Piper, Fred; Murphy, Sean Cryptography. A very short introduction (to appear). 2nd edition. (English) Zbl 07803053 Oxford: Oxford University Press (ISBN 978-0-19-288223-3/pbk). (2025). MSC: 94A60 00A06 PDFBibTeX XML
Hakuta, Keisuke Efficient algorithms for elliptic curve cryptosystems using endomorphisms (to appear). (English) Zbl 06416161 Mathematics for Industry 10. Tokyo: Springer (ISBN 978-4-431-55347-2/hbk; 978-4-431-55348-9/ebook). 300 p. (2025). MSC: 94-02 94A60 94B27 11T71 PDFBibTeX XMLCite \textit{K. Hakuta}, Efficient algorithms for elliptic curve cryptosystems using endomorphisms (to appear). Tokyo: Springer (2025; Zbl 06416161)
Malyshev, Fedor M. Methods of linear and differential relations in cryptography. (English. Russian original) Zbl 07908435 Discrete Math. Appl. 34, No. 3, 145-166 (2024); translation from Diskretn. Mat. 34, No. 1, 36-63 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{F. M. Malyshev}, Discrete Math. Appl. 34, No. 3, 145--166 (2024; Zbl 07908435); translation from Diskretn. Mat. 34, No. 1, 36--63 (2022) Full Text: DOI
Burov, Dmitry A. On a relationship between linear and differential characteristics of binary vector spaces mappings and diffusion characteristics over blocks of imprimitivity systems of translation group of the binary vector space. (English. Russian original) Zbl 07908434 Discrete Math. Appl. 34, No. 3, 121-144 (2024); translation from Diskretn. Mat. 35, No. 1, 3-34 (2023). MSC: 94A60 20B30 20D60 PDFBibTeX XMLCite \textit{D. A. Burov}, Discrete Math. Appl. 34, No. 3, 121--144 (2024; Zbl 07908434); translation from Diskretn. Mat. 35, No. 1, 3--34 (2023) Full Text: DOI
Tsaregorodtsev, K. D. Privacy and integrity properties of ECIES scheme. (Russian. English summary) Zbl 07906885 Mat. Vopr. Kriptografii 15, No. 2, 101-136 (2024). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. D. Tsaregorodtsev}, Mat. Vopr. Kriptografii 15, No. 2, 101--136 (2024; Zbl 07906885) Full Text: DOI MNR
Kronberg, D. A. A quantum scheme for attack on a phase-time encoded quantum cryptography protocol. (Russian. English summary) Zbl 07906884 Mat. Vopr. Kriptografii 15, No. 2, 91-100 (2024). MSC: 81P94 81P68 94A60 PDFBibTeX XMLCite \textit{D. A. Kronberg}, Mat. Vopr. Kriptografii 15, No. 2, 91--100 (2024; Zbl 07906884) Full Text: DOI MNR
Kosolapov, Yu. V.; Lelyuk, E. A. The McEliece-type cryptosystem based on \(D\)-codes. (Russian. English summary) Zbl 07906883 Mat. Vopr. Kriptografii 15, No. 2, 69-90 (2024). MSC: 94A60 94B05 PDFBibTeX XMLCite \textit{Yu. V. Kosolapov} and \textit{E. A. Lelyuk}, Mat. Vopr. Kriptografii 15, No. 2, 69--90 (2024; Zbl 07906883) Full Text: DOI MNR
Kiryukhin, V. A. About “\(k\)-bit security” of MACs based on hash function Streebog. (Russian. English summary) Zbl 07906882 Mat. Vopr. Kriptografii 15, No. 2, 47-68 (2024). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{V. A. Kiryukhin}, Mat. Vopr. Kriptografii 15, No. 2, 47--68 (2024; Zbl 07906882) Full Text: DOI MNR
Davydov, S. A.; Shkuratov, Yu. D. Circulant matrices over \(\mathbb{F}_2\) and their use for the construction of efficient linear transformations with high branch numbers. (Russian. English summary) Zbl 07906881 Mat. Vopr. Kriptografii 15, No. 2, 29-46 (2024). MSC: 94A60 94A05 68P25 PDFBibTeX XMLCite \textit{S. A. Davydov} and \textit{Yu. D. Shkuratov}, Mat. Vopr. Kriptografii 15, No. 2, 29--46 (2024; Zbl 07906881) Full Text: DOI MNR
Alekseev, E. K.; Akhmetzyanova, L. R.; Babueva, A. A.; Nikiforova, L. O.; Smyshlyaev, S. V. Two-party GOST signature scheme. (Russian. English summary) Zbl 07906880 Mat. Vopr. Kriptografii 15, No. 2, 7-28 (2024). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{E. K. Alekseev} et al., Mat. Vopr. Kriptografii 15, No. 2, 7--28 (2024; Zbl 07906880) Full Text: DOI MNR
Puente, O. C.; Leal, R. F.; de da Cruz Jiménez, R. A. On the Bit-Slice representations of some nonlinear bijective transformations. (English) Zbl 07906877 Mat. Vopr. Kriptografii 15, No. 1, 97-125 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{O. C. Puente} et al., Mat. Vopr. Kriptografii 15, No. 1, 97--125 (2024; Zbl 07906877) Full Text: DOI MNR
Kopyttsev, V. A. Reliability estimate of the maximum likelihood method used for the solution of systems of equations with distorted right parts. (Russian. English summary) Zbl 07906876 Mat. Vopr. Kriptografii 15, No. 1, 83-95 (2024). MSC: 94A60 60H99 PDFBibTeX XMLCite \textit{V. A. Kopyttsev}, Mat. Vopr. Kriptografii 15, No. 1, 83--95 (2024; Zbl 07906876) Full Text: DOI MNR
