default search action
30th ASIACRYPT 2024: Kolkata, India - Part VI
- Kai-Min Chung, Yu Sasaki:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI. Lecture Notes in Computer Science 15489, Springer 2025, ISBN 978-981-96-0937-6
Secure Multiparty Computation
- Pascal Reisert, Marc Rivinius, Toomas Krips, Sebastian Hasler, Ralf Küsters:
Actively Secure Polynomial Evaluation from Shared Polynomial Encodings. 3-35 - Ying Gao, Lin Qi, Xiang Liu, Yuanchao Luo, Longxin Wang:
Efficient Fuzzy Private Set Intersection from Fuzzy Mapping. 36-68 - Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros, Sacha Servan-Schreiber:
FOLEAGE: $\mathbb {F}_{\scriptstyle 4}$OLE-Based Multi-party Computation for Boolean Circuits. 69-101 - Daniel Escudero, Yifan Song, Wenhao Wang:
Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus. 102-132 - Moumita Dutta, Chaya Ganesh, Sikhar Patranabis, Nitin Singh:
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs. 133-166 - Vipul Goyal, Junru Li, Ankit Kumar Misra, Rafail Ostrovsky, Yifan Song, Chenkai Weng:
Dishonest Majority Constant-Round MPC with Linear Communication from DDH. 167-199 - Saikrishna Badrinarayanan, Peihan Miao, Xinyi Shi, Max Tromanhauser, Ruida Zeng:
Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity. 200-233 - Amit Agarwal, Alexander Bienstock, Ivan Damgård, Daniel Escudero:
Honest Majority GOD MPC with O(sfdepth(C)) Rounds and Low Online Communication. 234-265 - Elette Boyle, Lisa Kohl, Zhe Li, Peter Scholl:
Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism. 266-298 - Hongqing Liu, Chaoping Xing, Chen Yuan, Taoxu Zou:
Dishonest Majority Multiparty Computation over Matrix Rings. 299-327 - Mihir Bellare, Rishabh Ranjan, Doreen Riepel, Ali Aldakheel:
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs. 328-362
Blockchain Protocols
- Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner:
Jackpot: Non-interactive Aggregatable Lotteries. 365-397 - Fatima Elsheimy, Julian Loss, Charalampos Papamanthou:
Early Stopping Byzantine Agreement in (1+ε ) · f Rounds. 398-424
Information-Theoretic Cryptography
- Alexander Russell, Qiang Tang, Jiadong Zhu:
Crooked Indifferentiability of the Feistel Construction. 427-460 - Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee:
Provable Security of Linux-DRBG in the Seedless Robustness Model. 461-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.