- Anna Lysyanskaya
:
Security Analysis of RSA-BSSA. Public Key Cryptography (1) 2023: 251-280 - Varun Maram
, Keita Xagawa
:
Post-quantum Anonymity of Kyber. Public Key Cryptography (1) 2023: 3-35 - Peihan Miao, Sikhar Patranabis, Gaven J. Watson:
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH. Public Key Cryptography (2) 2023: 368-398 - Thomas Prest
:
A Key-Recovery Attack Against Mitaka in the t-Probing Model. Public Key Cryptography (1) 2023: 205-220 - Lawrence Roy, Jiayu Xu:
A Universally Composable PAKE with Zero Communication Cost - (And Why It Shouldn't Be Considered UC-Secure). Public Key Cryptography (1) 2023: 714-743 - Tianshu Shan
, Jiangxia Ge
, Rui Xue
:
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. Public Key Cryptography (1) 2023: 36-64 - Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. Public Key Cryptography (1) 2023: 622-651 - Shravan Srinivasan
, Julian Loss, Giulio Malavolta
, Kartik Nayak, Charalampos Papamanthou, Sri Aravinda Krishnan Thyagarajan:
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus. Public Key Cryptography (1) 2023: 554-584 - Marloes Venema
, Greg Alpár:
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs. Public Key Cryptography (1) 2023: 652-682 - Geng Wang, Shi-Feng Sun, Zhedong Wang, Dawu Gu:
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications. Public Key Cryptography (2) 2023: 429-458 - Masayuki Fukumitsu, Shingo Hasegawa:
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, APKC 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023 [contents] - Alexandra Boldyreva, Vladimir Kolesnikov
:
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13940, Springer 2023, ISBN 978-3-031-31367-7 [contents] - Alexandra Boldyreva, Vladimir Kolesnikov
:
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13941, Springer 2023, ISBN 978-3-031-31370-7 [contents] - Jaydip Sen:
Cryptography and Key Management Schemes for Wireless Sensor Networks. CoRR abs/2307.00872 (2023) - Randy Kuang, Maria Perepechaenko, Mahmoud Sayed, Dafu Lou:
Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature. CoRR abs/2311.08967 (2023) - André Carvalho, António Malheiro:
Subsets of groups in public-key cryptography. CoRR abs/2311.15039 (2023) - Zhengjun Cao, Lihua Liu:
A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function". IACR Cryptol. ePrint Arch. 2023: 993 (2023) - Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi:
Efficient Pre-processing PIR Without Public-Key Cryptography. IACR Cryptol. ePrint Arch. 2023: 1574 (2023) - Shuai Han, Shengli Liu, Dawu Gu:
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. IACR Cryptol. ePrint Arch. 2023: 1965 (2023) - Randy Kuang, Maria Perepechaenko, Mahmoud Sayed, Dafu Lou:
Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature. IACR Cryptol. ePrint Arch. 2023: 1768 (2023) - Vasyl Ustimenko:
Linear codes of Schubert type and quadratic public keys of Multivariate Cryptography. IACR Cryptol. ePrint Arch. 2023: 175 (2023) - Peter Gutmann, Corey Bonnell:
Standard Public Key Cryptography (PKC) Test Keys. RFC 9500: 1-28 (2023) - 2022
- Utku Gülen:
Public-key cryptography on constrained embedded devices (Kısıtlı kaynaklı gömülü cihazlar üzerinde açık anahtarlı şifreleme). Bahçeşehir University, Turkey, 2022 - Fabrice Boudot, Pierrick Gaudry, Aurore Guillevic, Nadia Heninger, Emmanuel Thomé, Paul Zimmermann:
The State of the Art in Integer Factoring and Breaking Public-Key Cryptography. IEEE Secur. Priv. 20(2): 80-86 (2022) - An Braeken
:
Public key versus symmetric key cryptography in client-server authentication protocols. Int. J. Inf. Sec. 21(1): 103-114 (2022) - Utkarsh Tiwari, Satyanarayana Vollala
, Natarajan Ramasubramanian, B. Shameedha Begum:
Efficient hardware realization and high radix implementation of modular multi exponential techniques for public key cryptography. Microelectron. J. 128: 105548 (2022) - Yuqi Wang, Geng Chen, Liya Jian, Yi Zhou, Shiming Liu:
Ternary quantum public-key cryptography based on qubit rotation. Quantum Inf. Process. 21(6): 197 (2022) - Jasone Astorga
, Marc Barcelo
, Aitor Urbieta
, Eduardo Jacob
:
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications. Sensors 22(7): 2561 (2022) - Xiaoyu Zhang, Hong Zhong
, Jie Cui
, Irina Bolodurina
, Lu Liu
:
LBVP: A Lightweight Batch Verification Protocol for Fog-Based Vehicular Networks Using Self-Certified Public Key Cryptography. IEEE Trans. Veh. Technol. 71(5): 5519-5533 (2022) - Jason Paul Cruz, Naoto Yanai
:
APKC '22: 9th ACM ASIA Public-Key Cryptography Workshop. AsiaCCS 2022: 1261-1262