


default search action
29th ASIACRYPT 2023: Guangzhou, China - Part VI
- Jian Guo
, Ron Steinfeld
:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part VI. Lecture Notes in Computer Science 14443, Springer 2023, ISBN 978-981-99-8735-1
Homomorphic Encryption
- Antonio Guimarães
, Hilder V. L. Pereira
, Barry Van Leeuwen
:
Amortized Bootstrapping Revisited: Simpler, Asymptotically-Faster, Implemented. 3-35 - Joon-Woo Lee, Eunsang Lee, Young-Sik Kim, Jong-Seon No:
Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption. 36-68 - Hiroki Okada, Rachel Player, Simon Pohmann:
Homomorphic Polynomial Evaluation Using Galois Structure and Applications to BFV Bootstrapping. 69-100 - Zeyu Liu, Yunhao Wang:
Amortized Functional Bootstrapping in Less than 7 ms, with Õ(1) Polynomial Multiplications. 101-132
Encryption with Special Functionalities
- Yi Wang
, Rongmao Chen
, Xinyi Huang
, Moti Yung
:
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions. 135-167 - Long Chen, Hui Guo, Ya-Nan Li, Qiang Tang:
Efficient Secure Storage with Version Control and Key Rotation. 168-198 - Yunxiao Zhou, Shengli Liu
, Shuai Han
, Haibin Zhang
:
Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWE. 199-231 - Ghous Amjad, Seny Kamara, Tarik Moataz:
Injection-Secure Structured and Searchable Symmetric Encryption. 232-262 - Brice Minaud, Michael Reichle:
Hermes: I/O-Efficient Forward-Secure Searchable Symmetric Encryption. 263-294
Security Proofs and Security Models
- Nina Bindel
, Nicolas Gama
, Sandra Guasch, Eyal Ronen
:
To Attest or Not to Attest, This is the Question - Provable Attestation in FIDO2. 297-328 - Joël Alwen, Jonas Janneck
, Eike Kiltz
, Benjamin Lipp
:
The Pre-Shared Key Modes of HPKE. 329-360 - Shun Watanabe
, Kenji Yasunaga
:
Unified View for Notions of Bit Security. 361-389 - Cong Zhang, Mark Zhandry:
The Relationship Between Idealized Models Under Computationally Bounded Adversaries. 390-419 - Srinivasan Raghuraman
, Yibin Yang
:
Just How Fair is an Unreactive World? 420-450

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.