default search action
43rd EUROCRYPT 2024: Zurich, Switzerland - Part I
- Marc Joye, Gregor Leander:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14651, Springer 2024, ISBN 978-3-031-58715-3
Awarded Papers
- Pierrick Dartois, Antonin Leroux, Damien Robert, Benjamin Wesolowski:
SQIsignHD: New Dimensions in Cryptography. 3-32 - Itai Dinur:
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis. 33-62 - Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Krijn Reijnders:
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing. 63-93
Symmetric Cryptology
- Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation. 97-127 - Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard:
Partial Sums Meet FFT: Improved Attack on 6-Round AES. 128-157 - Yingxin Li, Fukang Liu, Gaoli Wang:
New Records in Collision Attacks on SHA-2. 158-186 - Antonio Flórez-Gutiérrez, Yosuke Todo:
Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing. 187-216 - Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia:
A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool. 217-248 - Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha:
Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm. 249-279 - Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia:
Improved Differential Meet-in-the-Middle Cryptanalysis. 280-309 - Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, Patrick Struck:
Post-quantum Security of Tweakable Even-Mansour, and Applications. 310-338 - Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. 339-367 - Jiahui He, Kai Hu, Hao Lei, Meiqin Wang:
Massive Superpoly Recovery with a Meet-in-the-Middle Framework - Improved Cube Attacks on Trivium and Kreyvium. 368-397 - Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-Like Hashing. 398-426
Public Key Primitives with Advanced Functionalities (I/II)
- Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu:
Twinkle: Threshold Signatures from DDH with Full Adaptive Security. 429-459 - Jiaxin Pan, Benedikt Wagner:
Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures. 460-489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.