Kiryukhin, V. A. On the security aspects of protocol CRISP. (Russian. English summary) Zbl 07906875 Mat. Vopr. Kriptografii 15, No. 1, 57-81 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{V. A. Kiryukhin}, Mat. Vopr. Kriptografii 15, No. 1, 57--81 (2024; Zbl 07906875) Full Text: DOI MNR
Ivchenko, G. I.; Medvedev, Yu. I. Random \(a\)-permutations in a parametric model. (Russian. English summary) Zbl 07906874 Mat. Vopr. Kriptografii 15, No. 1, 35-55 (2024). MSC: 05A05 60C05 62F03 94A60 PDFBibTeX XMLCite \textit{G. I. Ivchenko} and \textit{Yu. I. Medvedev}, Mat. Vopr. Kriptografii 15, No. 1, 35--55 (2024; Zbl 07906874) Full Text: DOI MNR
Drelikhov, V. O. On the constructions of Markov maps. (Russian. English summary) Zbl 07906873 Mat. Vopr. Kriptografii 15, No. 1, 21-34 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{V. O. Drelikhov}, Mat. Vopr. Kriptografii 15, No. 1, 21--34 (2024; Zbl 07906873) Full Text: DOI MNR
Denisov, O. V. Difference characteristics of random maps and their compositions. (Russian. English summary) Zbl 07906872 Mat. Vopr. Kriptografii 15, No. 1, 5-20 (2024). MSC: 94A60 68P15 65C10 PDFBibTeX XMLCite \textit{O. V. Denisov}, Mat. Vopr. Kriptografii 15, No. 1, 5--20 (2024; Zbl 07906872) Full Text: DOI MNR
Zha, Zhengbang; Hu, Lei New results on PcN and APcN polynomials over finite fields. (English) Zbl 07905718 Finite Fields Appl. 98, Article ID 102471, 21 p. (2024). MSC: 06E30 11T06 94A60 PDFBibTeX XMLCite \textit{Z. Zha} and \textit{L. Hu}, Finite Fields Appl. 98, Article ID 102471, 21 p. (2024; Zbl 07905718) Full Text: DOI
El Hamam, Moha Ben Taleb; Chillali, Abdelhakim; El Fadil, Lhoussain Classification of the elements of the twisted Hessian curves in the ring \(\mathbb{F}_q[e]\), \(e^3=e^2\). (English) Zbl 07905420 Bol. Soc. Parana. Mat. (3) 42, Paper No. 141, 8 p. (2024). MSC: 11T71 14G50 94A60 PDFBibTeX XMLCite \textit{M. B. T. El Hamam} et al., Bol. Soc. Parana. Mat. (3) 42, Paper No. 141, 8 p. (2024; Zbl 07905420) Full Text: DOI
Chillali, Abdelhakim; Grini, Abdelâli; Elhamam, Moha Ben Taleb Twisted Hessian curve over a local ring. (English) Zbl 07905314 Bol. Soc. Parana. Mat. (3) 42, Paper No. 35, 10 p. (2024). MSC: 11T71 14G50 94A60 PDFBibTeX XMLCite \textit{A. Chillali} et al., Bol. Soc. Parana. Mat. (3) 42, Paper No. 35, 10 p. (2024; Zbl 07905314) Full Text: DOI
Smart, Nigel P. Practical and efficient FHE-based MPC. (English) Zbl 07904524 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 263-283 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{N. P. Smart}, Lect. Notes Comput. Sci. 14421, 263--283 (2024; Zbl 07904524) Full Text: DOI
Melloni, Alessandro; Stam, Martijn; Ytrehus, Øyvind Dynamic security aspects of onion routing. (English) Zbl 07904523 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 243-262 (2024). MSC: 94A60 94A15 68P25 68M25 PDFBibTeX XMLCite \textit{A. Melloni} et al., Lect. Notes Comput. Sci. 14421, 243--262 (2024; Zbl 07904523) Full Text: DOI
Atapoor, Shahla Identity-based threshold signatures from isogenies. (English) Zbl 07904522 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 220-240 (2024). MSC: 94A62 94A60 14K02 PDFBibTeX XMLCite \textit{S. Atapoor}, Lect. Notes Comput. Sci. 14421, 220--240 (2024; Zbl 07904522) Full Text: DOI
Ling, Cong; Mendelsohn, Andrew Middle-products of skew polynomials and learning with errors. (English) Zbl 07904521 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 199-219 (2024). MSC: 94A60 68Q12 11H71 11Y16 PDFBibTeX XMLCite \textit{C. Ling} and \textit{A. Mendelsohn}, Lect. Notes Comput. Sci. 14421, 199--219 (2024; Zbl 07904521) Full Text: DOI
Putman, Colin; Martin, Keith M. Selective delegation of attributes in mercurial signature credentials. (English) Zbl 07904520 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 181-196 (2024). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Putman} and \textit{K. M. Martin}, Lect. Notes Comput. Sci. 14421, 181--196 (2024; Zbl 07904520) Full Text: DOI
Kocaman, Sermin; Talibi Alaoui, Younes Efficient secure two party ECDSA. (English) Zbl 07904519 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 161-180 (2024). MSC: 94A62 94A60 14H52 11G07 PDFBibTeX XMLCite \textit{S. Kocaman} and \textit{Y. Talibi Alaoui}, Lect. Notes Comput. Sci. 14421, 161--180 (2024; Zbl 07904519) Full Text: DOI
