Login / Signup
CRYPTO (3)
2016
2019
2024
2016
2024
Keyphrases
Publications
2024
Nuttapong Attrapadung
,
Junichi Tomida
A Modular Approach to Registered ABE for Unbounded Predicates.
CRYPTO (3)
(2024)
Gaspard Anthoine
,
David Balbás
,
Dario Fiore
Fully-Succinct Multi-key Homomorphic Signatures from Standard Assumptions.
CRYPTO (3)
(2024)
Quang Dao
,
Aayush Jain
Lossy Cryptography from Code-Based Assumptions.
CRYPTO (3)
(2024)
Aparna Gupte
,
Vinod Vaikuntanathan
How to Construct Quantum FHE, Generically.
CRYPTO (3)
(2024)
Youngjin Bae
,
Jung Hee Cheon
,
Guillaume Hanrot
,
Jai Hyun Park
,
Damien Stehlé
Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and Fused.
CRYPTO (3)
(2024)
Shweta Agrawal
,
Simran Kumari
,
Shota Yamada
Attribute Based Encryption for Turing Machines from Lattices.
CRYPTO (3)
(2024)
Fangqi Dong
,
Zihan Hao
,
Ethan Mook
,
Hoeteck Wee
,
Daniel Wichs
Laconic Function Evaluation and ABE for RAMs from (Ring-)LWE.
CRYPTO (3)
(2024)
Alex Biryukov
,
Ben Fisch
,
Gottfried Herold
,
Dmitry Khovratovich
,
Gaëtan Leurent
,
María Naya-Plasencia
,
Benjamin Wesolowski
Cryptanalysis of Algebraic Verifiable Delay Functions.
CRYPTO (3)
(2024)
Marina Checri
,
Renaud Sirdey
,
Aymen Boudguiga
,
Jean-Paul Bultel
Security of "exact" and Threshold FHE Schemes and Libraries.
CRYPTO (3)
(2024)
Shweta Agrawalr
,
Giulio Malavolta
,
Tianwei Zhang
Time-Lock Puzzles from Lattices.
CRYPTO (3)
(2024)
Aayush Jain
,
Huijia Lin
,
Sagnik Saha
A Systematic Study of Sparse LWE.
CRYPTO (3)
(2024)
Rachit Garg
,
George Lu
,
Brent Waters
,
David J. Wu
Reducing the CRS Size in Registered ABE Systems.
CRYPTO (3)
(2024)
Andrey Kim
,
Ahmet Can Mert
,
Anisha Mukherjee
,
Aikata
,
Maxim Deryabin
,
Sunmin Kwon
,
HyungChul Kang
,
Sujoy Sinha Roy
Exploring the Advantages and Challenges of Fermat NTT in FHE Acceleration.
CRYPTO (3)
(2024)
Hoeteck Wee
Circuit ABE with sfpoly( depth,λ )-Sized Ciphertexts and Keys from Lattices.
CRYPTO (3)
(2024)
volume 14922, 2024
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part III
CRYPTO (3)
14922 (2024)
2023
Léo Ducas
,
Ludo N. Pulles
Does the Dual-Sieve Attack on Learning with Errors Even Work?
CRYPTO (3)
(2023)
Matilda Backendal
,
Mihir Bellare
,
Felix Günther
,
Matteo Scarlata
When Messages Are Keys: Is HMAC a Dual-PRF?
CRYPTO (3)
(2023)
Loïc Masure
,
François-Xavier Standaert
Prouff and Rivain's Formal Security Proof of Masking, Revisited - Tight Bounds in the Noisy Leakage Model.
CRYPTO (3)
(2023)
Léo Ducas
,
Thomas Espitau
,
Eamonn W. Postlethwaite
Finding Short Integer Solutions When the Modulus Is Small.
CRYPTO (3)
(2023)
Keegan Ryan
,
Nadia Heninger
Fast Practical Lattice Reduction Through Iterated Compression.
CRYPTO (3)
(2023)
Fukang Liu
,
Lorenzo Grassi
,
Clémence Bouvier
,
Willi Meier
,
Takanori Isobe
Coefficient Grouping for Complex Affine Layers.
CRYPTO (3)
(2023)
Nicolas Aragon
,
Victor Dyseryn
,
Philippe Gaborit
Analysis of the Security of the PSSI Problem and Cryptanalysis of the Durandal Signature Scheme.
CRYPTO (3)
(2023)
Christof Beierle
,
Patrick Felke
,
Gregor Leander
,
Patrick P. Neumann
,
Lukas Stennes
On Perfect Linear Approximations and Differentials over Two-Round SPNs.
CRYPTO (3)
(2023)
Clément Hoffmann
,
Pierrick Méaux
,
Charles Momin
,
Yann Rotella
,
François-Xavier Standaert
,
Balazs Udvarhelyi
Learning with Physical Rounding for Linear and Quadratic Leakage Functions.
