


default search action
14th SCN 2024: Amalfi, Italy - Part II
- Clemente Galdi
, Duong Hieu Phan
:
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14974, Springer 2024, ISBN 978-3-031-71072-8
Homomorphic Encryption
- Kelong Cong
, Jiayi Kang
, Georgio Nicolas
, Jeongeun Park
:
Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption. 3-23 - Lennart Braun
, Guilhem Castagnos, Ivan Damgård
, Fabien Laguillaumie
, Kelsey Melissaris
, Claudio Orlandi
, Ida Tucker
:
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. 24-46 - Keita Emura
, Shingo Sato, Atsushi Takayasu
:
Attribute-Based Keyed Fully Homomorphic Encryption. 47-67
Symmetric Key Encryption
- Parisa Amiri-Eliasi
, Koustabh Ghosh
, Joan Daemen
:
Mystrium: Wide Block Encryption Efficient on Entry-Level Processors. 71-96 - Chris Brzuska, Geoffroy Couteau, Christoph Egger
, Pihla Karanko, Pierre Meyer:
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. 97-116 - Amit Singh Bhati
, Elena Andreeva
, Damian Vizár:
OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF. 117-139 - Ritam Bhaumik
, Mridul Nandi
, Sayantan Paul
, Abishanka Saha
:
Indifferentiability of 3-Round Confusion-Diffusion Networks. 140-161
Cryptanalysis
- Ludo N. Pulles
, Mehdi Tibouchi
:
Cryptanalysis of EagleSign. 165-186 - Prasanna Raghaw Mishra
, Yogesh Kumar
, Susanta Samanta
, Atul Gaur
:
A New Algorithm for Computing Branch Number of Non-Singular Matrices Over Finite Fields. 187-205 - Jiqiang Lu, Xiao Zhang:
Impossible Differential Cryptanalysis of the Raindrop Block Cipher. 206-227 - Johannes Ottenhues
, Alexander Koch
:
LaPSuS - A Lattice-Based Private Stream Aggregation Scheme Under Scrutiny. 228-248
Key Management
- Xichen Zhang, Keitaro Hashimoto
, Wakaha Ogata
:
Security Model for Authenticated Key Exchange, Reconsidered. 251-271 - Shuya Hanai
, Keisuke Tanaka
, Masayuki Tezuka
, Yusuke Yoshida
:
Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange. 272-293 - Joël Alwen, Benedikt Auerbach
, Miguel Cueto Noval
, Karen Klein
, Guillermo Pascual-Perez
, Krzyzstof Pietrzak:
DeCAF: Decentralizable CGKA with Fast Healing. 294-313
Blockchains
- Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira:
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. 317-337 - Poulami Das, Andreas Erwig, Sebastian Faust:
Shared-Custodial Password-Authenticated Deterministic Wallets. 338-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.