Braun, Lennart; de Saint Guilhem, Cyprien Delpech; Jadoul, Robin; Orsini, Emmanuela; Smart, Nigel P.; Tanguy, Titouan ZK-for-Z2K: MPC-in-the-head zero-knowledge proofs for \(\mathbb{Z}_{2^k}\). (English) Zbl 07904518 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 137-157 (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Braun} et al., Lect. Notes Comput. Sci. 14421, 137--157 (2024; Zbl 07904518) Full Text: DOI
De Saint Guilhem, Cyprien Delpech; Ebrahimi, Ehsan; van Leeuwen, Barry Zero-knowledge systems from MPC-in-the-head and oblivious transfer. (English) Zbl 07904517 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 120-136 (2024). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. D. De Saint Guilhem} et al., Lect. Notes Comput. Sci. 14421, 120--136 (2024; Zbl 07904517) Full Text: DOI
Do, Xuan-Thanh; Mac, Dang-Truong; Vu, Quoc-Huy zk-SNARKs from codes with rank metrics. (English) Zbl 07904516 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 99-119 (2024). MSC: 94A60 94B99 81P94 PDFBibTeX XMLCite \textit{X.-T. Do} et al., Lect. Notes Comput. Sci. 14421, 99--119 (2024; Zbl 07904516) Full Text: DOI
Zhou, Wenchang; Lu, Jiqiang Rectangle attacks on reduced versions of the FBC block cipher. (English) Zbl 07904515 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 80-95 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Zhou} and \textit{J. Lu}, Lect. Notes Comput. Sci. 14421, 80--95 (2024; Zbl 07904515) Full Text: DOI
Tsuji, Kento; Iwata, Tetsu Feistel ciphers based on a single primitive. (English) Zbl 07904514 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 57-79 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Tsuji} and \textit{T. Iwata}, Lect. Notes Comput. Sci. 14421, 57--79 (2024; Zbl 07904514) Full Text: DOI
Esser, Andre Revisiting nearest-neighbor-based information set decoding. (English) Zbl 07904513 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 34-54 (2024). MSC: 94B35 94B05 94A60 PDFBibTeX XMLCite \textit{A. Esser}, Lect. Notes Comput. Sci. 14421, 34--54 (2024; Zbl 07904513) Full Text: DOI
Carlet, Claude; Feukoua, Serge; Sălăgean, Ana Coset leaders of the first order Reed-Muller codes in the classes of Niho functions and threshold functions. (English) Zbl 07904512 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 17-33 (2024). MSC: 94B05 94D10 94A60 PDFBibTeX XMLCite \textit{C. Carlet} et al., Lect. Notes Comput. Sci. 14421, 17--33 (2024; Zbl 07904512) Full Text: DOI
Burle, Étienne; Otmani, Ayoub An upper-bound on the decoding failure probability of the LRPC decoder. (English) Zbl 07904511 Quaglia, Elizabeth A. (ed.), Cryptography and coding. 19th IMA international conference, IMACC 2023, London, UK, December 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14421, 3-16 (2024). MSC: 94B35 94A60 PDFBibTeX XMLCite \textit{É. Burle} and \textit{A. Otmani}, Lect. Notes Comput. Sci. 14421, 3--16 (2024; Zbl 07904511) Full Text: DOI arXiv
Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi The retracing boomerang attack, with application to reduced-round AES. (English) Zbl 07904201 J. Cryptology 37, No. 3, Paper No. 32, 42 p. (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{O. Dunkelman} et al., J. Cryptology 37, No. 3, Paper No. 32, 42 p. (2024; Zbl 07904201) Full Text: DOI OA License
Fenzi, Giacomo; Moghaddas, Hossein; Ngoc Khanh Nguyen Lattice-based polynomial commitments: towards asymptotic and concrete efficiency. (English) Zbl 07904200 J. Cryptology 37, No. 3, Paper No. 31, 92 p. (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{G. Fenzi} et al., J. Cryptology 37, No. 3, Paper No. 31, 92 p. (2024; Zbl 07904200) Full Text: DOI OA License
Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan; Weiss, Mor The price of active security in cryptographic protocols. (English) Zbl 07904199 J. Cryptology 37, No. 3, Paper No. 30, 53 p. (2024). MSC: 94A60 94A62 68N20 PDFBibTeX XMLCite \textit{C. Hazay} et al., J. Cryptology 37, No. 3, Paper No. 30, 53 p. (2024; Zbl 07904199) Full Text: DOI OA License
Derler, David; Samelin, Kai; Slamanig, Daniel Bringing order to chaos: the case of collision-resistant chameleon-hashes. (English) Zbl 07904198 J. Cryptology 37, No. 3, Paper No. 29, 44 p. (2024). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{D. Derler} et al., J. Cryptology 37, No. 3, Paper No. 29, 44 p. (2024; Zbl 07904198) Full Text: DOI OA License
Peikert, Chris; Pepin, Zachary Algebraically structured LWE, revisited. (English) Zbl 07904197 J. Cryptology 37, No. 3, Paper No. 28, 39 p. (2024). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Peikert} and \textit{Z. Pepin}, J. Cryptology 37, No. 3, Paper No. 28, 39 p. (2024; Zbl 07904197) Full Text: DOI
