


default search action
43rd CRYPTO 2023, Santa Barbara, CA, USA - Part IV
- Helena Handschuh, Anna Lysyanskaya: 
 Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14084, Springer 2023, ISBN 978-3-031-38550-6
Faster Fully Homomorphic Encryption
- Binwu Xiang  , Jiang Zhang , Jiang Zhang , Yi Deng , Yi Deng , Yiran Dai , Yiran Dai , Dengguo Feng , Dengguo Feng : :
 Fast Blind Rotation for Bootstrapping FHEs. 3-36
- Youngjin Bae, Jung Hee Cheon, Jaehyung Kim  , Jai Hyun Park, Damien Stehlé: , Jai Hyun Park, Damien Stehlé:
 HERMES: Efficient Ring Packing Using MLWE Ciphertexts and Application to Transciphering. 37-69
- Miran Kim  , Dongwon Lee , Dongwon Lee , Jinyeong Seo , Jinyeong Seo , Yongsoo Song , Yongsoo Song : :
 Accelerating HE Operations from Key Decomposition Technique. 70-92
Oblivious RAM
- Surya Mathialagan, Neekon Vafa  : :
 MacORAMa: Optimal Oblivious RAM with Integrity. 95-127
- David Heath, Vladimir Kolesnikov, Rafail Ostrovsky: 
 Tri-State Circuits - A Circuit Model that Captures RAM. 128-160
- Giuseppe Persiano  , Kevin Yeo: , Kevin Yeo:
 Limits of Breach-Resistant and Snapshot-Oblivious RAMs. 161-196
- Kevin Yeo: 
 Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications. 197-230
Obfuscation
- Aayush Jain, Huijia Lin, Ji Luo  , Daniel Wichs: , Daniel Wichs:
 The Pseudorandom Oracle Model and Ideal Obfuscation. 233-262
- Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry  : :
 Computational Wiretap Coding from Indistinguishability Obfuscation. 263-293
Secure Messaging
- Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager: 
 On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. 297-329
- Gareth T. Davies, Sebastian H. Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth  , Tibor Jager: , Tibor Jager:
 Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol. 330-361
- Khashayar Barooti, Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan, Serge Vaudenay: 
 On Active Attack Detection in Messaging with Immediate Decryption. 362-395
- Joël Alwen, Marta Mularczyk, Yiannis Tselekounis: 
 Fork-Resilient Continuous Group Key Agreement. 396-429
Functional Encryption
- Jiaxin Guan  , Alexis Korb , Alexis Korb , Amit Sahai: , Amit Sahai:
 Streaming Functional Encryption. 433-463
- Shweta Agrawal, Junichi Tomida, Anshu Yadav: 
 Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums. 464-497
- Cody Freitag, Brent Waters, David J. Wu: 
 How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More. 498-531
- Shweta Agrawal, Mélissa Rossi, Anshu Yadav, Shota Yamada: 
 Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. 532-564
Correlated Pseudorandomness
- Maxime Bombar  , Geoffroy Couteau , Geoffroy Couteau , Alain Couvreur , Alain Couvreur , Clément Ducros , Clément Ducros : :
 Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding. 567-601
- Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy: 
 Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN. 602-632
Proof Systems in the Discrete-Logarithm Setting
- Arka Rai Choudhuri  , Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang: , Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang:
 Correlation Intractability and SNARGs from Sub-exponential DDH. 635-668
- Abhiram Kothapalli, Bryan Parno: 
 Algebraic Reductions of Knowledge. 669-701
- Emanuele Giunta  : :
 On the Impossibility of Algebraic NIZK in Pairing-Free Groups. 702-730
- Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach: 
 A Note on Non-interactive Zero-Knowledge from CDH. 731-764

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














