CT-RSA 2024

The Cryptographers' Track at RSA Conference
San Francisco, California, USA • May 6–9, 2024

The full program is now available via the main RSAC website, please go here
Paper Information Accepted Papers

Paper Title : The Multi-User Security of MACs via Universal Hashing in the Ideal Cipher Model

Author : Yusuke Naito


Paper Title : The Exact Multi-User Security of 2-Key Triple DES

Authors: Yusuke Naito , Yu Sasaki , Takeshi Sugawara , Yusuke Naito , Yu Sasaki


Paper Title : Batch Signatures, Revisited

Authors: Carlos Aguilar-Melchor , Martin R. Albrecht , Thomas Bailleux, Nina Bindel , James Howe , Andreas Huelsing David Joseph , Marc Manzano , David Joseph


Paper Title : Computational Security Analysis of the Full EDHOC Protocol

Author : Loic Ferreira


Paper Title : Cutting the GRASS: Threshold Group Action Signature Schemes;

Authors: Michele Battagliola , Giacomo Borin , Alessio Meneghetti , Edoardo Persichetti , Giacomo Borin


Paper Title: History-Free Sequential Aggregation of Hash-and-Sign Signatures

Authors: Alessio Meneghetti , Edoardo Signorini


Paper Title : Automated-based Rebound Attacks on ACE Permutation

Authors: Jiali Shi , Guoqiang Liu , Chao Li , Yingxin Li


Paper Title : Identity-Based Encryption from LWE with More Compact Master Public Key

Author : Parhat Abla


Paper Title : Towards Compact Identity-based Encryption on Ideal Lattices

Authors: Huiwen Jia , Yupu Hu , Chunming Tang , Lin Wang


Paper Title : Attribute-Based Signatures with Advanced Delegation, and Tracing

Authors: Lénaïck Gouriou , David Pointcheval , Cécile Delerablée


Paper Title : Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher

Authors: Jiqiang Lu , Wenchang Zhou


Paper Title : Interactive Oracle Arguments in the QROM and Applications to Succinct Verification of Quantum Computation

Author : Islam Faisal


Paper Title : Ascon MAC, PRF, and Short-Input PRF

Authors: Maria Eichlseder , Christoph Dobraunig ,,Florian Mendel , Martin Schläffer


Paper Title : SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice

Authors: Dilara Toprakhisar , Svetla Nikova , Ventzislav Nikov


Paper Title : TFHE Public-Key Encryption Revisited

Author : Marc Joye


Paper Title : Lattice-based Threshold, Accountable, and Private Signature

Authors: Yingfei Yan , Yongjun Zhao , Wen Gao , Baocang Wang


Paper Title : A Public Key Identity-Based Revocation Scheme: Fully Attribute-Hiding and Function Private

Authors: Sayantan Mukherjee , Olivier Blazy


Paper Title : Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption

Author : Tabitha Ogilvie