Li, Xiao; Lv, Chang; Pan, Zhizhong A generalized MSST algorithm for counting points of elliptic curves over \(\mathbb{F}_{p^n}\). (English) Zbl 07903380 J. Syst. Sci. Complex. 37, No. 4, 1738-1754 (2024). MSC: 94A60 14H52 11Y16 PDFBibTeX XMLCite \textit{X. Li} et al., J. Syst. Sci. Complex. 37, No. 4, 1738--1754 (2024; Zbl 07903380) Full Text: DOI
Wang, Hongyu; Zheng, Qunxiong; Qi, Wenfeng A Fibonacci view on the Galois NFSR used in Trivium. (English) Zbl 07903360 J. Syst. Sci. Complex. 37, No. 3, 1326-1350 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wang} et al., J. Syst. Sci. Complex. 37, No. 3, 1326--1350 (2024; Zbl 07903360) Full Text: DOI
Liu, Zhen; Pan, Yanbin; Zheng, Jinwei Polynomial-time key-recovery attacks against NTRUReEncrypt from ASIACCS’15. (English) Zbl 07903359 J. Syst. Sci. Complex. 37, No. 3, 1308-1325 (2024). MSC: 94A60 81P94 68Q12 81P68 PDFBibTeX XMLCite \textit{Z. Liu} et al., J. Syst. Sci. Complex. 37, No. 3, 1308--1325 (2024; Zbl 07903359) Full Text: DOI
Belhamra, Mohamed Amine; Souidi, El Mamoun Leveraging linear network error correction for steganographic network codes. (English) Zbl 07902332 J. Franklin Inst. 361, No. 13, Article ID 107010, 22 p. (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{M. A. Belhamra} and \textit{E. M. Souidi}, J. Franklin Inst. 361, No. 13, Article ID 107010, 22 p. (2024; Zbl 07902332) Full Text: DOI
Dong, Le; Zhang, Danxun; Li, Wenya; Wu, Wenling Yoyo attack on 4-round Lai-Massey scheme with secret round functions. (English) Zbl 07900686 Des. Codes Cryptography 92, No. 9, 2655-2684 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Dong} et al., Des. Codes Cryptography 92, No. 9, 2655--2684 (2024; Zbl 07900686) Full Text: DOI
Pasalic, Enes; Bapić, Amar; Zhang, Fengrong; Wei, Yongzhuang Using \(P_\tau\) property for designing bent functions provably outside the completed Maiorana-McFarland class. (English) Zbl 07900685 Des. Codes Cryptography 92, No. 9, 2639-2654 (2024). MSC: 94D10 94A60 PDFBibTeX XMLCite \textit{E. Pasalic} et al., Des. Codes Cryptography 92, No. 9, 2639--2654 (2024; Zbl 07900685) Full Text: DOI OA License
Yang, Bo; He, Kangkang; Zeng, Xiangyong; Xiao, Zibi Symmetric 2-adic complexity of Tang-Gong interleaved sequences from generalized GMW sequence pair. (English) Zbl 07900677 Des. Codes Cryptography 92, No. 9, 2473-2489 (2024). MSC: 94A55 94A60 PDFBibTeX XMLCite \textit{B. Yang} et al., Des. Codes Cryptography 92, No. 9, 2473--2489 (2024; Zbl 07900677) Full Text: DOI
Dong, Xiaoli; Liu, Jun; Wei, Yongzhuang; Gao, Wen; Chen, Jie Meet-in-the-middle attacks on AES with value constraints. (English) Zbl 07900675 Des. Codes Cryptography 92, No. 9, 2423-2449 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Dong} et al., Des. Codes Cryptography 92, No. 9, 2423--2449 (2024; Zbl 07900675) Full Text: DOI
Rosenberger, Gerhard; Schürenberg, Annika; Wienke, Leonard Abstract algebra. With applications to Galois theory, algebraic geometry, representation theory and cryptography. 3rd edition. (English) Zbl 07896645 De Gruyter Graduate. Berlin: De Gruyter (ISBN 978-3-11-113951-7/pbk; 978-3-11-114252-4/ebook). xii, 410 p. (2024). MSC: 00A05 12-01 13-01 16-01 20-01 11T71 94A60 PDFBibTeX XMLCite \textit{G. Rosenberger} et al., Abstract algebra. With applications to Galois theory, algebraic geometry, representation theory and cryptography. 3rd edition. Berlin: De Gruyter (2024; Zbl 07896645) Full Text: DOI
Méaux, Pierrick; Roy, Dibyendu Theoretical differential fault attacks on FLIP and FiLIP. (English) Zbl 07896631 Cryptogr. Commun. 16, No. 4, 721-744 (2024). MSC: 94A60 06E30 94D10 PDFBibTeX XMLCite \textit{P. Méaux} and \textit{D. Roy}, Cryptogr. Commun. 16, No. 4, 721--744 (2024; Zbl 07896631) Full Text: DOI
Wang, Xiao-Juan; Tian, Tian; Qi, Wen-Feng GL-S-NFSR: a new NFSR structure and its period properties. (English) Zbl 07896629 Cryptogr. Commun. 16, No. 4, 679-698 (2024). MSC: 94A55 94A60 PDFBibTeX XMLCite \textit{X.-J. Wang} et al., Cryptogr. Commun. 16, No. 4, 679--698 (2024; Zbl 07896629) Full Text: DOI
Baek, Seungjun; Kim, Giyoon; Kim, Jongsung Preimage attacks on reduced-round Ascon-Xof. (English) Zbl 07896617 Des. Codes Cryptography 92, No. 8, 2197-2217 (2024). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Baek} et al., Des. Codes Cryptography 92, No. 8, 2197--2217 (2024; Zbl 07896617) Full Text: DOI
