Drucker, Nir; Moshkowich, Guy; Pelleg, Tomer; Shaul, Hayim BLEACH: cleaning errors in discrete computations over CKKS. (English) Zbl 07768550 J. Cryptology 37, No. 1, Paper No. 3, 35 p. (2024). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{N. Drucker} et al., J. Cryptology 37, No. 1, Paper No. 3, 35 p. (2024; Zbl 07768550) Full Text: DOI
Boyle, Elette; Cohen, Ran; Goel, Aarushi Breaking the \(O(\sqrt{n})\)-bit barrier: byzantine agreement with polylog bits per party. (English) Zbl 07768549 J. Cryptology 37, No. 1, Paper No. 2, 81 p. (2024). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{E. Boyle} et al., J. Cryptology 37, No. 1, Paper No. 2, 81 p. (2024; Zbl 07768549) Full Text: DOI arXiv
Ishai, Yuval; Korb, Alexis; Lou, Paul; Sahai, Amit Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation. (English) Zbl 07768548 J. Cryptology 37, No. 1, Paper No. 1, 74 p. (2024). MSC: 94A60 94A62 94A05 PDF BibTeX XML Cite \textit{Y. Ishai} et al., J. Cryptology 37, No. 1, Paper No. 1, 74 p. (2024; Zbl 07768548) Full Text: DOI OA License
Ha, Guanxiong; Jia, Chunfu; Ge, Xiaowei; Yuan, Jiawei; Chen, Hang; Li, Mingyue Efficient and anonymous password-hardened encryption services. (English) Zbl 07764384 Inf. Sci. 653, Article ID 119771, 16 p. (2024). MSC: 94A62 94A60 68P25 PDF BibTeX XML Cite \textit{G. Ha} et al., Inf. Sci. 653, Article ID 119771, 16 p. (2024; Zbl 07764384) Full Text: DOI
Tan, Chik How; Prabowo, Theo Fanuela A new key recovery attack on a code-based signature from the Lyubashevsky framework. (English) Zbl 07749683 Inf. Process. Lett. 183, Article ID 106422, 7 p. (2024). MSC: 68Qxx PDF BibTeX XML Cite \textit{C. H. Tan} and \textit{T. F. Prabowo}, Inf. Process. Lett. 183, Article ID 106422, 7 p. (2024; Zbl 07749683) Full Text: DOI
Park, Je Hong; Kim, Woo-Hwan Security weakness of a certificate-based proxy signature scheme for IIoT environments. (English) Zbl 07749676 Inf. Process. Lett. 183, Article ID 106406, 5 p. (2024). MSC: 68Qxx PDF BibTeX XML Cite \textit{J. H. Park} and \textit{W.-H. Kim}, Inf. Process. Lett. 183, Article ID 106406, 5 p. (2024; Zbl 07749676) Full Text: DOI
Liénardy, Jean; Lafitte, Frédéric A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality. (English) Zbl 07749674 Inf. Process. Lett. 183, Article ID 106404, 6 p. (2024). MSC: 68Qxx PDF BibTeX XML Cite \textit{J. Liénardy} and \textit{F. Lafitte}, Inf. Process. Lett. 183, Article ID 106404, 6 p. (2024; Zbl 07749674) Full Text: DOI
Sherali, Fairouz A new approach for enhancing AES-based data encryption using ECC. (English) Zbl 07748122 Int. J. Math. Comput. Sci. 19, No. 1, 229-235 (2024). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{F. Sherali}, Int. J. Math. Comput. Sci. 19, No. 1, 229--235 (2024; Zbl 07748122) Full Text: Link
Ajeena, Ruma Kareem K. A proposed modification of Diffie-Hellman key exchange based on integer matrices. (English) Zbl 07748120 Int. J. Math. Comput. Sci. 19, No. 1, 211-218 (2024). MSC: 94A60 15-XX 15Bxx PDF BibTeX XML Cite \textit{R. K. K. Ajeena}, Int. J. Math. Comput. Sci. 19, No. 1, 211--218 (2024; Zbl 07748120) Full Text: Link
Abbas, Baneen Najah; Yassein, Hassan Rashed A high-security encryption based on hexadecnion polynomials. (English) Zbl 07748095 Int. J. Math. Comput. Sci. 19, No. 1, 37-40 (2024). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{B. N. Abbas} and \textit{H. R. Yassein}, Int. J. Math. Comput. Sci. 19, No. 1, 37--40 (2024; Zbl 07748095) Full Text: Link
Fadeel, Abbas Chichan; Yassein, Hassan Rashed HAQTR: NTRU-like public key. (English) Zbl 07748091 Int. J. Math. Comput. Sci. 19, No. 1, 1-4 (2024). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{A. C. Fadeel} and \textit{H. R. Yassein}, Int. J. Math. Comput. Sci. 19, No. 1, 1--4 (2024; Zbl 07748091) Full Text: Link
Akleylek, Sedat (ed.); Dundua, Besik (ed.) Handbook of formal analysis and verification in cryptography. (English) Zbl 07739837 Prospects in Pure and Applied Mathematics. Boca Raton, FL: CRC Press (ISBN 978-0-367-54665-6/hbk; 978-0-367-54666-3/pbk; 978-1-003-09005-2/ebook). xv, 428 p. (2024). MSC: 94-00 94A60 00B15 PDF BibTeX XML Cite \textit{S. Akleylek} (ed.) and \textit{B. Dundua} (ed.), Handbook of formal analysis and verification in cryptography. Boca Raton, FL: CRC Press (2024; Zbl 07739837) Full Text: DOI
Koukouvinos, Christos; Simos, Dimitrios E.; Georgiou, Stelios Combinatorial designs. With applications to coding theory and cryptography (to appear). (English) Zbl 06333849 De Gruyter Series in Discrete Mathematics and Applications 3. Berlin: De Gruyter (ISBN 978-3-11-029408-8/hbk; 978-3-11-029434-7/ebook). 520 p. (2024). MSC: 05-02 94-02 05B30 94A60 94B25 PDF BibTeX XML Cite \textit{C. Koukouvinos} et al., Combinatorial designs. With applications to coding theory and cryptography (to appear). Berlin: De Gruyter (2024; Zbl 06333849)
