


default search action
CT-RSA 2024: San Francisco, CA, USA
- Elisabeth Oswald

:
Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings. Lecture Notes in Computer Science 14643, Springer 2024, ISBN 978-3-031-58867-9
Public Key Cryptography
- Olivier Blazy

, Sayantan Mukherjee
:
A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private. 3-24 - Loïc Ferreira

:
Computational Security Analysis of the Full EDHOC Protocol. 25-48
Symmetric Cryptography
- Yusuke Naito

:
The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model. 51-77 - Jiali Shi, Guoqiang Liu, Chao Li, Yingxin Li:

Automated-Based Rebound Attacks on ACE Permutation. 78-111 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara

:
The Exact Multi-user Security of 2-Key Triple DES. 112-135 - Jiqiang Lu, Wenchang Zhou:

Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher. 136-159
Signatures
- Carlos Aguilar Melchor

, Martin R. Albrecht, Thomas Bailleux, Nina Bindel
, James Howe
, Andreas Hülsing
, David Joseph
, Marc Manzano:
Batch Signatures, Revisited. 163-186 - Alessio Meneghetti

, Edoardo Signorini
:
History-Free Sequential Aggregation of Hash-and-Sign Signatures. 187-223 - Cécile Delerablée, Lénaïck Gouriou

, David Pointcheval
:
Attribute-Based Signatures with Advanced Delegation, and Tracing. 224-248 - Yingfei Yan

, Yongjun Zhao
, Wen Gao
, Baocang Wang
:
Lattice-Based Threshold, Accountable, and Private Signature. 249-274
Homomorphic Encryption
- Marc Joye

:
TFHE Public-Key Encryption Revisited. 277-291 - Tabitha Ogilvie:

Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption. 292-315
Identity-Based Encryption
- Parhat Abla:

Identity-Based Encryption from LWE with More Compact Master Public Key. 319-353 - Huiwen Jia

, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-Based Encryption on Ideal Lattices. 354-378
Constructions
- Christoph Dobraunig

, Maria Eichlseder
, Florian Mendel
, Martin Schläffer
:
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. 381-403 - Islam Faisal

:
Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation. 404-429
Threshold Signatures and Fault Attacks
- Dilara Toprakhisar

, Svetla Nikova
, Ventzislav Nikov:
SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice. 433-459 - Michele Battagliola

, Giacomo Borin
, Alessio Meneghetti
, Edoardo Persichetti
:
Cutting the GRASS: Threshold GRoup Action Signature Schemes. 460-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