Guo, Chun; Song, Ling CCA security for contracting (quasi-)Feistel constructions with tight round complexity. (English) Zbl 07896613 Des. Codes Cryptography 92, No. 8, 2103-2129 (2024). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Guo} and \textit{L. Song}, Des. Codes Cryptography 92, No. 8, 2103--2129 (2024; Zbl 07896613) Full Text: DOI
Kansal, Meenakshi; Roy, Animesh; Roy, Dibyendu; Bodapati, Srinivasu; Chattopadhyay, Anupam Priority arbiter PUF: analysis. (English) Zbl 07894668 Discrete Appl. Math. 356, 71-95 (2024). MSC: 68Mxx 94D10 94A60 PDFBibTeX XMLCite \textit{M. Kansal} et al., Discrete Appl. Math. 356, 71--95 (2024; Zbl 07894668) Full Text: DOI
Kalachi, Hervé Talé; Tchatchiem Kamche, Hermann On the rank decoding problem over finite principal ideal rings. (English) Zbl 07893302 Adv. Math. Commun. 18, No. 5, 1492-1513 (2024). MSC: 94B05 94A60 PDFBibTeX XMLCite \textit{H. T. Kalachi} and \textit{H. Tchatchiem Kamche}, Adv. Math. Commun. 18, No. 5, 1492--1513 (2024; Zbl 07893302) Full Text: DOI arXiv
Datta, Nilanjan; Dutta, Avijit; Mancillas-López, Cuauhtemoc LightMAC: fork it and make it faster. (English) Zbl 07893298 Adv. Math. Commun. 18, No. 5, 1406-1441 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Datta} et al., Adv. Math. Commun. 18, No. 5, 1406--1441 (2024; Zbl 07893298) Full Text: DOI
Blanco Chacón, Iván; López-Hernanz, Lorena RLWE/PLWE equivalence for the maximal totally real subextension of the \(2^rpq\)-th cyclotomic field. (English) Zbl 07893294 Adv. Math. Commun. 18, No. 5, 1343-1363 (2024). MSC: 11H71 11R18 11Y16 94A60 PDFBibTeX XMLCite \textit{I. Blanco Chacón} and \textit{L. López-Hernanz}, Adv. Math. Commun. 18, No. 5, 1343--1363 (2024; Zbl 07893294) Full Text: DOI
Xiao, Zibi; Zeng, Xiangyong; Ke, Meijian On the symmetric 2-adic complexity of periodic binary sequences. (English) Zbl 07893291 Adv. Math. Commun. 18, No. 5, 1303-1314 (2024). MSC: 94A55 94A60 PDFBibTeX XMLCite \textit{Z. Xiao} et al., Adv. Math. Commun. 18, No. 5, 1303--1314 (2024; Zbl 07893291) Full Text: DOI
Koblitz, Neal; Samajder, Subhabrata; Sarkar, Palash; Singha, Subhadip Concrete analysis of approximate ideal-SIVP to decision ring-LWE reduction. (English) Zbl 07893288 Adv. Math. Commun. 18, No. 5, 1216-1258 (2024). MSC: 68P25 94A60 81P94 PDFBibTeX XMLCite \textit{N. Koblitz} et al., Adv. Math. Commun. 18, No. 5, 1216--1258 (2024; Zbl 07893288) Full Text: DOI
Dey, Jayashree; Dutta, Ratna Post-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based setting. (English) Zbl 07893286 Adv. Math. Commun. 18, No. 5, 1155-1194 (2024). MSC: 81P94 94A60 94A62 11T71 68P27 PDFBibTeX XMLCite \textit{J. Dey} and \textit{R. Dutta}, Adv. Math. Commun. 18, No. 5, 1155--1194 (2024; Zbl 07893286) Full Text: DOI
Dey, Chandan; Kumar Pandey, Sumit; Roy, Tapabrata; Sarkar, Santanu Differential faultt attack on DEFAULT. (English) Zbl 07893273 Adv. Math. Commun. 18, No. 4, 909-921 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Dey} et al., Adv. Math. Commun. 18, No. 4, 909--921 (2024; Zbl 07893273) Full Text: DOI
Singh, Deep; Bhogta, Pramod; Chawla, Anjali; Paul, Amit Some properties of cryptographic functions from \(\mathbb{Z}^n_2\) to \(\mathbb{Z}_q\). (English) Zbl 07892894 Gaṇita 74, No. 1, 111-120 (2024). MSC: 94A60 06E30 PDFBibTeX XMLCite \textit{D. Singh} et al., Gaṇita 74, No. 1, 111--120 (2024; Zbl 07892894) Full Text: Link
Baldi, Marco; Chiaraluce, Franco; Santini, Paolo SPANSE: combining sparsity with density for efficient one-time code-based digital signatures. (English) Zbl 07888167 J. Algebra Appl. 23, No. 7, Article ID 2550099, 21 p. (2024). MSC: 94A62 94A60 94B25 PDFBibTeX XMLCite \textit{M. Baldi} et al., J. Algebra Appl. 23, No. 7, Article ID 2550099, 21 p. (2024; Zbl 07888167) Full Text: DOI arXiv
Monico, Chris Division in the plactic monoid. (English) Zbl 07888166 J. Algebra Appl. 23, No. 7, Article ID 2550080, 12 p. (2024). MSC: 94A60 20M05 PDFBibTeX XMLCite \textit{C. Monico}, J. Algebra Appl. 23, No. 7, Article ID 2550080, 12 p. (2024; Zbl 07888166) Full Text: DOI
Battarbee, Christopher; Kahrobaei, Delaram; Shahandashti, Siamak F. Semidirect product key exchange: the state of play. (English) Zbl 07888161 J. Algebra Appl. 23, No. 7, Article ID 2550066, 16 p. (2024). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{C. Battarbee} et al., J. Algebra Appl. 23, No. 7, Article ID 2550066, 16 p. (2024; Zbl 07888161) Full Text: DOI arXiv
