Sign in
Public Key Cryptography (1)
2016
2018
2021
2023
2016
2023
Keyphrases
Publications
2023
Julien Duman
,
Dominik Hartmann
,
Eike Kiltz
,
Sabrina Kunzweiler
,
Jonas Lehmann
,
Doreen Riepel
Generic Models for Group Actions.
Public Key Cryptography (1)
(2023)
Léo Ducas
,
Shane Gibbons
Hull Attacks on the Lattice Isomorphism Problem.
Public Key Cryptography (1)
(2023)
Elie Bouscatié
,
Guilhem Castagnos
,
Olivier Sanders
Pattern Matching in Encrypted Stream from Inner Product Encryption.
Public Key Cryptography (1)
(2023)
Marloes Venema
,
Greg Alpár
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs.
Public Key Cryptography (1)
(2023)
Samed Düzlü
,
Juliane Krämer
,
Thomas Pöppelmann
,
Patrick Struck
A Lightweight Identification Protocol Based on Lattices.
Public Key Cryptography (1)
(2023)
Tianshu Shan
,
Jiangxia Ge
,
Rui Xue
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model.
Public Key Cryptography (1)
(2023)
Pratish Datta
,
Tapas Pal
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded.
Public Key Cryptography (1)
(2023)
Anna Lysyanskaya
Security Analysis of RSA-BSSA.
Public Key Cryptography (1)
(2023)
Charlotte Hoffmann
,
Pavel Hubácek
,
Chethan Kamath
,
Krzysztof Pietrzak
Certifying Giant Nonprimes.
Public Key Cryptography (1)
(2023)
Shravan Srinivasan
,
Julian Loss
,
Giulio Malavolta
,
Kartik Nayak
,
Charalampos Papamanthou
,
Sri Aravinda Krishnan Thyagarajan
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus.
Public Key Cryptography (1)
(2023)
Gennaro Avitabile
,
Vincenzo Botta
,
Dario Fiore
Extendable Threshold Ring Signatures with Enhanced Anonymity.
Public Key Cryptography (1)
(2023)
Carsten Baum
,
Bernardo David
,
Rafael Dowsley
,
Ravi Kishore
,
Jesper Buus Nielsen
,
Sabine Oechsner
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time.
Public Key Cryptography (1)
(2023)
Dario Catalano
,
Dario Fiore
,
Emanuele Giunta
Efficient and Universally Composable Single Secret Leader Election from Pairings.
Public Key Cryptography (1)
(2023)
Mihir Bellare
,
Hannah Davis
,
Zijing Di
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA.
Public Key Cryptography (1)
(2023)
Julien Duman
,
Kathrin Hövelmanns
,
Eike Kiltz
,
Vadim Lyubashevsky
,
Gregor Seiler
,
Dominique Unruh
A Thorough Treatment of Highly-Efficient NTRU Instantiations.
Public Key Cryptography (1)
(2023)
Saikrishna Badrinarayanan
,
Daniel Masny
,
Pratyay Mukherjee
,
Sikhar Patranabis
,
Srinivasan Raghuraman
,
Pratik Sarkar
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH.
Public Key Cryptography (1)
(2023)
Laurin Benz
,
Wasilij Beskorovajnov
,
Sarai Eilebrecht
,
Jörn Müller-Quade
,
Astrid Ottenhues
,
Rebecca Schwerdt
Sender-binding Key Encapsulation.
Public Key Cryptography (1)
(2023)
Peter Chvojka
,
Tibor Jager
Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments.
Public Key Cryptography (1)
(2023)
Luca De Feo
,
Tako Boris Fouotsa
,
Péter Kutas
,
Antonin Leroux
,
Simon-Philipp Merz
,
Lorenz Panny
,
Benjamin Wesolowski
SCALLOP: Scaling the CSI-FiSh.
Public Key Cryptography (1)
(2023)
Nadia Heninger
,
Keegan Ryan
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications.
Public Key Cryptography (1)
(2023)
Xiangyu Liu
,
Shengli Liu
,
Shuai Han
,
Dawu Gu
EKE Meets Tight Security in the Universally Composable Framework.
Public Key Cryptography (1)
(2023)
Thomas Prest
A Key-Recovery Attack Against Mitaka in the t-Probing Model.
