default search action
Search dblp for Publications
export results for "toc:db/conf/asiacrypt/asiacrypt2024-6.bht:"
@proceedings{DBLP:conf/asiacrypt/2024-6, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, publisher = {Springer}, year = {2025}, url = {https://doi.org/10.1007/978-981-96-0938-3}, doi = {10.1007/978-981-96-0938-3}, isbn = {978-981-96-0937-6}, timestamp = {Fri, 03 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2024-6.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgarwalBDE24, author = {Amit Agarwal and Alexander Bienstock and Ivan Damg{\aa}rd and Daniel Escudero}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Honest Majority {GOD} {MPC} with O(sfdepth(C)) Rounds and Low Online Communication}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {234--265}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_8}, doi = {10.1007/978-981-96-0938-3\_8}, timestamp = {Fri, 03 Jan 2025 14:11:20 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgarwalBDE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananMSTZ24, author = {Saikrishna Badrinarayanan and Peihan Miao and Xinyi Shi and Max Tromanhauser and Ruida Zeng}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {200--233}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_7}, doi = {10.1007/978-981-96-0938-3\_7}, timestamp = {Fri, 03 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananMSTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellareRRA24, author = {Mihir Bellare and Rishabh Ranjan and Doreen Riepel and Ali Aldakheel}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for {PSI} and OPRFs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {328--362}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_11}, doi = {10.1007/978-981-96-0938-3\_11}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellareRRA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BombarBCCDS24, author = {Maxime Bombar and Dung Bui and Geoffroy Couteau and Alain Couvreur and Cl{\'{e}}ment Ducros and Sacha Servan{-}Schreiber}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {{FOLEAGE:} {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{{\textbackslash}scriptstyle 4\}{\textdollar}OLE-Based Multi-party Computation for Boolean Circuits}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {69--101}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_3}, doi = {10.1007/978-981-96-0938-3\_3}, timestamp = {Fri, 03 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BombarBCCDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoyleKLS24, author = {Elette Boyle and Lisa Kohl and Zhe Li and Peter Scholl}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Direct {FSS} Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {266--298}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_9}, doi = {10.1007/978-981-96-0938-3\_9}, timestamp = {Fri, 03 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoyleKLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChungKLL24, author = {Woohyuk Chung and Hwigyeom Kim and Jooyoung Lee and Yeongmin Lee}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Provable Security of Linux-DRBG in the Seedless Robustness Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {461--490}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_15}, doi = {10.1007/978-981-96-0938-3\_15}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChungKLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DuttaGPS24, author = {Moumita Dutta and Chaya Ganesh and Sikhar Patranabis and Nitin Singh}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {133--166}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_5}, doi = {10.1007/978-981-96-0938-3\_5}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DuttaGPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ElsheimyLP24, author = {Fatima Elsheimy and Julian Loss and Charalampos Papamanthou}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Early Stopping Byzantine Agreement in (1+{\(\epsilon\)} {)} {\(\cdot\)} f Rounds}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {398--424}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_13}, doi = {10.1007/978-981-96-0938-3\_13}, timestamp = {Fri, 03 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ElsheimyLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/EscuderoSW24, author = {Daniel Escudero and Yifan Song and Wenhao Wang}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {102--132}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_4}, doi = {10.1007/978-981-96-0938-3\_4}, timestamp = {Fri, 03 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/EscuderoSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FleischhackerHSW24, author = {Nils Fleischhacker and Mathias Hall{-}Andersen and Mark Simkin and Benedikt Wagner}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Jackpot: Non-interactive Aggregatable Lotteries}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {365--397}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_12}, doi = {10.1007/978-981-96-0938-3\_12}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FleischhackerHSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GaoQLLW24, author = {Ying Gao and Lin Qi and Xiang Liu and Yuanchao Luo and Longxin Wang}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Efficient Fuzzy Private Set Intersection from Fuzzy Mapping}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {36--68}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_2}, doi = {10.1007/978-981-96-0938-3\_2}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GaoQLLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoyalLMOSW24, author = {Vipul Goyal and Junru Li and Ankit Kumar Misra and Rafail Ostrovsky and Yifan Song and Chenkai Weng}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Dishonest Majority Constant-Round {MPC} with Linear Communication from {DDH}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {167--199}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_6}, doi = {10.1007/978-981-96-0938-3\_6}, timestamp = {Fri, 03 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoyalLMOSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuXYZ24, author = {Hongqing Liu and Chaoping Xing and Chen Yuan and Taoxu Zou}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Dishonest Majority Multiparty Computation over Matrix Rings}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {299--327}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_10}, doi = {10.1007/978-981-96-0938-3\_10}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuXYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ReisertRKHK24, author = {Pascal Reisert and Marc Rivinius and Toomas Krips and Sebastian Hasler and Ralf K{\"{u}}sters}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Actively Secure Polynomial Evaluation from Shared Polynomial Encodings}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {3--35}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_1}, doi = {10.1007/978-981-96-0938-3\_1}, timestamp = {Wed, 08 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ReisertRKHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/RussellTZ24, author = {Alexander Russell and Qiang Tang and Jiadong Zhu}, editor = {Kai{-}Min Chung and Yu Sasaki}, title = {Crooked Indifferentiability of the Feistel Construction}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {15489}, pages = {427--460}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-96-0938-3\_14}, doi = {10.1007/978-981-96-0938-3\_14}, timestamp = {Fri, 03 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/RussellTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.