CRYPTO (3)
(2023)
Aldo Gunsing
,
Ritam Bhaumik
,
Ashwin Jha
,
Bart Mennink
,
Yaobin Shen
Revisiting the Indifferentiability of the Sum of Permutations.
CRYPTO (3)
(2023)
Orr Dunkelman
,
Nathan Keller
,
Ariel Weizman
Practical-Time Related-Key Attack on GOST with Secret S-Boxes.
CRYPTO (3)
(2023)
Sonia Belaïd
,
Gaëtan Cassiers
,
Matthieu Rivain
,
Abdul Rahman Taleb
Unifying Freedom and Separation for Tight Probing-Secure Composition.
CRYPTO (3)
(2023)
Clémence Bouvier
,
Pierre Briaud
,
Pyrros Chaidos
,
Léo Perrin
,
Robin Salen
,
Vesselin Velichkov
,
Danny Willems
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode.
CRYPTO (3)
(2023)
Jonathan Fuchs
,
Yann Rotella
,
Joan Daemen
On the Security of Keyed Hashing Based on Public Permutations.
CRYPTO (3)
(2023)
Lorenzo Grassi
,
Yonglin Hao
,
Christian Rechberger
,
Markus Schofnegger
,
Roman Walch
,
Qingju Wang
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.
CRYPTO (3)
(2023)
Shichang Wang
,
Meicheng Liu
,
Shiqi Hou
,
Dongdai Lin
Moving a Step of ChaCha in Syncopated Rhythm.
CRYPTO (3)
(2023)
Solane El Hirch
,
Joan Daemen
,
Raghvendra Rohit
,
Rusydi H. Makarim
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation.
CRYPTO (3)
(2023)
Lorenzo Grassi
,
Irati Manterola Ayala
,
Martha Norberg Hovd
,
Morten Øygarden
,
Håvard Raddum
,
Qingju Wang
Cryptanalysis of Symmetric Primitives over Rings and a Key Recovery Attack on Rubato.
CRYPTO (3)
(2023)
Christina Boura
,
Nicolas David
,
Patrick Derbez
,
Gregor Leander
,
María Naya-Plasencia
Differential Meet-In-The-Middle Cryptanalysis.
CRYPTO (3)
(2023)
Tianren Liu
,
Angelos Pelecanos
,
Stefano Tessaro
,
Vinod Vaikuntanathan
Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers.
CRYPTO (3)
(2023)
Sebastian Berndt
,
Thomas Eisenbarth
,
Sebastian Faust
,
Marc Gourjon
,
Maximilian Orlt
,
Okan Seker
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler.
CRYPTO (3)
(2023)
Shuichi Katsumata
,
Yi-Fu Lai
,
Jason T. LeGrow
,
Ling Qin
CSI -Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist.
CRYPTO (3)
(2023)
Tianrui Wang
,
Anyu Wang
,
Xiaoyun Wang
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks.
CRYPTO (3)
(2023)
Ward Beullens
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence Problem.
CRYPTO (3)
(2023)
Wouter Castryck
,
Marc Houben
,
Simon-Philipp Merz
,
Marzio Mula
,
Sam van Buuren
,
Frederik Vercauteren
Weak Instances of Class Group Action Based Cryptography via Self-pairings.
CRYPTO (3)
(2023)
volume 14083, 2023
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III
CRYPTO (3)
14083 (2023)
2022
Iftach Haitner
,
Daniel Nukrai
,
Eylon Yogev
Lower Bound on SNARGs in the Random Oracle Model.
CRYPTO (3)
(2022)
Shujiao Cao
,
Rui Xue
The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn't Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions.
CRYPTO (3)
(2022)
Akshima
,
Siyao Guo
,
Qipeng Liu
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions.
CRYPTO (3)
(2022)
Yusuke Naito
,
Yu Sasaki
,
Takeshi Sugawara
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking.
CRYPTO (3)
(2022)
Nir Bitansky
,
Zvika Brakerski
,
Yael Tauman Kalai
Constructive Post-Quantum Reductions.
CRYPTO (3)
(2022)
John Baena
,
Pierre Briaud
,
Daniel Cabarcas
,
Ray A. Perlner
,
Daniel Smith-Tone
,
Javier A. Verbel
Improving Support-Minors Rank Attacks: Applications to Gđisplaystyle eMSS and Rainbow.
CRYPTO (3)
(2022)
Ashrujit Ghoshal
,
Ilan Komargodski
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.
CRYPTO (3)
(2022)
Justin Holmgren
,
Minghao Liu
,
LaKyah Tyner
,
Daniel Wichs
Nearly Optimal Property Preserving Hashing.
CRYPTO (3)
(2022)
volume 13509, 2022
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III
CRYPTO (3)
13509 (2022)