This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2024, CT-RSA 2024, held in San Francisco, CA, USA, during May 6-9, 2024. The 18 full papers presented in this volume were carefully reviewed and selected from 46 submissions. The conference presents papers on subjects such as public key cryptography; symmetric cryptography; signatures; homomorphic encryption; identity-based encryption; constructions; and threshold signatures and fault attacks.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2024, CT-RSA 2024, held in San Francisco, CA, USA, during May 6-9, 2024.
The 18 full papers presented in this volume were carefully reviewed and selected from 46 submissions. The conference presents papers on subjects such as public key cryptography; symmetric cryptography; signatures; homomorphic encryption; identity-based encryption; constructions; and threshold signatures and fault attacks.
A Public Key Identity-Based Revocation Scheme: Fully Attribute-Hiding and Function Private.- The Security of the Full EDHOC Protocol in the Multi-user Setting.- The Multi-User Security of MACs via Universal Hashing in the Ideal Cipher Model.- Automated-based Rebound Attacks on ACE Permutation.- Batch Signatures, Revisited.- History-Free Sequential Aggregation of Hash-and-Sign Signatures.- TFHE Public-Key Encryption Revisited.- Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption.- The Exact Multi-User Security of 2-Key Triple DES.- Improved Meet-in-the-Middle Attacks on 9-Round AES-192.- Identity-Based Encryption from LWE with More Compact Master Public Key.- Towards Compact Identity-based Encryption on Ideal Lattices.- Attribute-Based Signatures with Advanced Delegation, and Tracing.- Lattice-based Threshold, Accountable, and Private Signature.- Ascon MAC, PRF, and Short-Input PRF.- Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation.- Parameterization of Fault Adversary Models - Connecting Theory and Practice.- Cutting the GRASS: Threshold GRoup Action Signature Schemes.
A Public Key Identity-Based Revocation Scheme: Fully Attribute-Hiding and Function Private.- The Security of the Full EDHOC Protocol in the Multi-user Setting.- The Multi-User Security of MACs via Universal Hashing in the Ideal Cipher Model.- Automated-based Rebound Attacks on ACE Permutation.- Batch Signatures, Revisited.- History-Free Sequential Aggregation of Hash-and-Sign Signatures.- TFHE Public-Key Encryption Revisited.- Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption.- The Exact Multi-User Security of 2-Key Triple DES.- Improved Meet-in-the-Middle Attacks on 9-Round AES-192.- Identity-Based Encryption from LWE with More Compact Master Public Key.- Towards Compact Identity-based Encryption on Ideal Lattices.- Attribute-Based Signatures with Advanced Delegation, and Tracing.- Lattice-based Threshold, Accountable, and Private Signature.- Ascon MAC, PRF, and Short-Input PRF.- Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation.- Parameterization of Fault Adversary Models - Connecting Theory and Practice.- Cutting the GRASS: Threshold GRoup Action Signature Schemes.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826