Bouscatié, Élie; Castagnos, Guilhem; Sanders, Olivier Pattern matching in encrypted stream from inner product encryption. (English) Zbl 07770275 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 774-801 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{É. Bouscatié} et al., Lect. Notes Comput. Sci. 13940, 774--801 (2023; Zbl 07770275) Full Text: DOI
Benz, Laurin; Beskorovajnov, Wasilij; Eilebrecht, Sarai; Müller-Quade, Jörn; Ottenhues, Astrid; Schwerdt, Rebecca Sender-binding key encapsulation. (English) Zbl 07770274 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 744-773 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Benz} et al., Lect. Notes Comput. Sci. 13940, 744--773 (2023; Zbl 07770274) Full Text: DOI
Roy, Lawrence; Xu, Jiayu A universally composable PAKE with zero communication cost. (And why it shouldn’t be considered UC-secure). (English) Zbl 07770273 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 714-743 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Roy} and \textit{J. Xu}, Lect. Notes Comput. Sci. 13940, 714--743 (2023; Zbl 07770273) Full Text: DOI
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu EKE meets tight security in the universally composable framework. (English) Zbl 07770272 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 685-713 (2023). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{X. Liu} et al., Lect. Notes Comput. Sci. 13940, 685--713 (2023; Zbl 07770272) Full Text: DOI
Venema, Marloes; Alpár, Greg GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs. (English) Zbl 07770271 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 652-682 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Venema} and \textit{G. Alpár}, Lect. Notes Comput. Sci. 13940, 652--682 (2023; Zbl 07770271) Full Text: DOI
Shi, Elaine; Vanjani, Nikhil Multi-client inner product encryption: function-hiding instantiations without random oracles. (English) Zbl 07770270 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 622-651 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{E. Shi} and \textit{N. Vanjani}, Lect. Notes Comput. Sci. 13940, 622--651 (2023; Zbl 07770270) Full Text: DOI
Datta, Pratish; Pal, Tapas Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded. (English) Zbl 07770269 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 587-621 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Datta} and \textit{T. Pal}, Lect. Notes Comput. Sci. 13940, 587--621 (2023; Zbl 07770269) Full Text: DOI
Srinivasan, Shravan; Loss, Julian; Malavolta, Giulio; Nayak, Kartik; Papamanthou, Charalampos; Thyagarajan, Sri AravindaKrishnan Transparent batchable time-lock puzzles and applications to Byzantine consensus. (English) Zbl 07770268 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 554-584 (2023). MSC: 68P25 68N20 94A60 PDF BibTeX XML Cite \textit{S. Srinivasan} et al., Lect. Notes Comput. Sci. 13940, 554--584 (2023; Zbl 07770268) Full Text: DOI
Hoffmann, Charlotte; Hubáček, Pavel; Kamath, Chethan; Pietrzak, Krzysztof Certifying giant nonprimes. (English) Zbl 07770267 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 530-553 (2023). MSC: 11Axx 94A60 PDF BibTeX XML Cite \textit{C. Hoffmann} et al., Lect. Notes Comput. Sci. 13940, 530--553 (2023; Zbl 07770267) Full Text: DOI
Chvojka, Peter; Jager, Tibor Simple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitments. (English) Zbl 07770266 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 500-529 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Chvojka} and \textit{T. Jager}, Lect. Notes Comput. Sci. 13940, 500--529 (2023; Zbl 07770266) Full Text: DOI
Catalano, Dario; Fiore, Dario; Giunta, Emanuele Efficient and universally composable single secret leader election from pairings. (English) Zbl 07770265 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 471-499 (2023). MSC: 94A62 94A60 68W15 PDF BibTeX XML Cite \textit{D. Catalano} et al., Lect. Notes Comput. Sci. 13940, 471--499 (2023; Zbl 07770265) Full Text: DOI
Baum, Carsten; David, Bernardo; Dowsley, Rafael; Kishore, Ravi; Nielsen, Jesper Buus; Oechsner, Sabine CRAFT: Composable Randomness beacons and output-independent Abort MPC From Time. (English) Zbl 07770264 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 439-470 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Baum} et al., Lect. Notes Comput. Sci. 13940, 439--470 (2023; Zbl 07770264) Full Text: DOI
