![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
IACR Communications in Cryptology, Volume 1
Volume 1, Number 1, 2024
- Keewoo Lee:
Bit Security as Cost to Demonstrate Advantage. 1 - Benjamin E. Diamond, Jim Posen:
Proximity Testing with Logarithmic Randomness. 2 - Akira Takahashi, Greg Zaverucha:
Verifiable Encryption from MPC-in-the-Head. 3 - Loïs Huguenin-Dumittan, Serge Vaudenay:
Impossibility of Post-Quantum Shielding Black-Box Constructions of CCA from CPA. 4 - Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers:
Optimizations and Practicality of High-Security CSIDH. 5 - Marloes Venema, Leon Botros:
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures. 6 - Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation. 7 - Keita Xagawa:
On the Efficiency of Generic, Quantum Cryptographic Constructions. 8 - Décio Luiz Gazzoni Filho, Guilherme Brandão, Julio López:
Fast polynomial multiplication using matrix multiplication accelerators with applications to NTRU on Apple M1/M3 SoCs. 9 - Thomas Pornin:
A Prime-Order Group with Complete Formulas from Even-Order Elliptic Curves. 10 - Mustafa Khairallah:
CCA Security with Short AEAD Tags. 11 - Benjamin Wesolowski:
Computing isogenies between finite Drinfeld modules. 12 - Shichang Wang, Meicheng Liu, Shiqi Hou, Dongdai Lin:
Differential-Linear Cryptanalysis of GIFT family and GIFT-based Ciphers. 13 - Daniel J. Bernstein:
Understanding binary-Goppa decoding. 14 - Emmanuela Orsini, Riccardo Zanotto:
Simple Two-Message OT in the Explicit Isogeny Model. 15 - Yi-Hsiu Chen, Yehuda Lindell:
Feldman's Verifiable Secret Sharing for a Dishonest Majority. 16 - Marcel Tiepelt, Christian Martin, Nils Mäurer:
Post-Quantum Ready Key Agreement for Aviation. 17 - Aurélien Dupin, Simon Abelard:
Broadcast Encryption using Sum-Product decomposition of Boolean functions. 18 - Matteo Campanelli, Chaya Ganesh, Rosario Gennaro:
How to Make Rational Arguments Practical and Extractable. 19 - Pierrick Méaux, Jeongeun Park, Hilder V. L. Pereira:
Towards Practical Transciphering for FHE with Setup Independent of the Plaintext Space. 20 - Manuel Barbosa, Deirdre Connolly, João Diogo Duarte, Aaron Kaiser, Peter Schwabe, Karoline Varner, Bas Westerbaan:
X-Wing. 21 - Subhadeep Banik, Andrea Caforio, Serge Vaudenay:
New Attacks on LowMC Using Partial Sets in the Single-Data Setting. 22 - Loïc Demange, Mélissa Rossi:
A provably masked implementation of BIKE Key Encapsulation Mechanism. 23 - Shahla Atapoor, Karim Baghery, Hilder V. L. Pereira, Jannik Spiessens:
Verifiable FHE via Lattice-based SNARKs. 24 - Yehuda Lindell:
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability. 25 - Damien Robert, Nicolas Sarkis:
Computing 2-isogenies between Kummer lines. 26 - Gorjan Alagic, Chen Bai, Alexander Poremba, Kaiyan Shi:
On the Two-sided Permutation Inversion Problem. 27 - Gabrielle De Micheli, Nadia Heninger:
Survey: Recovering cryptographic keys from partial information, by example. 28 - Jules Maire, Damien Vergnaud:
Secure Multi-Party Linear Algebra with Perfect Correctness. 29 - Charles Bouillaguet, Julia Sauvage:
Preliminary Cryptanalysis of the Biscuit Signature Scheme. 30 - Jingwen Chen, Qun Liu, Yanhong Fan, Lixuan Wu, Boyun Li, Meiqin Wang:
New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation. 31 - Samuel Bouaziz-Ermann, Alex B. Grilo, Damien Vergnaud, Quoc-Huy Vu:
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions. 32
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.