Public Key Cryptography (1)
(2023)
Lawrence Roy
,
Jiayu Xu
A Universally Composable PAKE with Zero Communication Cost - (And Why It Shouldn't Be Considered UC-Secure).
Public Key Cryptography (1)
(2023)
Chloé Hébant
,
David Pointcheval
,
Robert Schädlich
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures.
Public Key Cryptography (1)
(2023)
Varun Maram
,
Keita Xagawa
Post-quantum Anonymity of Kyber.
Public Key Cryptography (1)
(2023)
Clément Hoffmann
,
Benoît Libert
,
Charles Momin
,
Thomas Peters
,
François-Xavier Standaert
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption.
Public Key Cryptography (1)
(2023)
Elaine Shi
,
Nikhil Vanjani
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles.
Public Key Cryptography (1)
(2023)
volume 13940, 2023
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I
Public Key Cryptography (1)
13940 (2023)
2022
Sarasij Maitra
,
David J. Wu
Traceable PRFs: Full Collusion Resistance and Active Security.
Public Key Cryptography (1)
(2022)
Pedro Branco
,
Nico Döttling
,
Paulo Mateus
Two-Round Oblivious Linear Evaluation from Learning with Errors.
Public Key Cryptography (1)
(2022)
Yi Liu
,
Qi Wang
,
Siu-Ming Yiu
Making Private Function Evaluation Safer, Faster, and Simpler.
Public Key Cryptography (1)
(2022)
Diego F. Aranha
,
Emil Madsen Bennedsen
,
Matteo Campanelli
,
Chaya Ganesh
,
Claudio Orlandi
,
Akira Takahashi
ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines.
Public Key Cryptography (1)
(2022)
Andre Esser
,
Emanuele Bellini
Syndrome Decoding Estimator.
Public Key Cryptography (1)
(2022)
Julien Devevey
,
Benoît Libert
,
Thomas Peters
Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model.
Public Key Cryptography (1)
(2022)
Jan-Pieter D'Anvers
,
Senne Batsleer
Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber.
Public Key Cryptography (1)
(2022)
Vipul Goyal
,
Abhiram Kothapalli
,
Elisaweta Masserova
,
Bryan Parno
,
Yifan Song
Storing and Retrieving Secrets on a Blockchain.
Public Key Cryptography (1)
(2022)
Pierre Karpman
,
Charlotte Lefevre
Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary Codes.
Public Key Cryptography (1)
(2022)
Alan Szepieniec
,
Yuncong Zhang
Polynomial IOPs for Linear Algebra Relations.
Public Key Cryptography (1)
(2022)
James Bartusek
,
Sanjam Garg
,
Akshayaram Srinivasan
,
Yinuo Zhang
Reusable Two-Round MPC from LPN.
Public Key Cryptography (1)
(2022)
Damiano Abram
,
Peter Scholl
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN.
Public Key Cryptography (1)
(2022)
Paul Bunn
,
Eyal Kushilevitz
,
Rafail Ostrovsky
CNF-FSS and Its Applications.
Public Key Cryptography (1)
(2022)
Tako Boris Fouotsa
,
Péter Kutas
,
Simon-Philipp Merz
,
Yan Bo Ti
On the Isogeny Problem with Torsion Point Information.
Public Key Cryptography (1)
(2022)
Claudio Orlandi
,
Divya Ravi
,
Peter Scholl
On the Bottleneck Complexity of MPC with Correlated Randomness.
Public Key Cryptography (1)
(2022)
Pierrick Dartois
,
Luca De Feo
On the Security of OSIDH.
Public Key Cryptography (1)
(2022)
Ehsan Ebrahimi
Post-quantum Security of Plain OAEP Transform.
Public Key Cryptography (1)
(2022)
Muhammed F. Esgin
,
Ron Steinfeld
,
Raymond K. Zhao
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.
Public Key Cryptography (1)
(2022)
Shiduo Zhang
,
Yang Yu
Towards a Simpler Lattice Gadget Toolkit.
Public Key Cryptography (1)
(2022)
Hiroshi Onuki
,
Tomoki Moriya
Radical Isogenies on Montgomery Curves.
Public Key Cryptography (1)
(2022)
Aisling Connolly
,
Pascal Lafourcade
,
Octavio Perez-Kempner
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes.
Public Key Cryptography (1)
(2022)
volume 13177, 2022
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I
Public Key Cryptography (1)
13177 (2022)