Duman, Julien; Hartmann, Dominik; Kiltz, Eike; Kunzweiler, Sabrina; Lehmann, Jonas; Riepel, Doreen Generic models for group actions. (English) Zbl 07770263 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 406-435 (2023). MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{J. Duman} et al., Lect. Notes Comput. Sci. 13940, 406--435 (2023; Zbl 07770263) Full Text: DOI
Badrinarayanan, Saikrishna; Masny, Daniel; Mukherjee, Pratyay; Patranabis, Sikhar; Raghuraman, Srinivasan; Sarkar, Pratik Round-optimal oblivious transfer and MPC from computational CSIDH. (English) Zbl 07770262 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 376-405 (2023). MSC: 94A60 68P25 68M14 PDF BibTeX XML Cite \textit{S. Badrinarayanan} et al., Lect. Notes Comput. Sci. 13940, 376--405 (2023; Zbl 07770262) Full Text: DOI
Feo, Luca De; Fouotsa, Tako Boris; Kutas, Péter; Leroux, Antonin; Merz, Simon-Philipp; Panny, Lorenz; Wesolowski, Benjamin SCALLOP: scaling the CSI-FiSh. (English) Zbl 07770261 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 345-375 (2023). MSC: 94A60 81P94 94A62 11G20 14H52 11G05 PDF BibTeX XML Cite \textit{L. De Feo} et al., Lect. Notes Comput. Sci. 13940, 345--375 (2023; Zbl 07770261) Full Text: DOI
Hébant, Chloé; Pointcheval, David; Schädlich, Robert Tracing a linear subspace: application to linearly-homomorphic group signatures. (English) Zbl 07770260 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 312-341 (2023). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{C. Hébant} et al., Lect. Notes Comput. Sci. 13940, 312--341 (2023; Zbl 07770260) Full Text: DOI
Avitabile, Gennaro; Botta, Vincenzo; Fiore, Dario Extendable threshold ring signatures with enhanced anonymity. (English) Zbl 07770259 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 281-311 (2023). MSC: 94A62 94A60 68T20 PDF BibTeX XML Cite \textit{G. Avitabile} et al., Lect. Notes Comput. Sci. 13940, 281--311 (2023; Zbl 07770259) Full Text: DOI
Lysyanskaya, Anna Security analysis of RSA-BSSA. (English) Zbl 07770258 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 251-280 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Lysyanskaya}, Lect. Notes Comput. Sci. 13940, 251--280 (2023; Zbl 07770258) Full Text: DOI
Bellare, Mihir; Davis, Hannah; Di, Zijing Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA. (English) Zbl 07770257 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 223-250 (2023). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{M. Bellare} et al., Lect. Notes Comput. Sci. 13940, 223--250 (2023; Zbl 07770257) Full Text: DOI
Prest, Thomas A key-recovery attack against Mitaka in the \(t\)-probing model. (English) Zbl 07770256 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 205-220 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Prest}, Lect. Notes Comput. Sci. 13940, 205--220 (2023; Zbl 07770256) Full Text: DOI
Ducas, Léo; Gibbons, Shane Hull attacks on the lattice isomorphism problem. (English) Zbl 07770255 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 177-204 (2023). MSC: 94A60 05C60 PDF BibTeX XML Cite \textit{L. Ducas} and \textit{S. Gibbons}, Lect. Notes Comput. Sci. 13940, 177--204 (2023; Zbl 07770255) Full Text: DOI
Heninger, Nadia; Ryan, Keegan The hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applications. (English) Zbl 07770254 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 147-176 (2023). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{N. Heninger} and \textit{K. Ryan}, Lect. Notes Comput. Sci. 13940, 147--176 (2023; Zbl 07770254) Full Text: DOI
Hoffmann, Clément; Libert, Benoît; Momin, Charles; Peters, Thomas; Standaert, François-Xavier POLKA: towards leakage-resistant post-quantum CCA-secure public key encryption. (English) Zbl 07770253 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 114-144 (2023). MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{C. Hoffmann} et al., Lect. Notes Comput. Sci. 13940, 114--144 (2023; Zbl 07770253) Full Text: DOI
Düzlü, Samed; Krämer, Juliane; Pöppelmann, Thomas; Struck, Patrick A lightweight identification protocol based on lattices. (English) Zbl 07770252 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 95-113 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Düzlü} et al., Lect. Notes Comput. Sci. 13940, 95--113 (2023; Zbl 07770252) Full Text: DOI
Duman, Julien; Hövelmanns, Kathrin; Kiltz, Eike; Lyubashevsky, Vadim; Seiler, Gregor; Unruh, Dominique A thorough treatment of highly-efficient NTRU instantiations. (English) Zbl 07770251 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 65-94 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Duman} et al., Lect. Notes Comput. Sci. 13940, 65--94 (2023; Zbl 07770251) Full Text: DOI
