Accepted Papers

Conference Proceedings

You can temporarily access to conference proceedings through the following link: Africacrypt 2024 Conference Proceedings

Accepted papers

On the Double Differential Uniformity of Vectorial Boolean Functions

Said Eddahmani and Sihem Mesnager

CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness

Sofia Celi, Shai Levin and Joe Rowell

TooLIP: How to Find New Instances of FiLIP Cipher With Smaller Key Size and New Filters

François Gérard, Agnese Gini and Pierrick Méaux

Same Values Analysis Attack on Weierstrass Binary Elliptic Curves

Aubain Jose Mayeukeu and Emmanuel Fouotsa

On the Generalizations of the Rank Metric Over Finite Chain Rings

Hermann Tchatchiem Kamche and Hervé Tale Kalachi

The Cool and the Cruel: Separating Hard Parts of LWE Secrets

Niklas Nolte, Mohamed Mahlou, Emily Wenger, Cathy Li, Samuel Stevens, Francois Charton and Kristin Lauter

Efficient Oblivious Transfer for One-Sided Active Adaptive Adversaries

Isheeta Nargis

DiTRU: A Resurrection of NTRU over Dihedral Group

Ali Raya, Vikas Kumar and Sugata Gangopadhyay

Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy

Yongge Wang and Qutaibah Malluhi

QCCA security of Fujisaki-Okamoto transformation in the Quantum Random Oracle Model

Xu Liu and Mingqiang Wang

iUC-Secure Distributed File Transfer From Standard Attribute-based Encryption

Gael Marcadet, Leo Robert and Pascal Lafourcade

Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs

Anaïs Barthoulot, Olivier Blazy and Sebastien Canard

Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber

Duyên Pay and Francois-Xavier Standaert

Cryptanalysis of a New Variant of the RSA Cryptosystem

Abderrahmane Nitaj, Nurul Nur Hanisah Adenan and Muhammad Rezal Bin Kamel Ariffin

Quasi-Optimal Permutation Ranking and Applications to PERK

Alessandro Budroni, Slim Bettaieb, Marco Palumbi and Décio Luiz Gazzoni Filho

Finding Dense Submodules with Algebraic Lattice Reduction

Alexander Karenin and Elena Kirshanova

Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption

Elena Kirshanova, Chiara Marcolla and Sergi Rovira

Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV

River Moreira Ferreira and Ludovic Perret

Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves

Mónica P. Arenas, Georgios Fotiadis and Elisavet Konstantinou