default search action
28th ESORICS 2023: The Hague, The Netherlands - Part I
- Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14344, Springer 2024, ISBN 978-3-031-50593-5
Crypto
- Yavuz Akin, Jakub Klemsa, Melek Önen:
A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth. 3-23 - Zhiyuan An, Haibo Tian, Chao Chen, Fangguo Zhang:
Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience. 24-44 - Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Akira Nakashima, Toshiyuki Isshiki, Kengo Mori:
Threshold Fully Homomorphic Encryption Over the Torus. 45-65 - Qi Wang, Haodong Huang, Juyan Li, Qi Yuan:
Revocable IBE with En-DKER from Lattices: A Novel Approach for Lattice Basis Delegation. 66-85 - Aysajan Abidin, Erik Pohle, Bart Preneel:
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC. 86-105 - Minkyu Kim, Hyung Tae Lee:
Code-Based Secret Handshake Scheme, Revisited. 106-125 - Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu, Xiangfu Song:
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage. 126-146 - Dennis Dayanikli, Anja Lehmann:
Password-Based Credentials with Security Against Server Compromise. 147-167 - Marcel Tiepelt, Edward Eaton, Douglas Stebila:
Making an Asymmetric PAKE Quantum-Annoying by Hiding Group Elements. 168-188 - Jules Maire, Damien Vergnaud:
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems. 189-208 - Carmen Wabartha, Julian Liedtke, Nicolas Huber, Daniel Rausch, Ralf Küsters:
Fully Tally-Hiding Verifiable E-Voting for Real-World Elections with Seat-Allocations. 209-228 - Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi:
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation. 229-248 - Lin Zhu, Qiang-Sheng Hua, Yi Chen, Hai Jin:
Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption. 249-269 - Katharina Boudgoust, Akira Takahashi:
Sequential Half-Aggregation of Lattice-Based Signatures. 270-289 - Ivan De Oliveira Nunes, Peter Rindal, Maliheh Shirvanian:
Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems. 290-312 - Ivo Maffei, A. W. Roscoe:
Optimally-Fair Multi-party Exchange Without Trusted Parties. 313-333 - Tae Min Ahn, Kang Hoon Lee, Joon Soo Yoo, Ji Won Yoon:
Cheap and Fast Iterative Matrix Inverse in Encrypted Domain. 334-352 - Sohyun Jeon, Hyang-Sook Lee, Jeongeun Park:
Practical Randomized Lattice Gadget Decomposition with Application to FHE. 353-371 - Théophile Brézot, Paola de Perthuis, David Pointcheval:
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. 372-392 - Quang Cao, Hong-Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah:
Committed Private Information Retrieval. 393-413 - You Lyu, Shengli Liu:
Two-Message Authenticated Key Exchange from Public-Key Encryption. 414-434 - Jules Maire, Damien Vergnaud:
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head. 435-454 - Laura Hetz, Thomas Schneider, Christian Weinert:
Scaling Mobile Private Contact Discovery to Billions of Users. 455-476
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.