We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Gene Tree Parsimony in the Presence of Gene Duplication, Loss, and Incomplete Lineage Sorting

    Inferring species trees from multi-locus data needs to account for gene tree discordance due to various biological processes, including incomplete...
    Prottoy Saha, Md. Shamiul Islam, ... Md. Shamsuzzoha Bayzid in Comparative Genomics
    Conference paper 2024
  2. Generating Supersingular Elliptic Curves over  \(\mathbb {F}_p\) with Unknown Endomorphism Ring

    A number of supersingular isogeny based cryptographic protocols require the endomorphism ring of the initial elliptic curve to be either unknown or...
    Youcef Mokrani, David Jao in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  3. PURED: A Unified Framework for Resource-Hard Functions

    Algorithm hardness can be described by 5 categories: hardness in computation, in sequential computation, in memory, in energy consumption (or...
    Alex Biryukov, Marius Lombard-Platet in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  4. Concrete Time/Memory Trade-Offs in Generalised Stern’s ISD Algorithm

    The first contribution of this work is a generalisation of Stern’s information set decoding (ISD) algorithm. Stern’s algorithm, a variant of Stern’s...
    Sreyosi Bhattacharyya, Palash Sarkar in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  5. Patent Landscape in the field of Hash-Based Post-Quantum Signatures

    Post-Quantum Cryptography (PQC) is one of the most fascinating topics of recent developments in cryptography. Following the ongoing standardization...
    Megha Agrawal, Kumar Duraisamy, ... Vishal Saraswat in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  6. Kummer and Hessian Meet in the Field of Characteristic 2

    One can compute scalar multiplication on an ordinary short Weierstrass curve defined over a binary field. Also, one can move to the associated binary...
    Sabyasachi Karati, Gourab Chandra Saha in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  7. Massive Superpoly Recovery with a Meet-in-the-Middle Framework

    The cube attack extracts the information of secret key bits by recovering the coefficient called superpoly in the output bit with respect to a subset...
    Jiahui He, Kai Hu, ... Meiqin Wang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  8. Pauli Manipulation Detection Codes and Applications to Quantum Communication over Adversarial Channels

    We introduce and explicitly construct a quantum error-detection code we coin a “Pauli Manipulation Detection” code (or PMD), which detects every...
    Conference paper 2024
  9. Bootstrap** Bits with CKKS

    The Cheon–Kim–Kim–Song (CKKS) fully homomorphic encryption scheme is designed to efficiently perform computations on real numbers in an encrypted...
    Young** Bae, Jung Hee Cheon, ... Damien Stehlé in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  10. Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions

    An important consideration in the context of distributed ledger protocols is fairness in terms of transaction ordering. Recent work [Crypto 2020]...
    Aggelos Kiayias, Nikos Leonardos, Yu Shen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  11. Leakage-Tolerant Circuits

    A leakage-resilient circuit for \(f:\{0,1\}^n\rightarrow \{0,1\}^m\)...
    Yuval Ishai, Yifan Song in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  12. Symmetric Signcryption and E2EE Group Messaging in Keybase

    We introduce a new cryptographic primitive called symmetric signcryption, which differs from traditional signcryption because the sender and...
    Joseph Jaeger, Akshaya Kumar, Igors Stepanovs in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  13. A Holistic Security Analysis of Monero Transactions

    Monero is a popular cryptocurrency with strong privacy guarantees for users’ transactions. At the heart of Monero’s privacy claims lies a complex...
    Cas Cremers, Julian Loss, Benedikt Wagner in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  14. Pseudorandom Isometries

    We introduce a new notion called \({\mathcal {Q}}\)...
    Prabhanjan Ananth, Aditya Gulati, ... Yao-Ting Lin in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  15. From Random Probing to Noisy Leakages Without Field-Size Dependence

    Side channel attacks are devastating attacks targeting cryptographic implementations. To protect against these attacks, various countermeasures have...
    Gianluca Brian, Stefan Dziembowski, Sebastian Faust in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  16. Fuzzy Private Set Intersection with Large Hyperballs

    Traditional private set intersection (PSI) involves a receiver and a sender holding sets X and Y, respectively, with the receiver learning only the...
    Aron van Baarsen, Sihang Pu in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  17. AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing

    We optimise the verification of the SQIsign signature scheme. By using field extensions in the signing procedure, we are able to significantly...
    Maria Corte-Real Santos, Jonathan Komada Eriksen, ... Krijn Reijnders in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  18. Diving Deep into the Preimage Security of AES-Like Hashing

    Since the seminal works by Sasaki and Aoki, Meet-in-the-Middle (MITM) attacks are recognized as an effective technique for preimage and collision...
    Shiyao Chen, Jian Guo, ... Tianyu Zhang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  19. Accelerating BGV Bootstrap** for Large p Using Null Polynomials over  \(\mathbb {Z}_{p^e}\)

    The BGV scheme is one of the most popular FHE schemes for computing homomorphic integer arithmetic. The bootstrap** technique of BGV is necessary...
    Shihe Ma, Tairong Huang, ... **aoyun Wang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  20. Twinkle: Threshold Signatures from DDH with Full Adaptive Security

    Sparkle is the first threshold signature scheme in the pairing-free discrete logarithm setting (Crites, Komlo, Maller, Crypto 2023) to be proven...
    Renas Bacho, Julian Loss, ... Chenzhi Zhu in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.