default search action
24th PKC 2021: Virtual Event
- Juan A. Garay:
Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12711, Springer 2021, ISBN 978-3-030-75247-7 - Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu:
More Efficient Digital Signatures with Tight Multi-user Security. 1-31 - Pedro Branco, Nico Döttling, Sihang Pu:
Multiparty Cardinality Testing for Threshold Private Intersection. 32-60 - David Niehues:
Verifiable Random Functions with Optimal Tightness. 61-91 - Yuval Ishai, Russell W. F. Lai, Giulio Malavolta:
A Geometric Approach to Homomorphic Secret Sharing. 92-119 - Miguel Ambrona:
Generic Negation of Pair Encodings. 120-146 - Adam O'Neill, Mohammad Zaheri:
On Selective-Opening Security of Deterministic Primitives. 147-172 - Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito:
Revisiting (R)CCA Security and Replay Protection. 173-202
Cryptographic Protocols
- Marc Fischlin, Felix Rohrbach:
Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge. 205-234 - Dakshita Khurana, Brent Waters:
On the CCA Compatibility of Public-Key Infrastructure. 235-260 - Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart:
Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices. 261-289 - Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric-Enabled Threshold Authentication. 290-318 - David Heath, Vladimir Kolesnikov, Stanislav Peceny:
Masked Triples - Amortizing Multiplication Triples Across Conditionals. 319-348 - Saikrishna Badrinarayanan, Peihan Miao, Srinivasan Raghuraman, Peter Rindal:
Multi-party Threshold Private Set Intersection with Sublinear Communication. 349-379 - Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. 380-409 - Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest:
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. 410-440 - Koji Nuida:
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic. 441-468 - Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains. 469-498 - Ariel Hamlin, Mayank Varia:
Two-Server Distributed ORAM with Sublinear Computation and Constant Rounds. 499-527 - Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim:
Flexible and Efficient Verifiable Computation on Encrypted Data. 528-558 - Balthazar Bauer, Georg Fuchsbauer, Chen Qian:
Transferable E-Cash: A Cleaner Model and the First Practical Instantiation. 559-590 - Gayathri Garimella, Payman Mohassel, Mike Rosulek, Saeed Sadeghian, Jaspal Singh:
Private Set Operations from Oblivious Switching. 591-617 - Nils Fleischhacker, Mark Simkin:
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments. 618-648 - Andrea Caforio, F. Betül Durak, Serge Vaudenay:
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness. 649-677 - Khoa Nguyen, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang, Yanhong Xu, Neng Zeng:
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation. 678-708 - Pramod Bhatotia, Markulf Kohlweiss, Lorenzo Martinico, Yiannis Tselekounis:
Steel: Composable Hardware-Based Stateful and Randomised Functional Encryption. 709-736
Attacks and Cryptanalysis
- Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim:
Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Functions. 739-760
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.