


default search action
14th SCN 2024: Amalfi, Italy - Part II
- Clemente Galdi

, Duong Hieu Phan
:
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14974, Springer 2024, ISBN 978-3-031-71072-8
Homomorphic Encryption
- Kelong Cong

, Jiayi Kang
, Georgio Nicolas
, Jeongeun Park
:
Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption. 3-23 - Lennart Braun

, Guilhem Castagnos, Ivan Damgård
, Fabien Laguillaumie
, Kelsey Melissaris
, Claudio Orlandi
, Ida Tucker
:
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. 24-46 - Keita Emura

, Shingo Sato, Atsushi Takayasu
:
Attribute-Based Keyed Fully Homomorphic Encryption. 47-67
Symmetric Key Encryption
- Parisa Amiri-Eliasi

, Koustabh Ghosh
, Joan Daemen
:
Mystrium: Wide Block Encryption Efficient on Entry-Level Processors. 71-96 - Chris Brzuska, Geoffroy Couteau, Christoph Egger

, Pihla Karanko, Pierre Meyer
:
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. 97-116 - Amit Singh Bhati

, Elena Andreeva
, Damian Vizár:
OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF. 117-139 - Ritam Bhaumik

, Mridul Nandi
, Sayantan Paul
, Abishanka Saha
:
Indifferentiability of 3-Round Confusion-Diffusion Networks. 140-161
Cryptanalysis
- Ludo N. Pulles

, Mehdi Tibouchi
:
Cryptanalysis of EagleSign. 165-186 - Prasanna Raghaw Mishra

, Yogesh Kumar
, Susanta Samanta
, Atul Gaur
:
A New Algorithm for Computing Branch Number of Non-Singular Matrices Over Finite Fields. 187-205 - Jiqiang Lu, Xiao Zhang:

Impossible Differential Cryptanalysis of the Raindrop Block Cipher. 206-227 - Johannes Ottenhues

, Alexander Koch
:
LaPSuS - A Lattice-Based Private Stream Aggregation Scheme Under Scrutiny. 228-248
Key Management
- Xichen Zhang, Keitaro Hashimoto

, Wakaha Ogata
:
Security Model for Authenticated Key Exchange, Reconsidered. 251-271 - Shuya Hanai

, Keisuke Tanaka
, Masayuki Tezuka
, Yusuke Yoshida
:
Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange. 272-293 - Joël Alwen, Benedikt Auerbach

, Miguel Cueto Noval
, Karen Klein
, Guillermo Pascual-Perez
, Krzyzstof Pietrzak:
DeCAF: Decentralizable CGKA with Fast Healing. 294-313
Blockchains
- Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira:

MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. 317-337 - Poulami Das, Andreas Erwig, Sebastian Faust:

Shared-Custodial Password-Authenticated Deterministic Wallets. 338-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














