


default search action
30th ASIACRYPT 2024: Kolkata, India - Part III
- Kai-Min Chung
, Yu Sasaki
:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III. Lecture Notes in Computer Science 15486, Springer 2025, ISBN 978-981-96-0890-4
Pairing-Based Cryptography
- Benoît Libert:
Non-malleable Subvector Commitments. 3-32 - Pedro Branco, Russell W. F. Lai
, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Ivy K. Y. Woo
:
Traitor Tracing Without Trusted Authority from Registered Functional Encryption. 33-66
Threshold Cryptography
- Masayuki Abe
, Masaya Nanri, Octavio Perez-Kempner
, Mehdi Tibouchi
:
Interactive Threshold Mercurial Signatures and Applications. 69-103 - Renas Bacho, Julian Loss
, Gilad Stern
, Benedikt Wagner
:
HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures. 104-140 - Offir Friedman, Avichai Marmor, Dolev Mutzari, Yehonatan C. Scaly, Yuval Spiizer, Avishay Yanai:
Tiresias: Large Scale, UC-Secure Threshold Paillier. 141-173 - Stefan Dziembowski
, Stanislaw Jarecki
, Pawel Kedzior
, Hugo Krawczyk
, Chan Nam Ngo
, Jiayu Xu
:
Password-Protected Threshold Signatures. 174-206 - Ehsan Ebrahimi, Anshu Yadav:
Strongly Secure Universal Thresholdizer. 207-239
Isogeny-Based Cryptography
- Hiroshi Onuki
, Kohei Nakagawa:
Ideal-to-Isogeny Algorithm Using 2-Dimensional Isogenies and Its Application to SQIsign. 243-271 - Kohei Nakagawa, Hiroshi Onuki
, Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, Frederik Vercauteren:
SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies. 272-303 - Pierrick Dartois
, Luciano Maino
, Giacomo Pope
, Damien Robert
:
An Algorithmic Approach to (2, 2)-Isogenies in the Theta Model and Applications to Isogeny-Based Cryptography. 304-338 - Andrea Basso
, Pierrick Dartois
, Luca De Feo
, Antonin Leroux
, Luciano Maino
, Giacomo Pope
, Damien Robert
, Benjamin Wesolowski
:
SQIsign2D-West - The Fast, the Small, and the Safer. 339-370 - Joseph Macula
, Katherine E. Stange
:
Extending Class Group Action Attacks via Sesquilinear Pairings. 371-395 - Max Duparc, Tako Boris Fouotsa
:
SQIPrime: A Dimension 2 Variant of SQISignHD with Non-smooth Challenge Isogenies. 396-429
Post-quantum Cryptography
- Biming Zhou, Haodong Jiang, Yunlei Zhao:
CPA-Secure KEMs are also Sufficient for Post-quantum TLS 1.3. 433-464 - Jacqueline Brendel, Sebastian Clermont
, Marc Fischlin:
Post-quantum Asynchronous Remote Key Generation for FIDO2. 465-493

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.