default search action
30th ASIACRYPT 2024: Kolkata, India - Part III
- Kai-Min Chung, Yu Sasaki:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III. Lecture Notes in Computer Science 15486, Springer 2025, ISBN 978-981-96-0890-4
Pairing-Based Cryptography
- Benoît Libert:
Non-malleable Subvector Commitments. 3-32 - Pedro Branco, Russell W. F. Lai, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Ivy K. Y. Woo:
Traitor Tracing Without Trusted Authority from Registered Functional Encryption. 33-66
Threshold Cryptography
- Masayuki Abe, Masaya Nanri, Octavio Perez-Kempner, Mehdi Tibouchi:
Interactive Threshold Mercurial Signatures and Applications. 69-103 - Renas Bacho, Julian Loss, Gilad Stern, Benedikt Wagner:
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. 104-140 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai:
Tiresias: Large Scale, UC-Secure Threshold Paillier. 141-173 - Stefan Dziembowski, Stanislaw Jarecki, Pawel Kedzior, Hugo Krawczyk, Chan Nam Ngo, Jiayu Xu:
Password-Protected Threshold Signatures. 174-206 - Ehsan Ebrahimi, Anshu Yadav:
Strongly Secure Universal Thresholdizer. 207-239
Isogeny-Based Cryptography
- Hiroshi Onuki, Kohei Nakagawa:
Ideal-to-Isogeny Algorithm Using 2-Dimensional Isogenies and Its Application to SQIsign. 243-271 - Kohei Nakagawa, Hiroshi Onuki, Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, Frederik Vercauteren:
SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies. 272-303 - Pierrick Dartois, Luciano Maino, Giacomo Pope, Damien Robert:
An Algorithmic Approach to (2, 2)-Isogenies in the Theta Model and Applications to Isogeny-Based Cryptography. 304-338 - Andrea Basso, Pierrick Dartois, Luca De Feo, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, Benjamin Wesolowski:
SQIsign2D-West - The Fast, the Small, and the Safer. 339-370 - Joseph Macula, Katherine E. Stange:
Extending Class Group Action Attacks via Sesquilinear Pairings. 371-395 - Max Duparc, Tako Boris Fouotsa:
SQIPrime: A Dimension 2 Variant of SQISignHD with Non-smooth Challenge Isogenies. 396-429
Post-quantum Cryptography
- Biming Zhou, Haodong Jiang, Yunlei Zhao:
CPA-Secure KEMs are also Sufficient for Post-quantum TLS 1.3. 433-464 - Jacqueline Brendel, Sebastian Clermont, Marc Fischlin:
Post-quantum Asynchronous Remote Key Generation for FIDO2. 465-493
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.