Shan, Tianshu; Ge, Jiangxia; Xue, Rui QCCA-secure generic transformations in the quantum random oracle model. (English) Zbl 07770250 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 36-64 (2023). MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{T. Shan} et al., Lect. Notes Comput. Sci. 13940, 36--64 (2023; Zbl 07770250) Full Text: DOI
Maram, Varun; Xagawa, Keita Post-quantum anonymity of Kyber. (English) Zbl 07770249 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 3-35 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Maram} and \textit{K. Xagawa}, Lect. Notes Comput. Sci. 13940, 3--35 (2023; Zbl 07770249) Full Text: DOI
Ganesh, Chaya; Nitulescu, Anca; Soria-Vazquez, Eduardo Rinocchio: SNARKs for ring arithmetic. (English) Zbl 07768547 J. Cryptology 36, No. 4, Paper No. 41, 50 p. (2023). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{C. Ganesh} et al., J. Cryptology 36, No. 4, Paper No. 41, 50 p. (2023; Zbl 07768547) Full Text: DOI
Aragona, Riccardo; Civino, Roberto; Volta, Francesca Dalla On the primitivity of the AES-128 key-schedule. (English) Zbl 07768532 J. Algebra Appl. 22, No. 11, Article ID 2350233, 18 p. (2023). MSC: 94A60 20B15 20B35 PDF BibTeX XML Cite \textit{R. Aragona} et al., J. Algebra Appl. 22, No. 11, Article ID 2350233, 18 p. (2023; Zbl 07768532) Full Text: DOI arXiv
Li, Qiang; Zheng, Qun-xiong; Qi, Wen-feng Practical attacks on small private exponent RSA: new records and new insights. (English) Zbl 07768332 Des. Codes Cryptography 91, No. 12, 4107-4142 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{Q. Li} et al., Des. Codes Cryptography 91, No. 12, 4107--4142 (2023; Zbl 07768332) Full Text: DOI
Al Aswad, Haetham; Pierrot, Cécile Individual discrete logarithm with sublattice reduction. (English) Zbl 07768330 Des. Codes Cryptography 91, No. 12, 4059-4091 (2023). MSC: 94A60 11T71 PDF BibTeX XML Cite \textit{H. Al Aswad} and \textit{C. Pierrot}, Des. Codes Cryptography 91, No. 12, 4059--4091 (2023; Zbl 07768330) Full Text: DOI arXiv
Gómez-Torrecillas, José; Lobillo, F. J.; Navarro, Gabriel Skew differential Goppa codes and their application to McEliece cryptosystem. (English) Zbl 07768328 Des. Codes Cryptography 91, No. 12, 3995-4017 (2023). MSC: 94B35 94A60 16S36 PDF BibTeX XML Cite \textit{J. Gómez-Torrecillas} et al., Des. Codes Cryptography 91, No. 12, 3995--4017 (2023; Zbl 07768328) Full Text: DOI arXiv OA License
Liu, Shuangqing Optimal Ferrers diagram rank-metric codes from MRD codes. (English) Zbl 07768327 Des. Codes Cryptography 91, No. 12, 3977-3993 (2023). MSC: 94B25 11T71 PDF BibTeX XML Cite \textit{S. Liu}, Des. Codes Cryptography 91, No. 12, 3977--3993 (2023; Zbl 07768327) Full Text: DOI
Heng, Ziling; Li, Dexiang; Liu, Fenjin Ternary self-orthogonal codes from weakly regular bent functions and their application in LCD codes. (English) Zbl 07768326 Des. Codes Cryptography 91, No. 12, 3953-3976 (2023). MSC: 94B05 11T71 PDF BibTeX XML Cite \textit{Z. Heng} et al., Des. Codes Cryptography 91, No. 12, 3953--3976 (2023; Zbl 07768326) Full Text: DOI
Pang, Binbin; Zhu, Shixin; Yang, Tian; Gao, Jun BCH codes with larger dimensional hull. (English) Zbl 07768325 Des. Codes Cryptography 91, No. 12, 3933-3951 (2023). MSC: 94B05 94B15 11T71 PDF BibTeX XML Cite \textit{B. Pang} et al., Des. Codes Cryptography 91, No. 12, 3933--3951 (2023; Zbl 07768325) Full Text: DOI
Shinagawa, Kazumasa; Eriguchi, Reo; Satake, Shohei; Nuida, Koji Private simultaneous messages based on quadratic residues. (English) Zbl 07768324 Des. Codes Cryptography 91, No. 12, 3915-3932 (2023). MSC: 94A60 11T71 14G50 05C90 05E05 PDF BibTeX XML Cite \textit{K. Shinagawa} et al., Des. Codes Cryptography 91, No. 12, 3915--3932 (2023; Zbl 07768324) Full Text: DOI arXiv OA License
Xie, Xiaofeng; Tian, Tian Structural evaluation of AES-like ciphers against mixture differential cryptanalysis. (English) Zbl 07768322 Des. Codes Cryptography 91, No. 12, 3881-3899 (2023). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{X. Xie} and \textit{T. Tian}, Des. Codes Cryptography 91, No. 12, 3881--3899 (2023; Zbl 07768322) Full Text: DOI
Golalizadeh, Somayyeh; Soltankhah, Nasrin On the fourth weight of generalized Reed-Muller codes. (English) Zbl 07768321 Des. Codes Cryptography 91, No. 12, 3857-3879 (2023). MSC: 11T71 11G25 PDF BibTeX XML Cite \textit{S. Golalizadeh} and \textit{N. Soltankhah}, Des. Codes Cryptography 91, No. 12, 3857--3879 (2023; Zbl 07768321) Full Text: DOI
