![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
21st TCC 2023: Taipei, Taiwan - Part IV
- Guy N. Rothblum
, Hoeteck Wee:
Theory of Cryptography - 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14372, Springer 2023, ISBN 978-3-031-48623-4
Lattices
- Charles Meyer-Hilfiger, Jean-Pierre Tillich:
Rigorous Foundations for Dual Attacks in Coding Theory. 3-32 - Roman Langrehr
:
On the Multi-user Security of LWE-Based NIKE. 33-62 - Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé, Benjamin Wesolowski:
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals. 63-92 - Prabhanjan Ananth, Alexander Poremba
, Vinod Vaikuntanathan
:
Revocable Cryptography from Learning with Errors. 93-122
Quantum Cryptography
- Amit Behera
, Zvika Brakerski
, Or Sattath
, Omri Shmueli
:
Pseudorandomness with Proof of Destruction and Applications. 125-154 - Céline Chevalier
, Paul Hermouet
, Quoc-Huy Vu
:
Semi-quantum Copy-Protection and More. 155-182 - James Bartusek, Dakshita Khurana, Giulio Malavolta
, Alexander Poremba, Michael Walter:
Weakening Assumptions for Publicly-Verifiable Deletion. 183-197 - Khashayar Barooti, Alex B. Grilo, Loïs Huguenin-Dumittan, Giulio Malavolta
, Or Sattath
, Quoc-Huy Vu
, Michael Walter:
Public-Key Encryption with Quantum Keys. 198-227 - Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Publicly Verifiable Deletion from Minimal Assumptions. 228-245 - Fuyuki Kitagawa, Ryo Nishimaki:
One-Out-of-Many Unclonable Cryptography: Definitions, Constructions, and More. 246-275
Group-Based Cryptography
- Dominik Hartmann
, Eike Kiltz
:
Limits in the Provable Security of ECDSA Signatures. 279-309 - Daniele Cozzo
, Emanuele Giunta
:
Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols. 310-335 - Charlotte Hoffmann
, Pavel Hubácek
, Chethan Kamath, Tomás Krnák
:
(Verifiable) Delay Functions from Lucas Sequences. 336-362 - Helger Lipmaa
, Roberto Parisella
, Janno Siim
:
Algebraic Group Model with Oblivious Sampling. 363-392
Byzantine Agreement, Consensus and Composability
- Julian Loss, Gilad Stern:
Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults. 395-421 - Ran Cohen, Pouyan Forghani, Juan A. Garay, Rutvik Patel, Vassilis Zikas:
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited. 422-451 - Benjamin Y. Chan
, Rafael Pass:
Simplex Consensus: A Simple and Fast Consensus Protocol. 452-479 - Christian Badertscher
, Michele Ciampi
, Aggelos Kiayias:
Agile Cryptography: A Universally Composable Approach. 480-509 - Robin Berger
, Brandon Broadnax, Michael Klooß
, Jeremias Mechler
, Jörn Müller-Quade, Astrid Ottenhues
, Markus Raiber
:
Composable Long-Term Security with Rewinding. 510-541
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.