


default search action
24th PKC 2021: Virtual Event
- Juan A. Garay

:
Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12710, Springer 2021, ISBN 978-3-030-75244-6
Post-Quantum Constructions and Cryptanalysis
- Xu Liu, Mingqiang Wang:

QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model. 3-26 - Cyril Bouvier, Laurent Imbert:

An Alternative Approach for SIDH Arithmetic. 27-44 - Michael Walter:

The Convergence of Slide-Type Reductions. 45-67 - Eamonn W. Postlethwaite

, Fernando Virdia
:
On the Success Probability of Solving Unique SVP via BKZ. 68-98 - Ivan Damgård, Claudio Orlandi, Akira Takahashi

, Mehdi Tibouchi:
Two-Round n-out-of-n and Multi-signatures and Trapdoor Commitment from Lattices. 99-130 - Geovandro C. C. F. Pereira, Paulo S. L. M. Barreto:

Isogeny-Based Key Compression Without Pairings. 131-154 - Morten Øygarden, Patrick Felke, Håvard Raddum:

Analysis of Multivariate Encryption Schemes: Application to Dob. 155-183 - Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld:

On the Integer Polynomial Learning with Errors Problem. 184-214 - Vadim Lyubashevsky, Ngoc Khanh Nguyen, Gregor Seiler:

Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments. 215-241 - Netanel Raviv, Ben Langton, Itzhak Tamo:

Multivariate Public Key Cryptosystem from Sidon Spaces. 242-265 - Carsten Baum

, Cyprien Delpech de Saint Guilhem
, Daniel Kales, Emmanuela Orsini
, Peter Scholl, Greg Zaverucha:
Banquet: Short and Fast Signatures from AES. 266-297
Cryptographic Primitives and Schemes
- Olivier Sanders:

Improving Revocation for Group Signature with Redactable Signature. 301-330 - Hilder Vitor Lima Pereira

:
Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One Second. 331-359 - Jesus Diaz

, Anja Lehmann:
Group Signatures with User-Controlled and Sequential Linkability. 360-388 - Yuyu Wang

, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. 389-420 - Qiqi Lai, Feng-Hao Liu, Zhedong Wang:

Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks. 421-450 - Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi:

Two-Party Adaptor Signatures from Identification Schemes. 451-480 - Tsz Hon Yuen

, Handong Cui
, Xiang Xie
:
Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. 481-511 - Nico Döttling, Ryo Nishimaki:

Universal Proxy Re-Encryption. 512-542 - Shengyuan Feng, Junqing Gong, Jie Chen:

Master-Key KDM-Secure ABE via Predicate Encoding. 543-572 - Maxime Plançon, Thomas Prest

:
Exact Lattice Sampling from Non-Gaussian Distributions. 573-595 - Tibor Jager

, Rafael Kurek, David Niehues
:
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. 596-626 - Pascal Bemmann, Rongmao Chen, Tibor Jager:

Subversion-Resilient Public Key Encryption with Practical Watchdogs. 627-658 - Julien Devevey, Benoît Libert, Khoa Nguyen

, Thomas Peters, Moti Yung:
Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings. 659-690 - Valerio Cini

, Sebastian Ramacher
, Daniel Slamanig
, Christoph Striecks
, Erkan Tairi
:
Updatable Signatures and Message Authentication Codes. 691-723 - Michele Ciampi

, Luisa Siniscalchi
, Hendrik Waldner
:
Multi-Client Functional Encryption for Separable Functions. 724-753

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














