


default search action
26th PKC 2023: Atlanta, GA, USA - Part I
- Alexandra Boldyreva, Vladimir Kolesnikov
:
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part I. Lecture Notes in Computer Science 13940, Springer 2023, ISBN 978-3-031-31367-7
Post-quantum Cryptography
- Varun Maram
, Keita Xagawa
:
Post-quantum Anonymity of Kyber. 3-35 - Tianshu Shan
, Jiangxia Ge
, Rui Xue
:
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. 36-64 - Julien Duman
, Kathrin Hövelmanns
, Eike Kiltz
, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh
:
A Thorough Treatment of Highly-Efficient NTRU Instantiations. 65-94 - Samed Düzlü, Juliane Krämer, Thomas Pöppelmann, Patrick Struck
:
A Lightweight Identification Protocol Based on Lattices. 95-113 - Clément Hoffmann, Benoît Libert, Charles Momin, Thomas Peters, François-Xavier Standaert:
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption. 114-144
Attacks
- Nadia Heninger
, Keegan Ryan
:
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications. 147-176 - Léo Ducas
, Shane Gibbons
:
Hull Attacks on the Lattice Isomorphism Problem. 177-204 - Thomas Prest
:
A Key-Recovery Attack Against Mitaka in the t-Probing Model. 205-220
Signatures
- Mihir Bellare, Hannah Davis
, Zijing Di:
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA. 223-250 - Anna Lysyanskaya
:
Security Analysis of RSA-BSSA. 251-280 - Gennaro Avitabile
, Vincenzo Botta, Dario Fiore:
Extendable Threshold Ring Signatures with Enhanced Anonymity. 281-311 - Chloé Hébant, David Pointcheval, Robert Schädlich
:
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures. 312-341
Isogenies
- Luca De Feo
, Tako Boris Fouotsa
, Péter Kutas
, Antonin Leroux, Simon-Philipp Merz
, Lorenz Panny, Benjamin Wesolowski
:
SCALLOP: Scaling the CSI-FiSh. 345-375 - Saikrishna Badrinarayanan, Daniel Masny, Pratyay Mukherjee
, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar:
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH. 376-405 - Julien Duman
, Dominik Hartmann
, Eike Kiltz
, Sabrina Kunzweiler
, Jonas Lehmann
, Doreen Riepel
:
Generic Models for Group Actions. 406-435
Crypto for Crypto
- Carsten Baum
, Bernardo David, Rafael Dowsley, Ravi Kishore, Jesper Buus Nielsen, Sabine Oechsner
:
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time. 439-470 - Dario Catalano, Dario Fiore, Emanuele Giunta:
Efficient and Universally Composable Single Secret Leader Election from Pairings. 471-499 - Peter Chvojka, Tibor Jager:
Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments. 500-529 - Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath
, Krzysztof Pietrzak:
Certifying Giant Nonprimes. 530-553 - Shravan Srinivasan
, Julian Loss, Giulio Malavolta
, Kartik Nayak, Charalampos Papamanthou, Sri Aravinda Krishnan Thyagarajan
:
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus. 554-584
Pairings
- Pratish Datta, Tapas Pal
:
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded. 587-621 - Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. 622-651 - Marloes Venema
, Greg Alpár:
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs. 652-682
Key Exchange and Messaging
- Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. 685-713 - Lawrence Roy, Jiayu Xu:
A Universally Composable PAKE with Zero Communication Cost - (And Why It Shouldn't Be Considered UC-Secure). 714-743 - Laurin Benz
, Wasilij Beskorovajnov, Sarai Eilebrecht, Jörn Müller-Quade, Astrid Ottenhues
, Rebecca Schwerdt
:
Sender-binding Key Encapsulation. 744-773 - Elie Bouscatié, Guilhem Castagnos, Olivier Sanders:
Pattern Matching in Encrypted Stream from Inner Product Encryption. 774-801

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.