner
:
Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures. 460-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














