


default search action
26th PKC 2023: Atlanta, GA, USA - Part I
- Alexandra Boldyreva, Vladimir Kolesnikov

:
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13940, Springer 2023, ISBN 978-3-031-31367-7
Post-quantum Cryptography
- Varun Maram

, Keita Xagawa
:
Post-quantum Anonymity of Kyber. 3-35 - Tianshu Shan

, Jiangxia Ge
, Rui Xue
:
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. 36-64 - Julien Duman

, Kathrin Hövelmanns
, Eike Kiltz
, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh
:
A Thorough Treatment of Highly-Efficient NTRU Instantiations. 65-94 - Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck

:
A Lightweight Identification Protocol Based on Lattices. 95-113 - Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert:

POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption. 114-144
Attacks
- Nadia Heninger

, Keegan Ryan
:
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications. 147-176 - Léo Ducas

, Shane Gibbons
:
Hull Attacks on the Lattice Isomorphism Problem. 177-204 - Thomas Prest

:
A Key-Recovery Attack Against Mitaka in the t-Probing Model. 205-220
Signatures
- Mihir Bellare, Hannah Davis

, Zijing Di:
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA. 223-250 - Anna Lysyanskaya

:
Security Analysis of RSA-BSSA. 251-280 - Gennaro Avitabile

, Vincenzo Botta, Dario Fiore:
Extendable Threshold Ring Signatures with Enhanced Anonymity. 281-311 - Chloé Hébant, David Pointcheval, Robert Schädlich

:
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures. 312-341
Isogenies
- Luca De Feo

, Tako Boris Fouotsa
, Péter Kutas
, Antonin Leroux, Simon-Philipp Merz
, Lorenz Panny, Benjamin Wesolowski
:
SCALLOP: Scaling the CSI-FiSh. 345-375 - Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee

, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar:
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH. 376-405 - Julien Duman

, Dominik Hartmann
, Eike Kiltz
, Sabrina Kunzweiler
, Jonas Lehmann
, Doreen Riepel
:
Generic Models for Group Actions. 406-435
Crypto for Crypto
- Carsten Baum

, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner
:
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time. 439-470 - Dario Catalano, Dario Fiore, Emanuele Giunta:

Efficient and Universally Composable Single Secret Leader Election from Pairings. 471-499 - Peter Chvojka, Tibor Jager:

Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments. 500-529 - Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath

, Krzysztof Pietrzak:
Certifying Giant Nonprimes. 530-553 - Shravan Srinivasan

, Julian Loss, Giulio Malavolta
, Kartik Nayak, Charalampos Papamanthou, Sri Aravinda Krishnan Thyagarajan
:
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus. 554-584
Pairings
- Pratish Datta, Tapas Pal

:
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded. 587-621 - Elaine Shi, Nikhil Vanjani:

Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. 622-651 - Marloes Venema

, Greg Alpár:
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs. 652-682
Key Exchange and Messaging
- Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:

EKE Meets Tight Security in the Universally Composable Framework. 685-713 - Lawrence Roy, Jiayu Xu:

A Universally Composable PAKE with Zero Communication Cost - (And Why It Shouldn't Be Considered UC-Secure). 714-743 - Laurin Benz

, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues
, Rebecca Schwerdt
:
Sender-binding Key Encapsulation. 744-773 - Elie Bouscatié, Guilhem Castagnos, Olivier Sanders:

Pattern Matching in Encrypted Stream from Inner Product Encryption. 774-801

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














