default search action
14th SCN 2024: Amalfi, Italy - Part II
- Clemente Galdi, Duong Hieu Phan:
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14974, Springer 2024, ISBN 978-3-031-71072-8
Homomorphic Encryption
- Kelong Cong, Jiayi Kang, Georgio Nicolas, Jeongeun Park:
Faster Private Decision Tree Evaluation for Batched Input from Homomorphic Encryption. 3-23 - Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, Ida Tucker:
An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. 24-46 - Keita Emura, Shingo Sato, Atsushi Takayasu:
Attribute-Based Keyed Fully Homomorphic Encryption. 47-67
Symmetric Key Encryption
- Parisa Amiri-Eliasi, Koustabh Ghosh, Joan Daemen:
Mystrium: Wide Block Encryption Efficient on Entry-Level Processors. 71-96 - Chris Brzuska, Geoffroy Couteau, Christoph Egger, Pihla Karanko, Pierre Meyer:
Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs. 97-116 - Amit Singh Bhati, Elena Andreeva, Damian Vizár:
OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF. 117-139 - Ritam Bhaumik, Mridul Nandi, Sayantan Paul, Abishanka Saha:
Indifferentiability of 3-Round Confusion-Diffusion Networks. 140-161
Cryptanalysis
- Ludo N. Pulles, Mehdi Tibouchi:
Cryptanalysis of EagleSign. 165-186 - Prasanna Raghaw Mishra, Yogesh Kumar, Susanta Samanta, Atul Gaur:
A New Algorithm for Computing Branch Number of Non-Singular Matrices Over Finite Fields. 187-205 - Jiqiang Lu, Xiao Zhang:
Impossible Differential Cryptanalysis of the Raindrop Block Cipher. 206-227 - Johannes Ottenhues, Alexander Koch:
LaPSuS - A Lattice-Based Private Stream Aggregation Scheme Under Scrutiny. 228-248
Key Management
- Xichen Zhang, Keitaro Hashimoto, Wakaha Ogata:
Security Model for Authenticated Key Exchange, Reconsidered. 251-271 - Shuya Hanai, Keisuke Tanaka, Masayuki Tezuka, Yusuke Yoshida:
Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange. 272-293 - Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzyzstof Pietrzak:
DeCAF: Decentralizable CGKA with Fast Healing. 294-313
Blockchains
- Bernardo David, Rafael Dowsley, Anders Konring, Mario Larangeira:
MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications. 317-337 - Poulami Das, Andreas Erwig, Sebastian Faust:
Shared-Custodial Password-Authenticated Deterministic Wallets. 338-359
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.