Samajder, Subhabrata; Sarkar, Palash Another look at key randomisation hypotheses. (English) Zbl 07768320 Des. Codes Cryptography 91, No. 12, 3837-3855 (2023). MSC: 94A60 11T71 PDF BibTeX XML Cite \textit{S. Samajder} and \textit{P. Sarkar}, Des. Codes Cryptography 91, No. 12, 3837--3855 (2023; Zbl 07768320) Full Text: DOI
Shanthini, J.; Sathya, R.; Hari, K. Sri; Paul, A. Christopher IoMT-based data aggregation using quantum learning. (English) Zbl 07767116 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 301-318 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{J. Shanthini} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 301--318 (2023; Zbl 07767116) Full Text: DOI
Kavitha, M. S.; Rao, Ramachandra G.; Sangeetha, K.; Kowshika, A. Mitigating the risk of quantum computing in cyber security era. (English) Zbl 07767115 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 283-300 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{M. S. Kavitha} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 283--300 (2023; Zbl 07767115) Full Text: DOI
Karthik, S.; Parveen, H. Summia; Sabitha, R.; Anuradha, B. Quantum computing-assisted machine learning to improve the prediction of cardiovascular disease in healthcare system. (English) Zbl 07767114 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 265-282 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{S. Karthik} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 265--282 (2023; Zbl 07767114) Full Text: DOI
Prakash, Ayushi; Avasthi, Sandhya; Kumari, Pushpa; Rawat, Mukesh; Garg, Puneet Modern healthcare system: unveiling the possibility of quantum computing in medical and biomedical zones. (English) Zbl 07767113 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 249-263 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{A. Prakash} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 249--263 (2023; Zbl 07767113) Full Text: DOI
Kishor, Kaushal Application of quantum computing for digital forensic investigation. (English) Zbl 07767112 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 231-247 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{K. Kishor}, in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 231--247 (2023; Zbl 07767112) Full Text: DOI
Sreelatha, P.; Purohit, Nitin; Sekaran, S. Chandra RSA security implementation in quantum computing for a higher resilience. (English) Zbl 07767111 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 219-229 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{P. Sreelatha} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 219--229 (2023; Zbl 07767111) Full Text: DOI
Sudhakar, Annapantula; Murthy, G. R. S.; Thirukumaran, S. Post-quantum cryptography for the detection of injection attacks in small-scale networks. (English) Zbl 07767110 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 207-218 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{A. Sudhakar} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 207--218 (2023; Zbl 07767110) Full Text: DOI
Gupta, Swati; Garg, Puneet Code-based post-quantum cryptographic technique: digital signature. (English) Zbl 07767109 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 193-205 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{S. Gupta} and \textit{P. Garg}, in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 193--205 (2023; Zbl 07767109) Full Text: DOI
Nagpal, Shally; Garg, Puneet; Gaba, Shivani; Aggarwal, Alankrita An improved genetic quantum cryptography model for network communication. (English) Zbl 07767108 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 177-192 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{S. Nagpal} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 177--192 (2023; Zbl 07767108) Full Text: DOI
Kishor, Kaushal Review and significance of cryptography and machine learning in quantum computing. (English) Zbl 07767107 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 159-175 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{K. Kishor}, in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 159--175 (2023; Zbl 07767107) Full Text: DOI
Devi, B. Aruna; Balaji, N. Alangudi; Tesema, Mulugeta A review of different techniques and challenges of quantum computing in various applications. (English) Zbl 07767106 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 147-158 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{B. A. Devi} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 147--158 (2023; Zbl 07767106) Full Text: DOI
Kishor, Kausha Study of quantum computing for data analytics of predictive and prescriptive analytics models. (English) Zbl 07767105 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 121-146 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{K. Kishor}, in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 121--146 (2023; Zbl 07767105) Full Text: DOI