Maino, Luciano; Mula, Marzio; Pintore, Federico A review of mathematical and computational aspects of CSIDH algorithms. (English) Zbl 07888157 J. Algebra Appl. 23, No. 7, Article ID 2530002, 36 p. (2024). MSC: 94A60 81P94 14H52 14K02 11G05 11Y16 PDFBibTeX XMLCite \textit{L. Maino} et al., J. Algebra Appl. 23, No. 7, Article ID 2530002, 36 p. (2024; Zbl 07888157) Full Text: DOI
Gnilke, Oliver W.; Zumbrägel, Jens Cryptographic group and semigroup actions. (English) Zbl 07888079 J. Algebra Appl. 23, No. 7, Article ID 2530001, 14 p. (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{O. W. Gnilke} and \textit{J. Zumbrägel}, J. Algebra Appl. 23, No. 7, Article ID 2530001, 14 p. (2024; Zbl 07888079) Full Text: DOI arXiv
Deng, Junyong; Liu, Shuai; Qin, Xiaona Watermarking-based remote secure sequential fusion estimation under the event-triggered mechanism. (English) Zbl 07887350 J. Franklin Inst. 361, No. 12, Article ID 106993, 13 p. (2024). MSC: 93E10 93C65 94A60 PDFBibTeX XMLCite \textit{J. Deng} et al., J. Franklin Inst. 361, No. 12, Article ID 106993, 13 p. (2024; Zbl 07887350) Full Text: DOI
Arslan, Hasan; Altoum, Alnour; Zaarour, Mariam Integer representations of classical Weyl groups. (English) Zbl 07886309 Turk. J. Math. 48, No. 3, 377-390 (2024). Reviewer: Egle Bettio (Venezia) MSC: 20F55 94A60 PDFBibTeX XMLCite \textit{H. Arslan} et al., Turk. J. Math. 48, No. 3, 377--390 (2024; Zbl 07886309) Full Text: DOI arXiv
Yakymenko, I.; Karpinski, M.; Shevchuk, R.; Kasianchuk, M. Symmetric encryption algorithms in a polynomial residue number system. (English) Zbl 07886137 J. Appl. Math. 2024, Article ID 4894415, 12 p. (2024). MSC: 94A60 68M07 PDFBibTeX XMLCite \textit{I. Yakymenko} et al., J. Appl. Math. 2024, Article ID 4894415, 12 p. (2024; Zbl 07886137) Full Text: DOI OA License
Sabharwal, Anuradha; Yadav, Pooja; Kumar, Kamal Graph crypto-stego system for securing graph data using association schemes. (English) Zbl 07886132 J. Appl. Math. 2024, Article ID 2084342, 12 p. (2024). MSC: 94A60 05C90 05E30 PDFBibTeX XMLCite \textit{A. Sabharwal} et al., J. Appl. Math. 2024, Article ID 2084342, 12 p. (2024; Zbl 07886132) Full Text: DOI OA License
Kang, Man; Jiao, Lin; Li, Yongqiang; Wang, Mingsheng An iterative correction method for practically LPN solving. (English) Zbl 07885256 Inf. Sci. 679, Article ID 121080, 17 p. (2024). MSC: 94A60 68W50 PDFBibTeX XMLCite \textit{M. Kang} et al., Inf. Sci. 679, Article ID 121080, 17 p. (2024; Zbl 07885256) Full Text: DOI
Chen, Linghui; Wan, Zhiguo; Zhou, Jun; Edmar, Carvajal Roca Ivan An efficient autonomous path proxy re-encryption without pairing for cloud-assisted mHealth. (English) Zbl 07883580 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 411-415 (2024). MSC: 68P25 68M11 94A60 92-XX PDFBibTeX XMLCite \textit{L. Chen} et al., Lect. Notes Comput. Sci. 14527, 411--415 (2024; Zbl 07883580) Full Text: DOI
Zheng, Mengce Partial key exposure attack on common prime RSA. (English) Zbl 07883579 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 407-410 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Zheng}, Lect. Notes Comput. Sci. 14527, 407--410 (2024; Zbl 07883579) Full Text: DOI
Li, Ziyi; Lu, Xianhui; Cheng, Yao; Li, Bao Power of randomness recovery: tighter CCA-secure KEM in the QROM. (English) Zbl 07883578 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 403-406 (2024). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{Z. Li} et al., Lect. Notes Comput. Sci. 14527, 403--406 (2024; Zbl 07883578) Full Text: DOI
Wei, Benqiang; Lu, Xianhui Improved homomorphic evaluation for hash function based on TFHE. (English) Zbl 07883577 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 399-402 (2024). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{B. Wei} and \textit{X. Lu}, Lect. Notes Comput. Sci. 14527, 399--402 (2024; Zbl 07883577) Full Text: DOI
Jiang, Changsong; Xu, Chunxiang; Chen, Kefei An efficient privacy-preserving scheme for weak password collection in Internet of Things. (English) Zbl 07883575 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 389-393 (2024). MSC: 94A62 94A60 68M11 68P25 PDFBibTeX XMLCite \textit{C. Jiang} et al., Lect. Notes Comput. Sci. 14527, 389--393 (2024; Zbl 07883575) Full Text: DOI
Tu, Peiyi; Wang, Xingjun Differential privacy enhanced dynamic searchable symmetric encryption for cloud environments. (English) Zbl 07883574 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 368-386 (2024). MSC: 94A60 68P15 PDFBibTeX XMLCite \textit{P. Tu} and \textit{X. Wang}, Lect. Notes Comput. Sci. 14527, 368--386 (2024; Zbl 07883574) Full Text: DOI
