


default search action
44th CRYPTO 2024, Santa Barbara, CA, USA - Part II
- Leonid Reyzin, Douglas Stebila

:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14921, Springer 2024, ISBN 978-3-031-68378-7
Cloud Cryptography
- Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli

, Danilo Francati
, Ioanna Karantaidou:
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation. 3-39 - Matilda Backendal

, Hannah Davis
, Felix Günther
, Miro Haller
, Kenneth G. Paterson
:
A Formal Treatment of End-to-End Encrypted Cloud Storage. 40-74 - Yevgeniy Dodis

, Daniel Jost
, Antonio Marcedone
:
Compact Key Storage - A Modern Approach to Key Backup and Delegation. 75-109
Consensus Protocols
- Marshall Ball, Juan A. Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos

:
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity. 113-146 - Michele Ciampi

, Aggelos Kiayias, Yu Shen
:
Universal Composable Transaction Serialization with Order Fairness. 147-180
Key Exchange
- Manuel Barbosa

, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from Just Passwords. 183-217 - Jonathan Katz

, Michael Rosenberg
:
LATKE: A Framework for Constructing Identity-Binding PAKEs. 218-250 - Yuyu Wang

, Chuanjie Su
, Jiaxin Pan
:
Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions. 251-285 - Balthazar Bauer, Geoffroy Couteau, Elahe Sadeghi:

Fine-Grained Non-interactive Key Exchange, Revisited. 286-312
Public-Key Encryption
- Shweta Agrawal, Sagnik Saha, Nikolaj I. Schwartzbach

, Akhil Vanukuri
, Prashant Nalini Vasudevan
:
k-SUM in the Sparse Regime: Complexity and Applications. 315-351 - Dario Catalano

, Emanuele Giunta
, Francesco Migliaro
:
Limits of Black-Box Anamorphic Encryption. 352-383 - José Bacelar Almeida

, Santiago Arranz-Olmos, Manuel Barbosa
, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet
, Cameron Low, Tiago Oliveira
, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Pierre-Yves Strub:
Formally Verifying Kyber - Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt. 384-421 - Giuseppe Persiano

, Duong Hieu Phan
, Moti Yung:
Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond. 422-455 - Christian Majenz

, Fabrizio Sisinni
:
Provable Security Against Decryption Failure Attacks from LWE. 456-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














