


default search action
15th AFRICACRYPT 2024: Douala, Cameroon
- Serge Vaudenay
, Christophe Petit
:
Progress in Cryptology - AFRICACRYPT 2024 - 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings. Lecture Notes in Computer Science 14861, Springer 2024, ISBN 978-3-031-64380-4
Symmetric Key Cryptography
- Said Eddahmani, Sihem Mesnager:
On the Double Differential Uniformity of Vectorial Boolean Functions. 3-20 - François Gérard, Agnese Gini, Pierrick Méaux:
TooLIP: How to Find New Instances of FiLIP Cipher with Smaller Key Size and New Filters. 21-45
Best Paper Award
- Slim Bettaieb, Alessandro Budroni
, Marco Palumbi, Décio Luiz Gazzoni Filho:
Quasi-optimal Permutation Ranking and Applications to PERK. 49-65
Advanced Primitives (I)
- Sofía Celi
, Shai Levin
, Joe Rowell:
CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness. 69-93 - Anaïs Barthoulot, Olivier Blazy, Sébastien Canard:
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs. 94-119
Advanced Primitives (II)
- Isheeta Nargis:
Efficient Oblivious Transfer for One-Sided Active Adaptive Adversaries. 123-148 - Yongge Wang
, Qutaibah M. Malluhi
:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. 149-173 - Pascal Lafourcade
, Gaël Marcadet
, Léo Robert
:
iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption. 174-198
Post-quantum Cryptography (I)
- Hermann Tchatchiem Kamche
, Hervé Talé Kalachi
:
On the Generalizations of the Rank Metric over Finite Chain Rings. 201-221 - River Moreira Ferreira, Ludovic Perret:
Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV. 222-235
Post-quantum Cryptography (II)
- Xu Liu, Mingqiang Wang:
QCCA Security of Fujisaki-Okamoto Transformation in the Quantum Random Oracle Model. 239-259 - Duyên Pay, François-Xavier Standaert:
Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber. 260-281
Elliptic Curve Cryptography and RSA
- Mónica P. Arenas
, Georgios Fotiadis
, Elisavet Konstantinou
:
Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves. 285-310 - Aubain Jose Mayeukeu
, Emmanuel Fouotsa
:
Same Values Analysis Attack on Weierstrass Binary Elliptic Curves. 311-326 - Abderrahmane Nitaj, Nurul Nur Hanisah Adenan, Muhammad Rezal Kamel Ariffin:
Cryptanalysis of a New Variant of the RSA Cryptosystem. 327-345
Lattice-Based Cryptography Constructions
- Ali Raya, Vikas Kumar, Sugata Gangopadhyay:
DiTRU: A Resurrection of NTRU over Dihedral Group. 349-375 - Elena Kirshanova, Chiara Marcolla, Sergi Rovira:
Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption. 376-400
Lattice-Based Cryptography Cryptanalysis
- Alexander Karenin, Elena Kirshanova:
Finding Dense Submodules with Algebraic Lattice Reduction. 403-427 - Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The Cool and the Cruel: Separating Hard Parts of LWE Secrets. 428-453

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.