Yang, Husheng; Ma, Sha; Zhou, Pan; Yang, Guiquan; Huang, Qiong Forward secure online/offline key policy attribute-based encryption with keyword search. (English) Zbl 07883573 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 356-367 (2024). MSC: 94A60 68M11 68P25 94A62 PDFBibTeX XMLCite \textit{H. Yang} et al., Lect. Notes Comput. Sci. 14527, 356--367 (2024; Zbl 07883573) Full Text: DOI
Song, Yu; Long, Yu; Xu, Xian; Gu, Dawu FaBFT: flexible asynchronous BFT protocol using DAG. (English) Zbl 07883572 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 343-355 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Song} et al., Lect. Notes Comput. Sci. 14527, 343--355 (2024; Zbl 07883572) Full Text: DOI
Yu, Bo; Shi, Tairong; Dong, Xiaoyang; Shen, Xuan; Luo, Yiyuan; Sun, Bing Quantum attacks: a view of data complexity on offline Simon’s algorithm. (English) Zbl 07883571 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 329-342 (2024). MSC: 81P94 68Q12 94A60 PDFBibTeX XMLCite \textit{B. Yu} et al., Lect. Notes Comput. Sci. 14527, 329--342 (2024; Zbl 07883571) Full Text: DOI
Cheng, Qingfeng; Cao, Jinzheng; Luo, Xiangyang Quantum augmented lattice attack on NTRU with side information. (English) Zbl 07883570 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 317-328 (2024). MSC: 94A60 81P94 68Q12 PDFBibTeX XMLCite \textit{Q. Cheng} et al., Lect. Notes Comput. Sci. 14527, 317--328 (2024; Zbl 07883570) Full Text: DOI
Sun, Xin; Cui, Anran; Chen, Hui; Su, Xingchi A practical multi-candidate voting protocol on quantum blockchain adapted for various Tally principles. (English) Zbl 07883569 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 305-316 (2024). MSC: 91B12 81P68 94A60 PDFBibTeX XMLCite \textit{X. Sun} et al., Lect. Notes Comput. Sci. 14527, 305--316 (2024; Zbl 07883569) Full Text: DOI
Ghosal, Anit Kumar; Chowdhury, Dipanwita Roy Non-malleable codes from leakage resilient cryptographic primitives. (English) Zbl 07883567 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 272-290 (2024). MSC: 94Bxx 94A60 PDFBibTeX XMLCite \textit{A. K. Ghosal} and \textit{D. R. Chowdhury}, Lect. Notes Comput. Sci. 14527, 272--290 (2024; Zbl 07883567) Full Text: DOI
Zhang, Zhuolong; Chen, Shiyao; Wang, Wei; Wang, Meiqin Full round distinguishing and key-recovery attacks on SAND-2. (English) Zbl 07883565 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 230-250 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 14527, 230--250 (2024; Zbl 07883565) Full Text: DOI
Cheng, Qingfeng; Zhao, Chunzhi; Cao, Jinzheng; Wei, Fushan Improved Herrmann-May’s attack with merging variables and lower LLL bound. (English) Zbl 07883564 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 209-229 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{Q. Cheng} et al., Lect. Notes Comput. Sci. 14527, 209--229 (2024; Zbl 07883564) Full Text: DOI
Xu, Zhichao; Xu, Hong; Tan, Lin; Qi, Wenfeng Differential-linear cryptanalysis of round-reduced SPARX-64/128. (English) Zbl 07883563 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 193-208 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Xu} et al., Lect. Notes Comput. Sci. 14527, 193--208 (2024; Zbl 07883563) Full Text: DOI
Li, Huina; Liu, Guozhen; Zhang, Haochen; Tang, Peng; Qiu, Weidong Automatic search of linear structure: applications to Keccak and Ascon. (English) Zbl 07883562 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 172-192 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Li} et al., Lect. Notes Comput. Sci. 14527, 172--192 (2024; Zbl 07883562) Full Text: DOI
Guo, Yi; Shi, Danping; Hu, Lei; Lv, Yin Improved integral cryptanalysis of block ciphers BORON and Khudra. (English) Zbl 07883561 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 153-171 (2024). MSC: 94A60 90C11 90C05 PDFBibTeX XMLCite \textit{Y. Guo} et al., Lect. Notes Comput. Sci. 14527, 153--171 (2024; Zbl 07883561) Full Text: DOI
Gao, Qingguan; Sun, Kaisheng; Dong, Jiankuo; Zheng, Fangyu; Lin, Jingqiang; Ren, Yongjun; Liu, Zhe V-Curve25519: efficient implementation of Curve25519 on RISC-V architecture. (English) Zbl 07883560 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 130-149 (2024). MSC: 68P25 68M11 94A60 PDFBibTeX XMLCite \textit{Q. Gao} et al., Lect. Notes Comput. Sci. 14527, 130--149 (2024; Zbl 07883560) Full Text: DOI
Yang, Hang; Chen, Rongmao; Wang, Qiong; Wu, Zixuan; Peng, Wei Hardware acceleration of NTT-based polynomial multiplication in CRYSTALS-Kyber. (English) Zbl 07883559 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 111-129 (2024). MSC: 94A60 68P25 68M99 81P94 PDFBibTeX XMLCite \textit{H. Yang} et al., Lect. Notes Comput. Sci. 14527, 111--129 (2024; Zbl 07883559) Full Text: DOI
