default search action
24th PKC 2021: Virtual Event
- Juan A. Garay:
Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12710, Springer 2021, ISBN 978-3-030-75244-6
Post-Quantum Constructions and Cryptanalysis
- Xu Liu, Mingqiang Wang:
QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model. 3-26 - Cyril Bouvier, Laurent Imbert:
An Alternative Approach for SIDH Arithmetic. 27-44 - Michael Walter:
The Convergence of Slide-Type Reductions. 45-67 - Eamonn W. Postlethwaite, Fernando Virdia:
On the Success Probability of Solving Unique SVP via BKZ. 68-98 - Ivan Damgård, Claudio Orlandi, Akira Takahashi, Mehdi Tibouchi:
Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from Lattices. 99-130 - Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto:
Isogeny-Based Key Compression Without Pairings. 131-154 - Morten Øygarden, Patrick Felke, Håvard Raddum:
Analysis of Multivariate Encryption Schemes: Application to Dob. 155-183 - Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld:
On the Integer Polynomial Learning with Errors Problem. 184-214 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:
Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments. 215-241 - Netanel Raviv, Ben Langton, Itzhak Tamo:
Multivariate Public Key Cryptosystem from Sidon Spaces. 242-265 - Carsten Baum, Cyprien Delpech de Saint Guilhem, Daniel Kales, Emmanuela Orsini, Peter Scholl, Greg Zaverucha:
Banquet: Short and Fast Signatures from AES. 266-297
Cryptographic Primitives and Schemes
- Olivier Sanders:
Improving Revocation for Group Signature with Redactable Signature. 301-330 - Hilder Vitor Lima Pereira:
Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One Second. 331-359 - Jesus Diaz, Anja Lehmann:
Group Signatures with User-Controlled and Sequential Linkability. 360-388 - Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. 389-420 - Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks. 421-450 - Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi:
Two-Party Adaptor Signatures from Identification Schemes. 451-480 - Tsz Hon Yuen, Handong Cui, Xiang Xie:
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. 481-511 - Nico Döttling, Ryo Nishimaki:
Universal Proxy Re-Encryption. 512-542 - Shengyuan Feng, Junqing Gong, Jie Chen:
Master-Key KDM-Secure ABE via Predicate Encoding. 543-572 - Maxime Plançon, Thomas Prest:
Exact Lattice Sampling from Non-Gaussian Distributions. 573-595 - Tibor Jager, Rafael Kurek, David Niehues:
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. 596-626 - Pascal Bemmann, Rongmao Chen, Tibor Jager:
Subversion-Resilient Public Key Encryption with Practical Watchdogs. 627-658 - Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. 659-690 - Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi:
Updatable Signatures and Message Authentication Codes. 691-723 - Michele Ciampi, Luisa Siniscalchi, Hendrik Waldner:
Multi-Client Functional Encryption for Separable Functions. 724-753
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.