


default search action
44th CRYPTO 2024, Santa Barbara, CA, USA - Part II
- Leonid Reyzin, Douglas Stebila
:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14921, Springer 2024, ISBN 978-3-031-68378-7
Cloud Cryptography
- Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli
, Danilo Francati
, Ioanna Karantaidou:
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation. 3-39 - Matilda Backendal
, Hannah Davis
, Felix Günther
, Miro Haller
, Kenneth G. Paterson
:
A Formal Treatment of End-to-End Encrypted Cloud Storage. 40-74 - Yevgeniy Dodis
, Daniel Jost
, Antonio Marcedone
:
Compact Key Storage - A Modern Approach to Key Backup and Delegation. 75-109
Consensus Protocols
- Marshall Ball, Juan A. Garay, Peter Hall, Aggelos Kiayias, Giorgos Panagiotakos
:
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity. 113-146 - Michele Ciampi
, Aggelos Kiayias, Yu Shen
:
Universal Composable Transaction Serialization with Order Fairness. 147-180
Key Exchange
- Manuel Barbosa
, Kai Gellert, Julia Hesse, Stanislaw Jarecki:
Bare PAKE: Universally Composable Key Exchange from Just Passwords. 183-217 - Jonathan Katz
, Michael Rosenberg
:
LATKE: A Framework for Constructing Identity-Binding PAKEs. 218-250 - Yuyu Wang
, Chuanjie Su
, Jiaxin Pan
:
Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions. 251-285 - Balthazar Bauer, Geoffroy Couteau, Elahe Sadeghi:
Fine-Grained Non-interactive Key Exchange, Revisited. 286-312
Public-Key Encryption
- Shweta Agrawal, Sagnik Saha, Nikolaj I. Schwartzbach
, Akhil Vanukuri
, Prashant Nalini Vasudevan
:
k-SUM in the Sparse Regime: Complexity and Applications. 315-351 - Dario Catalano
, Emanuele Giunta
, Francesco Migliaro
:
Limits of Black-Box Anamorphic Encryption. 352-383 - José Bacelar Almeida
, Santiago Arranz Olmos, Manuel Barbosa
, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet
, Cameron Low, Tiago Oliveira
, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Pierre-Yves Strub:
Formally Verifying Kyber - Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt. 384-421 - Giuseppe Persiano
, Duong Hieu Phan
, Moti Yung:
Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond. 422-455 - Christian Majenz
, Fabrizio Sisinni
:
Provable Security Against Decryption Failure Attacks from LWE. 456-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.