The Cryptographers' Track at RSA Conference
San Francisco, California, USA • May 6–9, 2024
Paper Title : The Multi-User Security of MACs via Universal Hashing in the Ideal Cipher Model
Author : Yusuke Naito
Paper Title : The Exact Multi-User Security of 2-Key Triple DES
Authors: Yusuke Naito , Yu Sasaki , Takeshi Sugawara , Yusuke Naito , Yu Sasaki
Authors: Carlos Aguilar-Melchor , Martin R. Albrecht , Thomas Bailleux, Nina Bindel , James Howe , Andreas Huelsing David Joseph , Marc Manzano , David Joseph
Paper Title : Computational Security Analysis of the Full EDHOC Protocol
Author : Loic Ferreira
Paper Title : Cutting the GRASS: Threshold Group Action Signature Schemes;
Authors: Michele Battagliola , Giacomo Borin , Alessio Meneghetti , Edoardo Persichetti , Giacomo Borin
Paper Title: History-Free Sequential Aggregation of Hash-and-Sign Signatures
Authors: Alessio Meneghetti , Edoardo Signorini
Paper Title : Automated-based Rebound Attacks on ACE Permutation
Authors: Jiali Shi , Guoqiang Liu , Chao Li , Yingxin Li
Paper Title : Identity-Based Encryption from LWE with More Compact Master Public Key
Author : Parhat Abla
Paper Title : Towards Compact Identity-based Encryption on Ideal Lattices
Authors: Huiwen Jia , Yupu Hu , Chunming Tang , Lin Wang
Paper Title : Attribute-Based Signatures with Advanced Delegation, and Tracing
Authors: Lénaïck Gouriou , David Pointcheval , Cécile Delerablée
Paper Title : Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher
Authors: Jiqiang Lu , Wenchang Zhou
Paper Title : Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation
Author : Islam Faisal
Paper Title : Ascon MAC, PRF, and Short-Input PRF
Authors: Maria Eichlseder , Christoph Dobraunig ,,Florian Mendel , Martin Schläffer
Paper Title : SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice
Authors: Dilara Toprakhisar , Svetla Nikova , Ventzislav Nikov
Paper Title : TFHE Public-Key Encryption Revisited
Author : Marc Joye
Paper Title : Lattice-based Threshold, Accountable, and Private Signature
Authors: Yingfei Yan , Yongjun Zhao , Wen Gao , Baocang Wang
Paper Title : A Public Key Identity-Based Revocation Scheme: Fully Attribute-Hiding and Function Private
Authors: Sayantan Mukherjee , Olivier Blazy
Paper Title : Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption
Author : Tabitha Ogilvie