Twinkle: Threshold Signatures from DDH with Full Adaptive Security (English)
- New search for: Bacho, Renas
- Further information on Bacho, Renas:
- https://orcid.org/http://orcid.org/0009-0007-7037-2458
- New search for: Loss, Julian
- Further information on Loss, Julian:
- https://orcid.org/http://orcid.org/0000-0002-7979-3810
- New search for: Tessaro, Stefano
- Further information on Tessaro, Stefano:
- https://orcid.org/http://orcid.org/0000-0002-3751-8546
- New search for: Wagner, Benedikt
- Further information on Wagner, Benedikt:
- https://orcid.org/http://orcid.org/0000-0002-4620-7264
- New search for: Zhu, Chenzhi
- Further information on Zhu, Chenzhi:
- https://orcid.org/http://orcid.org/0000-0002-4276-2797
- New search for: Joye, Marc
- Further information on Joye, Marc:
- https://orcid.org/https://orcid.org/0000-0003-4433-2333
- New search for: Leander, Gregor
- Further information on Leander, Gregor:
- https://orcid.org/https://orcid.org/0000-0002-2579-8587
- New search for: Bacho, Renas
- Further information on Bacho, Renas:
- https://orcid.org/http://orcid.org/0009-0007-7037-2458
- New search for: Loss, Julian
- Further information on Loss, Julian:
- https://orcid.org/http://orcid.org/0000-0002-7979-3810
- New search for: Tessaro, Stefano
- Further information on Tessaro, Stefano:
- https://orcid.org/http://orcid.org/0000-0002-3751-8546
- New search for: Wagner, Benedikt
- Further information on Wagner, Benedikt:
- https://orcid.org/http://orcid.org/0000-0002-4620-7264
- New search for: Zhu, Chenzhi
- Further information on Zhu, Chenzhi:
- https://orcid.org/http://orcid.org/0000-0002-4276-2797
In:
Advances in Cryptology – EUROCRYPT 2024
: 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I
;
Chapter: 15
;
429-459
;
2024
- Article/Chapter (Book) / Electronic Resource
-
Title:Twinkle: Threshold Signatures from DDH with Full Adaptive Security
-
Additional title:Lect.Notes Computer
-
Contributors:Joye, Marc ( editor ) / Leander, Gregor ( editor ) / Bacho, Renas ( author ) / Loss, Julian ( author ) / Tessaro, Stefano ( author ) / Wagner, Benedikt ( author ) / Zhu, Chenzhi ( author )
-
Conference:Annual International Conference on the Theory and Applications of Cryptographic Techniques ; 2024 ; Zurich, Switzerland
-
Published in:Advances in Cryptology – EUROCRYPT 2024 : 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I ; Chapter: 15 ; 429-459Lecture Notes in Computer Science ; 14651 ; 429-459
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2024-04-29
-
Size:31 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
SQIsignHD: New Dimensions in CryptographyDartois, Pierrick / Leroux, Antonin / Robert, Damien / Wesolowski, Benjamin et al. | 2024
- 2
-
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier AnalysisDinur, Itai et al. | 2024
- 3
-
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field SigningCorte-Real Santos, Maria / Eriksen, Jonathan Komada / Meyer, Michael / Reijnders, Krijn et al. | 2024
- 4
-
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single PermutationNaito, Yusuke / Sasaki, Yu / Sugawara, Takeshi et al. | 2024
- 5
-
Partial Sums Meet FFT: Improved Attack on 6-Round AESDunkelman, Orr / Ghosh, Shibam / Keller, Nathan / Leurent, Gaëtan / Marmor, Avichai / Mollimard, Victor et al. | 2024
- 6
-
New Records in Collision Attacks on SHA-2Li, Yingxin / Liu, Fukang / Wang, Gaoli et al. | 2024
- 7
-
Improving Linear Key Recovery Attacks Using Walsh Spectrum PuncturingFlórez-Gutiérrez, Antonio / Todo, Yosuke et al. | 2024
- 8
-
A Generic Algorithm for Efficient Key Recovery in Differential Attacks – and its Associated ToolBoura, Christina / David, Nicolas / Derbez, Patrick / Heim Boissier, Rachelle / Naya-Plasencia, María et al. | 2024
- 9
-
Tight Security of TNT and BeyondJha, Ashwin / Khairallah, Mustafa / Nandi, Mridul / Saha, Abishanka et al. | 2024
- 10
-
Improved Differential Meet-in-the-Middle CryptanalysisAhmadian, Zahra / Khalesi, Akram / M’Foukh, Dounia / Moghimi, Hossein / Naya-Plasencia, María et al. | 2024
- 11
-
Post-quantum Security of Tweakable Even-Mansour, and ApplicationsAlagic, Gorjan / Bai, Chen / Katz, Jonathan / Majenz, Christian / Struck, Patrick et al. | 2024
- 12
-
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and BeyondSong, Ling / Yang, Qianqian / Chen, Yincen / Hu, Lei / Weng, Jian et al. | 2024
- 13
-
Massive Superpoly Recovery with a Meet-in-the-Middle FrameworkHe, Jiahui / Hu, Kai / Lei, Hao / Wang, Meiqin et al. | 2024
- 14
-
Diving Deep into the Preimage Security of AES-Like HashingChen, Shiyao / Guo, Jian / List, Eik / Shi, Danping / Zhang, Tianyu et al. | 2024
- 15
-
Twinkle: Threshold Signatures from DDH with Full Adaptive SecurityBacho, Renas / Loss, Julian / Tessaro, Stefano / Wagner, Benedikt / Zhu, Chenzhi et al. | 2024
- 16
-
Toothpicks: More Efficient Fork-Free Two-Round Multi-signaturesPan, Jiaxin / Wagner, Benedikt et al. | 2024