


default search action
43rd EUROCRYPT 2024: Zurich, Switzerland - Part VI
- Marc Joye
, Gregor Leander
:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VII. Lecture Notes in Computer Science 14657, Springer 2024, ISBN 978-3-031-58753-5 - Arasu Arun, Srinath T. V. Setty, Justin Thaler:
Jolt: SNARKs for Virtual Machines via Lookups. 3-33 - Helger Lipmaa
, Roberto Parisella
, Janno Siim
:
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions. 34-64 - Jesko Dujmovic, Mohammad Hajiabadi:
Lower-Bounds on Public-Key Operations in PIR. 65-87 - Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia:
Fast Public-Key Silent OT and More from Constrained Naor-Reingold. 88-118 - Kai-Min Chung, Mi-Ying (Miryam) Huang, Er-Cheng Tang
, Jiapeng Zhang:
Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort. 119-148 - Hanlin Liu
, Xiao Wang
, Kang Yang
, Yu Yu
:
The Hardness of LPN over Any Integer Ring and Field for PCG Applications. 149-179 - Srinath T. V. Setty, Justin Thaler, Riad S. Wahby:
Unlocking the Lookup Singularity with Lasso. 180-209 - Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi:
Efficient Pre-processing PIR Without Public-Key Cryptography. 210-240 - Changrui Mu, Shafik Nassar, Ron D. Rothblum, Prashant Nalini Vasudevan:
Strong Batching for Non-interactive Statistical Zero-Knowledge. 241-270 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan:
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate. 271-300 - Damiano Abram
, Lawrence Roy, Peter Scholl
:
Succinct Homomorphic Secret Sharing. 301-330 - Hanjun Li
, Tianren Liu
:
How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations. 331-360 - Khue Do
, Lucjan Hanzlik
, Eugenio Paracucchi
:
M&M'S: Mix and Match Attacks on Schnorr-Type Blind Signatures with Repetition. 363-387 - Aurel Page
, Benjamin Wesolowski
:
The Supersingular Endomorphism Ring and One Endomorphism Problems are Equivalent. 388-417 - Kelsey A. Jackson
, Carl A. Miller
, Daochen Wang
:
Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle Model. 418-446 - Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham:
Crypto Dark Matter on the Torus - Oblivious PRFs from Shallow PRFs and TFHE. 447-476

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.