Selected Areas in Cryptography - SAC 2024
Selected Areas in Cryptography - SAC 2024
31st International Conference, Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers, Part I
Gambs, Sebastien; Eichlseder, Maria
Springer International Publishing AG
04/2025
311
Mole
9783031828515
Pré-lançamento - envio 15 a 20 dias após a sua edição
.- Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification.
.- Simulation Secure Multi-Input Quadratic Functional Encryption.
.- Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples.
.- Multi-Key Homomorphic Encryption with Threshold Re-Encryption.
.- Multi-User Dynamic Searchable Encryption for Prefix-Fixing Predicates
from Symmetric-Key Primitives.
.- Post-Quantum Cryptography.
.- BUFFing FALCON without Increasing the Signature Size.
.- SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks.
.- Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications.
.- Attacks on Public-Key Cryptography.
.- Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA.
.- Multivariate Blind Signatures Revisited.
.- Post-Quantum Backdoor for Kyber-KEM.
.- Identity-based Encryption.
.- Identity-Based Encryption from Lattices with More Compactness in the Standard Model.
.- Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC).
.- Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification.
.- Simulation Secure Multi-Input Quadratic Functional Encryption.
.- Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples.
.- Multi-Key Homomorphic Encryption with Threshold Re-Encryption.
.- Multi-User Dynamic Searchable Encryption for Prefix-Fixing Predicates
from Symmetric-Key Primitives.
.- Post-Quantum Cryptography.
.- BUFFing FALCON without Increasing the Signature Size.
.- SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks.
.- Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications.
.- Attacks on Public-Key Cryptography.
.- Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA.
.- Multivariate Blind Signatures Revisited.
.- Post-Quantum Backdoor for Kyber-KEM.
.- Identity-based Encryption.
.- Identity-Based Encryption from Lattices with More Compactness in the Standard Model.
.- Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC).