


default search action
14th AFRICACRYPT 2023: Sousse, Tunisia
- Nadia El Mrabet
, Luca De Feo
, Sylvain Duquesne
:
Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings. Lecture Notes in Computer Science 14064, Springer 2023, ISBN 978-3-031-37678-8
Post-quantum Cryptography
- Gora Adj
, Luis Rivera-Zamarripa
, Javier A. Verbel
:
MinRank in the Head - Short Signatures from Zero-Knowledge Proofs. 3-27 - Tung Chou, Ruben Niederhagen, Edoardo Persichetti
, Tovohery Hajatiana Randrianarisoa
, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Take Your MEDS: Digital Signatures from Matrix Code Equivalence. 28-52 - Thomas Decru
, Sabrina Kunzweiler
:
Efficient Computation of (3n,3n)-Isogenies. 53-78 - Nathalie Lang
, Stefan Lucks
:
On the Post-quantum Security of Classical Authenticated Encryption Schemes. 79-104 - Boly Seck
, Pierre-Louis Cayrel
, Vlad-Florin Dragoi
, Idy Diop
, Morgan Barbier, Jean Belo Klamti
, Vincent Grosso
, Brice Colombier
:
A Side-Channel Attack Against Classic McEliece When Loading the Goppa Polynomial. 105-125
Symmetric Cryptography
- Koustabh Ghosh
, Jonathan Fuchs
, Parisa Amiri-Eliasi
, Joan Daemen
:
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices. 129-150 - Ginevra Giordani
, Lorenzo Grassi
, Silvia Onofri
, Marco Pedicini
:
Invertible Quadratic Non-linear Functions over $\mathbb {F}_p^n$ via Multiple Local Maps. 151-176 - Lorenzo Grassi
, Dmitry Khovratovich, Markus Schofnegger:
Poseidon2: A Faster Version of the Poseidon Hash Function. 177-203 - Jikang Lin, Jiahui He, Yanhong Fan, Meiqin Wang:
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers. 204-226
Cryptanalysis
- Razvan Barbulescu, Adrien Poulalion:
The Special Case of Cyclotomic Fields in Quantum Algorithms for Unit Groups. 229-251 - Abderrahmane Nitaj, Maher Boudabra:
Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant. 252-269
Blockchain
- Dylan Rowe, Joachim Breitner
, Nadia Heninger
:
The Curious Case of the Half-Half Bitcoin ECDSA Nonces. 273-284 - Mario Larangeira
, Maxim Jourenko
:
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality. 285-313
Lattice-Based Cryptography
- Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey, Martin Zuber:
ComBo: A Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain. 317-343 - Joel Gärtner
:
Concrete Security from Worst-Case to Average-Case Lattice Reductions. 344-369 - Johannes Mono
, Chiara Marcolla, Georg Land, Tim Güneysu, Najwa Aaraj:
Finding and Evaluating Parameters for BGV. 370-394 - Kyohei Sudo, Masayuki Tezuka
, Keisuke Hara, Yusuke Yoshida:
Quantum Search-to-Decision Reduction for the LWE Problem. 395-413
Implementations
- Duc Tri Nguyen
, Kris Gaj
:
Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions. 417-441 - James Howe
, Bas Westerbaan
:
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7. 442-462
Theory
- Matteo Campanelli
, Chaya Ganesh, Hamidreza Khoshakhlagh
, Janno Siim
:
Impossibilities in Succinct Arguments: Black-Box Extraction and More. 465-489 - Angelique Faye Loe, Liam Medley
, Christian O'Connell, Elizabeth A. Quaglia
:
Applications of Timed-Release Encryption with Implicit Authentication. 490-515

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.