Tiwari, Swati; Yadav, Kamlesh Kumar; Palanikkumar, D. Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes. (English) Zbl 07767104 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 109-119 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{S. Tiwari} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 109--119 (2023; Zbl 07767104) Full Text: DOI
Manisha, Kumari; Chari, V. Dhanunjana; Tesfaye, Leta Jule Intrusion detection framework using quantum computing for mobile cloud computing. (English) Zbl 07767103 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 97-107 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{K. Manisha} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 97--107 (2023; Zbl 07767103) Full Text: DOI
Karthik, S.; Thenmozhi; Bhavadharini, R. M.; Sumathi, T. Quantum transfer learning to detect passive attacks in SDN-IOT. (English) Zbl 07767102 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 79-95 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{S. Karthik} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 79--95 (2023; Zbl 07767102) Full Text: DOI
Virmani, Deepali; Ravishankar, T. Nadana; Tesfayohanis, Mihretab IoT attack detection using quantum deep learning in large-scale networks. (English) Zbl 07767101 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 67-78 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{D. Virmani} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 67--78 (2023; Zbl 07767101) Full Text: DOI
Karthikeyan, N.; Sivaprakash, P.; Periyakaruppan, K.; Shobana, M. Machine learning-based quantum modeling to classify the traffic flow in smart cities. (English) Zbl 07767100 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 49-65 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{N. Karthikeyan} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 49--65 (2023; Zbl 07767100) Full Text: DOI
Kumar, M. Sunil; Harsha, B. K.; Tesfaye, Leta Jule AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network. (English) Zbl 07767099 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 37-47 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{M. S. Kumar} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 37--47 (2023; Zbl 07767099) Full Text: DOI
Menaka, R.; Thenmalar, S.; Saravanan, V. Cyberbullying detection of social network tweets using quantum machine learning. (English) Zbl 07767098 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 25-36 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{R. Menaka} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 25--36 (2023; Zbl 07767098) Full Text: DOI
Thippeswamy, G. R.; Preethi, M. P.; Tasisa, Buli Yohannis Quantum annealing-based routing in UAV network. (English) Zbl 07767097 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 13-24 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{G. R. Thippeswamy} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 13--24 (2023; Zbl 07767097) Full Text: DOI
Mayan, J. Albert; Reddy, G. Swamy; Rao, G. Madhava Optimizing the traffic flow in VANETs using deep quantum annealing. (English) Zbl 07767096 Yadav, Satya Prakash (ed.) et al., Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Quantum Computing. Berlin: De Gruyter. 1-11 (2023). MSC: 81P68 94A60 PDF BibTeX XML Cite \textit{J. A. Mayan} et al., in: Quantum-safe cryptography algorithms and approaches. Impacts of quantum computing on cybersecurity. Berlin: De Gruyter. 1--11 (2023; Zbl 07767096) Full Text: DOI
Campanelli, Matteo; Francati, Danilo; Orlandi, Claudio Structure-preserving compilers from new notions of obfuscations. (English) Zbl 07766997 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 663-693 (2023). MSC: 68N20 68Pxx 94A60 PDF BibTeX XML Cite \textit{M. Campanelli} et al., Lect. Notes Comput. Sci. 13941, 663--693 (2023; Zbl 07766997) Full Text: DOI
Chakraborty, Suvradip; Prabhakaran, Manoj; Wichs, Daniel A map of witness maps: new definitions and connections. (English) Zbl 07766996 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 635-662 (2023). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. Chakraborty} et al., Lect. Notes Comput. Sci. 13941, 635--662 (2023; Zbl 07766996) Full Text: DOI
Döttling, Nico; Gajland, Phillip; Malavolta, Giulio Laconic function evaluation for Turing machines. (English) Zbl 07766995 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 606-634 (2023). MSC: 68Qxx 94A60 PDF BibTeX XML Cite \textit{N. Döttling} et al., Lect. Notes Comput. Sci. 13941, 606--634 (2023; Zbl 07766995) Full Text: DOI
