default search action
14th AFRICACRYPT 2023: Sousse, Tunisia
- Nadia El Mrabet, Luca De Feo, Sylvain Duquesne:
Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings. Lecture Notes in Computer Science 14064, Springer 2023, ISBN 978-3-031-37678-8
Post-quantum Cryptography
- Gora Adj, Luis Rivera-Zamarripa, Javier A. Verbel:
MinRank in the Head - Short Signatures from Zero-Knowledge Proofs. 3-27 - Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Take Your MEDS: Digital Signatures from Matrix Code Equivalence. 28-52 - Thomas Decru, Sabrina Kunzweiler:
Efficient Computation of (3n,3n)-Isogenies. 53-78 - Nathalie Lang, Stefan Lucks:
On the Post-quantum Security of Classical Authenticated Encryption Schemes. 79-104 - Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso, Brice Colombier:
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial. 105-125
Symmetric Cryptography
- Koustabh Ghosh, Jonathan Fuchs, Parisa Amiri-Eliasi, Joan Daemen:
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices. 129-150 - Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, Marco Pedicini:
Invertible Quadratic Non-linear Functions over $\mathbb {F}_p^n$ via Multiple Local Maps. 151-176 - Lorenzo Grassi, Dmitry Khovratovich, Markus Schofnegger:
Poseidon2: A Faster Version of the Poseidon Hash Function. 177-203 - Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang:
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers. 204-226
Cryptanalysis
- Razvan Barbulescu, Adrien Poulalion:
The Special Case of Cyclotomic Fields in Quantum Algorithms for Unit Groups. 229-251 - Abderrahmane Nitaj, Maher Boudabra:
Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. 252-269
Blockchain
- Dylan Rowe, Joachim Breitner, Nadia Heninger:
The Curious Case of the Half-Half Bitcoin ECDSA Nonces. 273-284 - Mario Larangeira, Maxim Jourenko:
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality. 285-313
Lattice-Based Cryptography
- Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Martin Zuber:
ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain. 317-343 - Joel Gärtner:
Concrete Security from Worst-Case to Average-Case Lattice Reductions. 344-369 - Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. 370-394 - Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida:
Quantum Search-to-Decision Reduction for the LWE Problem. 395-413
Implementations
- Duc Tri Nguyen, Kris Gaj:
Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions. 417-441 - James Howe, Bas Westerbaan:
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7. 442-462
Theory
- Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh, Janno Siim:
Impossibilities in Succinct Arguments: Black-Box Extraction and More. 465-489 - Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia:
Applications of Timed-Release Encryption with Implicit Authentication. 490-515
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.