8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3¿6, 2023, Proceedings Herausgegeben:Aly, Abdelrahaman; Tibouchi, Mehdi
8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3¿6, 2023, Proceedings Herausgegeben:Aly, Abdelrahaman; Tibouchi, Mehdi
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
This book constitutes the refereed proceedings of the 8th International Conference on Progress in Cryptology, LATINCRYPT 2023, held in Quito, Ecuador, in October 2023. The 19 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Symmetric-Key Cryptography; Multi-Party Computation; Isogeny-Based Cryptography; Discrete Logarithm Problem; Cryptographic Protocols; Real-World Cryptography; and Zero-Knowledge Proofs.
Symmetric-Key Cryptography.- On the Algebraic Immunity of Weightwise Perfectly Balanced Functions.- ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for High-order Avalanche Tests.- Multi-Party Computation.- On Fully-Secure Honest Majority MPC without n 2 Round Overhead.- Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation.- Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels.- Isogeny-Based Cryptography.- Effective Pairings in Isogeny-based Cryptography.- Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields.- Towards a Quantum-resistant Weak Verifiable Delay Function.- Discrete Logarithm Problem.- Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.- On the Discrete Logarithm Problem in the Ideal Class Group of Multiquadratic Fields.- Cryptographic Protocols.- Stronger Lower Bounds for Leakage-Resilient Secret Sharing.- Folding Schemes with Selective Verification.- Composable Oblivious Pseudo-Random Functions via Garbled Circuits.- Real-World Cryptography.- Quotable Signatures for Authenticating Shared Quotes.- Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments.- Zero-Knowledge Proofs.- Physical Zero-Knowledge Proofs for Five Cells.- Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup.- Set (Non-)Membership NIZKs from Determinantal Accumulators.- Benchmarking the Setup of Updatable zk-SNARKs.
Symmetric-Key Cryptography.- On the Algebraic Immunity of Weightwise Perfectly Balanced Functions.- ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for High-order Avalanche Tests.- Multi-Party Computation.- On Fully-Secure Honest Majority MPC without n 2 Round Overhead.- Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation.- Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels.- Isogeny-Based Cryptography.- Effective Pairings in Isogeny-based Cryptography.- Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields.- Towards a Quantum-resistant Weak Verifiable Delay Function.- Discrete Logarithm Problem.- Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.- On the Discrete Logarithm Problem in the Ideal Class Group of Multiquadratic Fields.- Cryptographic Protocols.- Stronger Lower Bounds for Leakage-Resilient Secret Sharing.- Folding Schemes with Selective Verification.- Composable Oblivious Pseudo-Random Functions via Garbled Circuits.- Real-World Cryptography.- Quotable Signatures for Authenticating Shared Quotes.- Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments.- Zero-Knowledge Proofs.- Physical Zero-Knowledge Proofs for Five Cells.- Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup.- Set (Non-)Membership NIZKs from Determinantal Accumulators.- Benchmarking the Setup of Updatable zk-SNARKs.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497