Ghosal, Riddhi; Sahai, Amit; Waters, Brent Non-interactive publicly-verifiable delegation of committed programs. (English) Zbl 07766994 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 575-605 (2023). MSC: 68Pxx 94A60 PDF BibTeX XML Cite \textit{R. Ghosal} et al., Lect. Notes Comput. Sci. 13941, 575--605 (2023; Zbl 07766994) Full Text: DOI
Arun, Arasu; Ganesh, Chaya; Lokam, Satya; Mopuri, Tushar; Sridhar, Sriram Dew: a transparent constant-sized polynomial commitment scheme. (English) Zbl 07766993 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 542-571 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Arun} et al., Lect. Notes Comput. Sci. 13941, 542--571 (2023; Zbl 07766993) Full Text: DOI
Kolonelos, Dimitris; Maller, Mary; Volkhov, Mikhail Zero-knowledge arguments for subverted RSA groups. (English) Zbl 07766992 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 512-541 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{D. Kolonelos} et al., Lect. Notes Comput. Sci. 13941, 512--541 (2023; Zbl 07766992) Full Text: DOI
Liu, Xiangyu; Liu, Shengli; Han, Shuai; Gu, Dawu Fine-grained verifier NIZK and its applications. (English) Zbl 07766991 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 482-511 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{X. Liu} et al., Lect. Notes Comput. Sci. 13941, 482--511 (2023; Zbl 07766991) Full Text: DOI
Fouque, Pierre-Alain; Georgescu, Adela; Qian, Chen; Roux-Langlois, Adeline; Wen, Weiqiang A generic transform from multi-round interactive proof to NIZK. (English) Zbl 07766990 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 461-481 (2023). MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{P.-A. Fouque} et al., Lect. Notes Comput. Sci. 13941, 461--481 (2023; Zbl 07766990) Full Text: DOI
Wang, Geng; Sun, Shi-Feng; Wang, Zhedong; Gu, Dawu Functional encryption against probabilistic queries: definition, construction and applications. (English) Zbl 07766989 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 429-458 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Wang} et al., Lect. Notes Comput. Sci. 13941, 429--458 (2023; Zbl 07766989) Full Text: DOI
Jiang Galteland, Yao; Pan, Jiaxin Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption. (English) Zbl 07766988 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 399-428 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{Y. Jiang Galteland} and \textit{J. Pan}, Lect. Notes Comput. Sci. 13941, 399--428 (2023; Zbl 07766988) Full Text: DOI
Miao, Peihan; Patranabis, Sikhar; Watson, Gaven Unidirectional updatable encryption and proxy re-encryption from DDH. (English) Zbl 07766987 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 368-398 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{P. Miao} et al., Lect. Notes Comput. Sci. 13941, 368--398 (2023; Zbl 07766987) Full Text: DOI
Brunetta, Carlo; Heum, Hans; Stam, Martijn Multi-instance secure public-key encryption. (English) Zbl 07766986 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 336-367 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{C. Brunetta} et al., Lect. Notes Comput. Sci. 13941, 336--367 (2023; Zbl 07766986) Full Text: DOI
Ambrona, Miguel; Gay, Romain Multi-authority ABE for non-monotonic access structures. (English) Zbl 07766985 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 306-335 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Ambrona} and \textit{R. Gay}, Lect. Notes Comput. Sci. 13941, 306--335 (2023; Zbl 07766985) Full Text: DOI
Faonio, Antonio; Hofheinz, Dennis; Russo, Luigi Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption. (English) Zbl 07766984 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 275-305 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Faonio} et al., Lect. Notes Comput. Sci. 13941, 275--305 (2023; Zbl 07766984) Full Text: DOI
Ghosh, Satrajit; Simkin, Mark Threshold private set intersection with better communication complexity. (English) Zbl 07766983 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 251-272 (2023). MSC: 68Q11 94A05 94A60 PDF BibTeX XML Cite \textit{S. Ghosh} and \textit{M. Simkin}, Lect. Notes Comput. Sci. 13941, 251--272 (2023; Zbl 07766983) Full Text: DOI
Couteau, Geoffroy; Ducros, Clément Pseudorandom correlation functions from variable-density LPN, revisited. (English) Zbl 07766982 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 221-250 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Couteau} and \textit{C. Ducros}, Lect. Notes Comput. Sci. 13941, 221--250 (2023; Zbl 07766982) Full Text: DOI
