


default search action
15th AFRICACRYPT 2024: Douala, Cameroon
- Serge Vaudenay

, Christophe Petit
:
Progress in Cryptology - AFRICACRYPT 2024 - 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings. Lecture Notes in Computer Science 14861, Springer 2024, ISBN 978-3-031-64380-4
Symmetric Key Cryptography
- Said Eddahmani, Sihem Mesnager:

On the Double Differential Uniformity of Vectorial Boolean Functions. 3-20 - François Gérard, Agnese Gini, Pierrick Méaux:

TooLIP: How to Find New Instances of FiLIP Cipher with Smaller Key Size and New Filters. 21-45
Best Paper Award
- Slim Bettaieb, Alessandro Budroni

, Marco Palumbi, Décio Luiz Gazzoni Filho
:
Quasi-optimal Permutation Ranking and Applications to PERK. 49-65
Advanced Primitives (I)
- Sofía Celi

, Shai Levin
, Joe Rowell:
CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness. 69-93 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:

Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. 94-119
Advanced Primitives (II)
- Isheeta Nargis:

Efficient Oblivious Transfer for One-Sided Active Adaptive Adversaries. 123-148 - Yongge Wang

, Qutaibah M. Malluhi
:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. 149-173 - Pascal Lafourcade

, Gaël Marcadet
, Léo Robert
:
iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption. 174-198
Post-quantum Cryptography (I)
- Hermann Tchatchiem Kamche

, Hervé Talé Kalachi
:
On the Generalizations of the Rank Metric over Finite Chain Rings. 201-221 - River Moreira Ferreira, Ludovic Perret:

Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV. 222-235
Post-quantum Cryptography (II)
- Xu Liu, Mingqiang Wang:

QCCA Security of Fujisaki-Okamoto Transformation in the Quantum Random Oracle Model. 239-259 - Duyên Pay, François-Xavier Standaert:

Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber. 260-281
Elliptic Curve Cryptography and RSA
- Mónica P. Arenas

, Georgios Fotiadis
, Elisavet Konstantinou
:
Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves. 285-310 - Aubain Jose Mayeukeu

, Emmanuel Fouotsa
:
Same Values Analysis Attack on Weierstrass Binary Elliptic Curves. 311-326 - Abderrahmane Nitaj, Nurul Nur Hanisah Adenan, Muhammad Rezal Kamel Ariffin:

Cryptanalysis of a New Variant of the RSA Cryptosystem. 327-345
Lattice-Based Cryptography Constructions
- Ali Raya, Vikas Kumar

, Sugata Gangopadhyay:
DiTRU: A Resurrection of NTRU over Dihedral Group. 349-375 - Elena Kirshanova, Chiara Marcolla, Sergi Rovira:

Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption. 376-400
Lattice-Based Cryptography Cryptanalysis
- Alexander Karenin, Elena Kirshanova:

Finding Dense Submodules with Algebraic Lattice Reduction. 403-427 - Niklas Nolte, Mohamed Malhou, Emily Wenger

, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The Cool and the Cruel: Separating Hard Parts of LWE Secrets. 428-453

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














