


default search action
30th ASIACRYPT 2024: Kolkata, India - Part III
- Kai-Min Chung

, Yu Sasaki
:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III. Lecture Notes in Computer Science 15486, Springer 2025, ISBN 978-981-96-0890-4
Pairing-Based Cryptography
- Benoît Libert:

Non-malleable Subvector Commitments. 3-32 - Pedro Branco

, Russell W. F. Lai
, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Ivy K. Y. Woo
:
Traitor Tracing Without Trusted Authority from Registered Functional Encryption. 33-66
Threshold Cryptography
- Masayuki Abe

, Masaya Nanri, Octavio Perez-Kempner
, Mehdi Tibouchi
:
Interactive Threshold Mercurial Signatures and Applications. 69-103 - Renas Bacho

, Julian Loss
, Gilad Stern
, Benedikt Wagner
:
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. 104-140 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai:

Tiresias: Large Scale, UC-Secure Threshold Paillier. 141-173 - Stefan Dziembowski

, Stanislaw Jarecki
, Pawel Kedzior
, Hugo Krawczyk
, Chan Nam Ngo
, Jiayu Xu
:
Password-Protected Threshold Signatures. 174-206 - Ehsan Ebrahimi

, Anshu Yadav:
Strongly Secure Universal Thresholdizer. 207-239
Isogeny-Based Cryptography
- Hiroshi Onuki

, Kohei Nakagawa:
Ideal-to-Isogeny Algorithm Using 2-Dimensional Isogenies and Its Application to SQIsign. 243-271 - Kohei Nakagawa, Hiroshi Onuki

, Wouter Castryck, Mingjie Chen, Riccardo Invernizzi
, Gioella Lorenzon
, Frederik Vercauteren:
SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies. 272-303 - Pierrick Dartois

, Luciano Maino
, Giacomo Pope
, Damien Robert
:
An Algorithmic Approach to (2, 2)-Isogenies in the Theta Model and Applications to Isogeny-Based Cryptography. 304-338 - Andrea Basso

, Pierrick Dartois
, Luca De Feo
, Antonin Leroux
, Luciano Maino
, Giacomo Pope
, Damien Robert
, Benjamin Wesolowski
:
SQIsign2D-West - The Fast, the Small, and the Safer. 339-370 - Joseph Macula

, Katherine E. Stange
:
Extending Class Group Action Attacks via Sesquilinear Pairings. 371-395 - Max Duparc, Tako Boris Fouotsa

:
SQIPrime: A Dimension 2 Variant of SQISignHD with Non-smooth Challenge Isogenies. 396-429
Post-quantum Cryptography
- Biming Zhou, Haodong Jiang, Yunlei Zhao:

CPA-Secure KEMs are also Sufficient for Post-quantum TLS 1.3. 433-464 - Jacqueline Brendel, Sebastian Clermont

, Marc Fischlin:
Post-quantum Asynchronous Remote Key Generation for FIDO2. 465-493

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














