


default search action
14th AFRICACRYPT 2023: Sousse, Tunisia
- Nadia El Mrabet

, Luca De Feo
, Sylvain Duquesne
:
Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings. Lecture Notes in Computer Science 14064, Springer 2023, ISBN 978-3-031-37678-8
Post-quantum Cryptography
- Gora Adj

, Luis Rivera-Zamarripa
, Javier A. Verbel
:
MinRank in the Head - Short Signatures from Zero-Knowledge Proofs. 3-27 - Tung Chou, Ruben Niederhagen, Edoardo Persichetti

, Tovohery Hajatiana Randrianarisoa
, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Take Your MEDS: Digital Signatures from Matrix Code Equivalence. 28-52 - Thomas Decru

, Sabrina Kunzweiler
:
Efficient Computation of (3n,3n)-Isogenies. 53-78 - Nathalie Lang

, Stefan Lucks
:
On the Post-quantum Security of Classical Authenticated Encryption Schemes. 79-104 - Boly Seck

, Pierre-Louis Cayrel
, Vlad-Florin Dragoi
, Idy Diop
, Morgan Barbier, Jean Belo Klamti
, Vincent Grosso
, Brice Colombier
:
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial. 105-125
Symmetric Cryptography
- Koustabh Ghosh

, Jonathan Fuchs
, Parisa Amiri-Eliasi
, Joan Daemen
:
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices. 129-150 - Ginevra Giordani

, Lorenzo Grassi
, Silvia Onofri
, Marco Pedicini
:
Invertible Quadratic Non-linear Functions over $\mathbb {F}_p^n$ via Multiple Local Maps. 151-176 - Lorenzo Grassi

, Dmitry Khovratovich, Markus Schofnegger:
Poseidon2: A Faster Version of the Poseidon Hash Function. 177-203 - Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang:

From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers. 204-226
Cryptanalysis
- Razvan Barbulescu, Adrien Poulalion:

The Special Case of Cyclotomic Fields in Quantum Algorithms for Unit Groups. 229-251 - Abderrahmane Nitaj, Maher Boudabra:

Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. 252-269
Blockchain
- Dylan Rowe, Joachim Breitner

, Nadia Heninger
:
The Curious Case of the Half-Half Bitcoin ECDSA Nonces. 273-284 - Mario Larangeira

, Maxim Jourenko
:
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality. 285-313
Lattice-Based Cryptography
- Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Martin Zuber:

ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain. 317-343 - Joel Gärtner

:
Concrete Security from Worst-Case to Average-Case Lattice Reductions. 344-369 - Johannes Mono

, Chiara Marcolla, Georg Land
, Tim Güneysu
, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. 370-394 - Kyohei Sudo, Masayuki Tezuka

, Keisuke Hara, Yusuke Yoshida:
Quantum Search-to-Decision Reduction for the LWE Problem. 395-413
Implementations
- Duc Tri Nguyen

, Kris Gaj
:
Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions. 417-441 - James Howe

, Bas Westerbaan
:
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7. 442-462
Theory
- Matteo Campanelli

, Chaya Ganesh, Hamidreza Khoshakhlagh
, Janno Siim
:
Impossibilities in Succinct Arguments: Black-Box Extraction and More. 465-489 - Angelique Faye Loe, Liam Medley

, Christian O'Connell, Elizabeth A. Quaglia
:
Applications of Timed-Release Encryption with Implicit Authentication. 490-515

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














