Stop the war!
Остановите войну!
for scientists:
default search action
26th PKC 2023: Atlanta, GA, USA - Part I
- Alexandra Boldyreva, Vladimir Kolesnikov:
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13940, Springer 2023, ISBN 978-3-031-31367-7
Post-quantum Cryptography
- Varun Maram, Keita Xagawa:
Post-quantum Anonymity of Kyber. 3-35 - Tianshu Shan, Jiangxia Ge, Rui Xue:
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. 36-64 - Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh:
A Thorough Treatment of Highly-Efficient NTRU Instantiations. 65-94 - Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck:
A Lightweight Identification Protocol Based on Lattices. 95-113 - Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert:
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption. 114-144
Attacks
- Nadia Heninger, Keegan Ryan:
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications. 147-176 - Léo Ducas, Shane Gibbons:
Hull Attacks on the Lattice Isomorphism Problem. 177-204 - Thomas Prest:
A Key-Recovery Attack Against Mitaka in the t-Probing Model. 205-220
Signatures
- Mihir Bellare, Hannah Davis, Zijing Di:
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA. 223-250 - Anna Lysyanskaya:
Security Analysis of RSA-BSSA. 251-280 - Gennaro Avitabile, Vincenzo Botta, Dario Fiore:
Extendable Threshold Ring Signatures with Enhanced Anonymity. 281-311 - Chloé Hébant, David Pointcheval, Robert Schädlich:
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures. 312-341
Isogenies
- Luca De Feo, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Simon-Philipp Merz, Lorenz Panny, Benjamin Wesolowski:
SCALLOP: Scaling the CSI-FiSh. 345-375 - Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar:
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH. 376-405 - Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. 406-435
Crypto for Crypto
- Carsten Baum, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner:
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time. 439-470 - Dario Catalano, Dario Fiore, Emanuele Giunta:
Efficient and Universally Composable Single Secret Leader Election from Pairings. 471-499 - Peter Chvojka, Tibor Jager:
Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments. 500-529 - Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Krzysztof Pietrzak:
Certifying Giant Nonprimes. 530-553 - Shravan Srinivasan, Julian Loss, Giulio Malavolta, Kartik Nayak, Charalampos Papamanthou, Sri Aravinda Krishnan Thyagarajan:
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus. 554-584
Pairings
- Pratish Datta, Tapas Pal:
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded. 587-621 - Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. 622-651 - Marloes Venema, Greg Alpár:
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs. 652-682
Key Exchange and Messaging
- Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. 685-713 - Lawrence Roy, Jiayu Xu:
A Universally Composable PAKE with Zero Communication Cost - (And Why It Shouldn't Be Considered UC-Secure). 714-743 - Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues, Rebecca Schwerdt:
Sender-binding Key Encapsulation. 744-773 - Elie Bouscatié, Guilhem Castagnos, Olivier Sanders:
Pattern Matching in Encrypted Stream from Inner Product Encryption. 774-801
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.