![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
CT-RSA 2024: San Francisco, CA, USA
- Elisabeth Oswald
:
Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings. Lecture Notes in Computer Science 14643, Springer 2024, ISBN 978-3-031-58867-9
Public Key Cryptography
- Olivier Blazy
, Sayantan Mukherjee
:
A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private. 3-24 - Loïc Ferreira
:
Computational Security Analysis of the Full EDHOC Protocol. 25-48
Symmetric Cryptography
- Yusuke Naito
:
The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model. 51-77 - Jiali Shi, Guoqiang Liu, Chao Li, Yingxin Li:
Automated-Based Rebound Attacks on ACE Permutation. 78-111 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
The Exact Multi-user Security of 2-Key Triple DES. 112-135 - Jiqiang Lu, Wenchang Zhou:
Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher. 136-159
Signatures
- Carlos Aguilar Melchor
, Martin R. Albrecht, Thomas Bailleux, Nina Bindel
, James Howe
, Andreas Hülsing
, David Joseph
, Marc Manzano:
Batch Signatures, Revisited. 163-186 - Alessio Meneghetti
, Edoardo Signorini
:
History-Free Sequential Aggregation of Hash-and-Sign Signatures. 187-223 - Cécile Delerablée, Lénaïck Gouriou
, David Pointcheval
:
Attribute-Based Signatures with Advanced Delegation, and Tracing. 224-248 - Yingfei Yan
, Yongjun Zhao
, Wen Gao
, Baocang Wang
:
Lattice-Based Threshold, Accountable, and Private Signature. 249-274
Homomorphic Encryption
- Marc Joye
:
TFHE Public-Key Encryption Revisited. 277-291 - Tabitha Ogilvie:
Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption. 292-315
Identity-Based Encryption
- Parhat Abla:
Identity-Based Encryption from LWE with More Compact Master Public Key. 319-353 - Huiwen Jia
, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-Based Encryption on Ideal Lattices. 354-378
Constructions
- Christoph Dobraunig
, Maria Eichlseder
, Florian Mendel
, Martin Schläffer
:
Ascon MAC, PRF, and Short-Input PRF - Lightweight, Fast, and Efficient Pseudorandom Functions. 381-403 - Islam Faisal
:
Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation. 404-429
Threshold Signatures and Fault Attacks
- Dilara Toprakhisar
, Svetla Nikova
, Ventzislav Nikov:
SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice. 433-459 - Michele Battagliola
, Giacomo Borin
, Alessio Meneghetti
, Edoardo Persichetti
:
Cutting the GRASS: Threshold GRoup Action Signature Schemes. 460-489
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.