Bui, Dung; Couteau, Geoffroy Improved private set intersection for sets with small entries. (English) Zbl 07766981 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 190-220 (2023). MSC: 68P25 68Mxx 94A60 PDF BibTeX XML Cite \textit{D. Bui} and \textit{G. Couteau}, Lect. Notes Comput. Sci. 13941, 190--220 (2023; Zbl 07766981) Full Text: DOI
Garg, Sanjam; Hajiabadi, Mohammad; Jain, Abhishek; Jin, Zhengzhong; Pandey, Omkant; Shiehian, Sina Credibility in private set membership. (English) Zbl 07766980 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 159-189 (2023). MSC: 94A62 94A60 68P25 68P15 PDF BibTeX XML Cite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 13941, 159--189 (2023; Zbl 07766980) Full Text: DOI
Bhadauria, Rishabh; Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan; Wu, Wenxuan; Zhang, Yupeng Private polynomial commitments and applications to MPC. (English) Zbl 07766979 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 127-158 (2023). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{R. Bhadauria} et al., Lect. Notes Comput. Sci. 13941, 127--158 (2023; Zbl 07766979) Full Text: DOI
Krausz, Markus; Land, Georg; Richter-Brockmann, Jan; Güneysu, Tim A holistic approach towards side-channel secure fixed-weight polynomial sampling. (English) Zbl 07766978 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 94-124 (2023). MSC: 94A60 94A20 81P94 68P25 PDF BibTeX XML Cite \textit{M. Krausz} et al., Lect. Notes Comput. Sci. 13941, 94--124 (2023; Zbl 07766978) Full Text: DOI
Ateniese, Giuseppe; Chen, Long; Francati, Danilo; Papadopoulos, Dimitrios; Tang, Qiang Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting). (English) Zbl 07766977 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 63-93 (2023). MSC: 68Q30 94A60 PDF BibTeX XML Cite \textit{G. Ateniese} et al., Lect. Notes Comput. Sci. 13941, 63--93 (2023; Zbl 07766977) Full Text: DOI
Lee, Kang Hoon; Yoon, Ji Won Discretization error reduction for high precision torus fully homomorphic encryption. (English) Zbl 07766976 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 33-62 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{K. H. Lee} and \textit{J. W. Yoon}, Lect. Notes Comput. Sci. 13941, 33--62 (2023; Zbl 07766976) Full Text: DOI
Attema, Thomas; Capitão, Pedro; Kohl, Lisa On homomorphic secret sharing from polynomial-modulus LWE. (English) Zbl 07766975 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 3-32 (2023). MSC: 94A62 94A60 PDF BibTeX XML Cite \textit{T. Attema} et al., Lect. Notes Comput. Sci. 13941, 3--32 (2023; Zbl 07766975) Full Text: DOI
Agrawal, Shashank; Alpírez Bock, Estuardo; Chen, Yilei; Watson, Gaven White-Box cryptography with global device binding from message-recoverable signatures and token-based obfuscation. (English) Zbl 07766783 Kavun, Elif Bilge (ed.) et al., Constructive side-channel analysis and secure design. 14th international workshop, COSADE 2023, Munich, Germany, April 3–4, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13979, 241-261 (2023). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 13979, 241--261 (2023; Zbl 07766783) Full Text: DOI
Holl, Tobias; Bogad, Katharina; Gruber, Michael Whiteboxgrind – automated analysis of Whitebox cryptography. (English) Zbl 07766782 Kavun, Elif Bilge (ed.) et al., Constructive side-channel analysis and secure design. 14th international workshop, COSADE 2023, Munich, Germany, April 3–4, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13979, 221-240 (2023). MSC: 94A60 PDF BibTeX XML Cite \textit{T. Holl} et al., Lect. Notes Comput. Sci. 13979, 221--240 (2023; Zbl 07766782) Full Text: DOI
Rezaei Shahmirzadi, Aein; Moos, Thorben; Moradi, Amir Energy consumption of protected cryptographic hardware cores. An experimental study. (English) Zbl 07766781 Kavun, Elif Bilge (ed.) et al., Constructive side-channel analysis and secure design. 14th international workshop, COSADE 2023, Munich, Germany, April 3–4, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13979, 195-220 (2023). MSC: 68Pxx 68M11 94A60 PDF BibTeX XML Cite \textit{A. Rezaei Shahmirzadi} et al., Lect. Notes Comput. Sci. 13979, 195--220 (2023; Zbl 07766781) Full Text: DOI
Grosso, Vincent; Cayrel, Pierre-Louis; Colombier, Brice; Drăgoi, Vlad-Florin Punctured syndrome decoding problem. Efficient side-channel attacks against Classic McEliece. (English) Zbl 07766780 Kavun, Elif Bilge (ed.) et al., Constructive side-channel analysis and secure design. 14th international workshop, COSADE 2023, Munich, Germany, April 3–4, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13979, 170-192 (2023). MSC: 94A60 81P94 PDF BibTeX XML Cite \textit{V. Grosso} et al., Lect. Notes Comput. Sci. 13979, 170--192 (2023; Zbl 07766780) Full Text: DOI