


default search action
30th ASIACRYPT 2024: Kolkata, India - Part VI
- Kai-Min Chung

, Yu Sasaki
:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI. Lecture Notes in Computer Science 15489, Springer 2025, ISBN 978-981-96-0937-6
Secure Multiparty Computation
- Pascal Reisert

, Marc Rivinius
, Toomas Krips
, Sebastian Hasler
, Ralf Küsters
:
Actively Secure Polynomial Evaluation from Shared Polynomial Encodings. 3-35 - Ying Gao

, Lin Qi
, Xiang Liu
, Yuanchao Luo
, Longxin Wang
:
Efficient Fuzzy Private Set Intersection from Fuzzy Mapping. 36-68 - Maxime Bombar, Dung Bui, Geoffroy Couteau, Alain Couvreur, Clément Ducros

, Sacha Servan-Schreiber:
FOLEAGE: $\mathbb {F}_{\scriptstyle 4}$OLE-Based Multi-party Computation for Boolean Circuits. 69-101 - Daniel Escudero, Yifan Song, Wenhao Wang:

Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus. 102-132 - Moumita Dutta

, Chaya Ganesh
, Sikhar Patranabis
, Nitin Singh
:
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs. 133-166 - Vipul Goyal, Junru Li, Ankit Kumar Misra

, Rafail Ostrovsky, Yifan Song, Chenkai Weng:
Dishonest Majority Constant-Round MPC with Linear Communication from DDH. 167-199 - Saikrishna Badrinarayanan, Peihan Miao, Xinyi Shi, Max Tromanhauser, Ruida Zeng:

Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity. 200-233 - Amit Agarwal, Alexander Bienstock, Ivan Damgård, Daniel Escudero:

Honest Majority GOD MPC with O(sfdepth(C)) Rounds and Low Online Communication. 234-265 - Elette Boyle, Lisa Kohl, Zhe Li, Peter Scholl:

Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism. 266-298 - Hongqing Liu

, Chaoping Xing
, Chen Yuan
, Taoxu Zou:
Dishonest Majority Multiparty Computation over Matrix Rings. 299-327 - Mihir Bellare

, Rishabh Ranjan
, Doreen Riepel
, Ali Aldakheel:
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs. 328-362
Blockchain Protocols
- Nils Fleischhacker

, Mathias Hall-Andersen
, Mark Simkin
, Benedikt Wagner
:
Jackpot: Non-interactive Aggregatable Lotteries. 365-397 - Fatima Elsheimy, Julian Loss, Charalampos Papamanthou:

Early Stopping Byzantine Agreement in (1+ε ) · f Rounds. 398-424
Information-Theoretic Cryptography
- Alexander Russell, Qiang Tang, Jiadong Zhu

:
Crooked Indifferentiability of the Feistel Construction. 427-460 - Woohyuk Chung

, Hwigyeom Kim
, Jooyoung Lee
, Yeongmin Lee
:
Provable Security of Linux-DRBG in the Seedless Robustness Model. 461-490

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














