default search action
25th PKC 2022: Virtual Event
- Goichiro Hanaoka, Junji Shikata, Yohei Watanabe:
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13177, Springer 2022, ISBN 978-3-030-97120-5
Cryptanalysis
- Jan-Pieter D'Anvers, Senne Batsleer:
Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber. 3-33 - Ehsan Ebrahimi:
Post-quantum Security of Plain OAEP Transform. 34-51 - Pierrick Dartois, Luca De Feo:
On the Security of OSIDH. 52-81 - Pierre Karpman, Charlotte Lefevre:
Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary Codes. 82-111 - Andre Esser, Emanuele Bellini:
Syndrome Decoding Estimator. 112-141 - Tako Boris Fouotsa, Péter Kutas, Simon-Philipp Merz, Yan Bo Ti:
On the Isogeny Problem with Torsion Point Information. 142-161
MPC and Secret Sharing
- James Bartusek, Sanjam Garg, Akshayaram Srinivasan, Yinuo Zhang:
Reusable Two-Round MPC from LPN. 165-193 - Claudio Orlandi, Divya Ravi, Peter Scholl:
On the Bottleneck Complexity of MPC with Correlated Randomness. 194-220 - Damiano Abram, Peter Scholl:
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN. 221-251 - Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song:
Storing and Retrieving Secrets on a Blockchain. 252-282 - Paul Bunn, Eyal Kushilevitz, Rafail Ostrovsky:
CNF-FSS and Its Applications. 283-314
Cryptographic Protocols
- Muhammed F. Esgin, Ron Steinfeld, Raymond K. Zhao:
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications. 317-348 - Yi Liu, Qi Wang, Siu-Ming Yiu:
Making Private Function Evaluation Safer, Faster, and Simpler. 349-378 - Pedro Branco, Nico Döttling, Paulo Mateus:
Two-Round Oblivious Linear Evaluation from Learning with Errors. 379-408 - Aisling Connolly, Pascal Lafourcade, Octavio Perez-Kempner:
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes. 409-438 - Sarasij Maitra, David J. Wu:
Traceable PRFs: Full Collusion Resistance and Active Security. 439-469
Tools
- Hiroshi Onuki, Tomoki Moriya:
Radical Isogenies on Montgomery Curves. 473-497 - Shiduo Zhang, Yang Yu:
Towards a Simpler Lattice Gadget Toolkit. 498-520
SNARKs and NIZKs
- Alan Szepieniec, Yuncong Zhang:
Polynomial IOPs for Linear Algebra Relations. 523-552 - Helger Lipmaa:
A Unified Framework for Non-universal SNARKs. 553-583 - Diego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi:
ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines. 584-614 - Julien Devevey, Benoît Libert, Thomas Peters:
Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model. 615-646
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.