


default search action
31st SAC 2024: Montreal, QC, Canada - Part I
- Maria Eichlseder

, Sébastien Gambs
:
Selected Areas in Cryptography - SAC 2024 - 31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I. Lecture Notes in Computer Science 15516, Springer 2025, ISBN 978-3-031-82851-5
Privacy-Preserving Cryptography
- Kelong Cong

, Robin Geelen
, Jiayi Kang
, Jeongeun Park
:
Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification. 3-25 - Ferran Alborch Escobar

, Sébastien Canard, Fabien Laguillaumie
:
Simulation Secure Multi-input Quadratic Functional Encryption. 26-53 - Vincent Rieder

:
Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples. 54-83 - Akira Nakashima, Yukimasa Sugizaki

, Hikaru Tsuchida
, Takuya Hayashi
, Koji Nuida
, Kengo Mori
, Toshiyuki Isshiki:
Multi-key Homomorphic Encryption with Threshold Re-encryption. 84-104 - Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Satoshi Yasuda, Yohei Watanabe

, Takumi Amada, Mitsugu Iwamoto
, Kazuo Ohta
:
Multi-user Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives. 105-127
Post-quantum Cryptography
- Samed Düzlü, Rune Fiedler, Marc Fischlin:

BUFFing FALCON Without Increasing the Signature Size. 131-150 - Max Duparc, Tako Boris Fouotsa

, Serge Vaudenay
:
SILBE: An Updatable Public Key Encryption Scheme from Lollipop Attacks. 151-177 - Bruno Sterner:

Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and Their Isogeny-Based Applications. 178-202
Attacks on Public-Key Cryptography
- Shunsuke Osaki

, Noboru Kunihiro
:
Bias from Uniform Nonce: Revised Fourier Analysis-Based Attack on ECDSA. 205-229 - Ward Beullens:

Multivariate Blind Signatures Revisited. 230-236 - Wenwen Xia

, Geng Wang
, Dawu Gu
:
Post-Quantum Backdoor for Kyber-KEM. 237-255
Identity-Based Encryption
- Weidan Ji

, Zhedong Wang, Haoxiang Jin
, Qi Wang
, Geng Wang
, Dawu Gu
:
Identity-Based Encryption from Lattices with More Compactness in the Standard Model. 259-281 - Aikaterini Mitrokotsa

, Sayantan Mukherjee
, Jenit Tomy
:
Oblivious Identity-Based Encryption - (IBE Secure Against an Adversarial KGC). 282-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