Yang, Hongyu; Wang, Youwei; Zhang, Liang; Hu, Ze; Jiang, Laiwei; Cheng, Xiang An Android malware detection method using better API contextual information. (English) Zbl 07883554 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 24-36 (2024). MSC: 68Nxx 68Txx 94A60 PDFBibTeX XMLCite \textit{H. Yang} et al., Lect. Notes Comput. Sci. 14527, 24--36 (2024; Zbl 07883554) Full Text: DOI
Jiang, Yi; Shi, Chenghui; Ma, Oubo; Tian, Youliang; Ji, Shouling Text laundering: mitigating malicious features through knowledge distillation of large foundation models. (English) Zbl 07883553 Ge, Chunpeng (ed.) et al., Information security and cryptology. 19th international conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023. Revised selected papers. Part II. Singapore: Springer. Lect. Notes Comput. Sci. 14527, 3-23 (2024). MSC: 68Pxx 68T07 94A60 PDFBibTeX XMLCite \textit{Y. Jiang} et al., Lect. Notes Comput. Sci. 14527, 3--23 (2024; Zbl 07883553) Full Text: DOI
Leonardos, Stefanos; Reijsbergen, Daniël; Monnot, Barnabé; Piliouras, Georgios Optimality despite chaos in fee markets. (English) Zbl 07882543 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 346-362 (2024). MSC: 91G99 94A60 PDFBibTeX XMLCite \textit{S. Leonardos} et al., Lect. Notes Comput. Sci. 13951, 346--362 (2024; Zbl 07882543) Full Text: DOI arXiv
Zhang, Yunqi; Bojja Venkatakrishnan, Shaileshh Kadabra: adapting Kademlia for the decentralized web. (English) Zbl 07882542 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 327-345 (2024). MSC: 68Mxx 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Zhang} and \textit{S. Bojja Venkatakrishnan}, Lect. Notes Comput. Sci. 13951, 327--345 (2024; Zbl 07882542) Full Text: DOI arXiv
Tas, Ertem Nusret; Boneh, Dan Cryptoeconomic security for data availability committees. (English) Zbl 07882541 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 310-326 (2024). MSC: 94A60 91B64 PDFBibTeX XMLCite \textit{E. N. Tas} and \textit{D. Boneh}, Lect. Notes Comput. Sci. 13951, 310--326 (2024; Zbl 07882541) Full Text: DOI arXiv
Heimbach, Lioba; Kniep, Quentin; Vonlanthen, Yann; Wattenhofer, Roger Defi and NFTs hinder blockchain scalability. (English) Zbl 07882540 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 291-309 (2024). MSC: 91G99 94A60 PDFBibTeX XMLCite \textit{L. Heimbach} et al., Lect. Notes Comput. Sci. 13951, 291--309 (2024; Zbl 07882540) Full Text: DOI arXiv
Andreina, Sébastien; Alluminio, Lorenzo; Marson, Giorgia Azzurra; Karame, Ghassan Short paper: estimating patch propagation times across blockchain forks. (English) Zbl 07882539 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 276-287 (2024). MSC: 94A60 91B64 PDFBibTeX XMLCite \textit{S. Andreina} et al., Lect. Notes Comput. Sci. 13951, 276--287 (2024; Zbl 07882539) Full Text: DOI arXiv
Shen, Yu; Ersoy, Oğuzhan; Roos, Stefanie Extras and premiums: local PCN routing with redundancy and fees. (English) Zbl 07882530 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 110-127 (2024). MSC: 91G99 94A60 PDFBibTeX XMLCite \textit{Y. Shen} et al., Lect. Notes Comput. Sci. 13951, 110--127 (2024; Zbl 07882530) Full Text: DOI
Ersoy, Oğuzhan; Moreno-Sanchez, Pedro; Roos, Stefanie Get me out of this payment! Bailout: an HTLC re-routing protocol. (English) Zbl 07882529 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 92-109 (2024). MSC: 91G99 94A60 PDFBibTeX XMLCite \textit{O. Ersoy} et al., Lect. Notes Comput. Sci. 13951, 92--109 (2024; Zbl 07882529) Full Text: DOI
Jourenko, Maxim; Larangeira, Mario State machines across isomorphic layer 2 ledgers. (English) Zbl 07882528 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 75-91 (2024). MSC: 91G99 94A60 PDFBibTeX XMLCite \textit{M. Jourenko} and \textit{M. Larangeira}, Lect. Notes Comput. Sci. 13951, 75--91 (2024; Zbl 07882528) Full Text: DOI
Christ, Miranda; Bonneau, Joseph Limits on revocable proof systems, with implications for stateless blockchains. (English) Zbl 07882527 Baldimtsi, Foteini (ed.) et al., Financial cryptography and data security. 27th international conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023. Revised selected papers. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13951, 54-71 (2024). MSC: 94A60 68P05 91B64 PDFBibTeX XMLCite \textit{M. Christ} and \textit{J. Bonneau}, Lect. Notes Comput. Sci. 13951, 54--71 (2024; Zbl 07882527) Full Text: DOI