![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
8th LATINCRYPT 2023: Quito, Ecuador
- Abdelrahaman Aly
, Mehdi Tibouchi
:
Progress in Cryptology - LATINCRYPT 2023 - 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3-6, 2023, Proceedings. Lecture Notes in Computer Science 14168, Springer 2023, ISBN 978-3-031-44468-5
Symmetric-Key Cryptography
- Agnese Gini
, Pierrick Méaux
:
On the Algebraic Immunity of Weightwise Perfectly Balanced Functions. 3-23 - Emanuele Bellini, Juan Grados, Mohamed Rachidi, Nitin Satpute, Joan Daemen, Solane El Hirch:
ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for (High-order) Avalanche Tests. 24-43
Multi-party Computation
- Daniel Escudero, Serge Fehr:
On Fully-Secure Honest Majority MPC Without n2 Round Overhead. 47-66 - Hernán Vanegas, Daniel Cabarcas, Diego F. Aranha
:
Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation. 67-86 - Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. 87-106
Isogeny-Based Cryptography
- Krijn Reijnders:
Effective Pairings in Isogeny-Based Cryptography. 109-128 - Gustavo Banegas, Valerie Gilchrist, Anaëlle Le Dévéhat, Benjamin Smith:
Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields. 129-148 - Thomas Decru, Luciano Maino, Antonio Sanso:
Towards a Quantum-Resistant Weak Verifiable Delay Function. 149-168
Discrete Logarithm Problem
- Kohei Nakagawa, Atsushi Fujioka, Akira Nagai, Junichi Tomida, Keita Xagawa
, Kan Yasuda:
Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable. 171-191 - Semyon A. Novoselov:
On the Discrete Logarithm Problem in the Ideal Class Group of Multiquadratic Fields. 192-211
Cryptographic Protocols
- Charlotte Hoffmann
, Mark Simkin
:
Stronger Lower Bounds for Leakage-Resilient Secret Sharing. 215-228 - Carla Ràfols
, Alexandros Zacharakis
:
Folding Schemes with Selective Verification. 229-248 - Sebastian H. Faller
, Astrid Ottenhues
, Johannes Ottenhues
:
Composable Oblivious Pseudo-random Functions via Garbled Circuits. 249-270
Real-World Cryptography
- Joan Boyar
, Simon Erfurth
, Kim S. Larsen
, Ruben Niederhagen:
Quotable Signatures for Authenticating Shared Quotes. 273-292 - Alexandre Augusto Giron
, João Pedro Adami do Nascimento, Ricardo Custódio, Lucas Pandolfo Perin
, Víctor Mateu
:
Post-quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments. 293-312
Zero-Knowledge Proofs
- Suthee Ruangwises
:
Physical Zero-Knowledge Proofs for Five Cells. 315-330 - Matteo Campanelli
, Nicolas Gailly, Rosario Gennaro, Philipp Jovanovic, Mara Mihali, Justin Thaler:
sfTestudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup. 331-351 - Helger Lipmaa, Roberto Parisella:
Set (Non-)Membership NIZKs from Determinantal Accumulators. 352-374 - Karim Baghery
, Axel Mertens
, Mahdi Sedaghat
:
Benchmarking the Setup of Updatable Zk-SNARKs. 375-396
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.