Accepted Papers

Conference Proceedings

You can temporarily access to conference proceedings through the following link: Africacrypt 2024 Conference Proceedings

Accepted papers

On the Double Differential Uniformity of Vectorial Boolean Functions

Said Eddahmani and Sihem Mesnager


CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness

Sofia Celi, Shai Levin and Joe Rowell


TooLIP: How to Find New Instances of FiLIP Cipher With Smaller Key Size and New Filters

François Gérard, Agnese Gini and Pierrick Méaux


Same Values Analysis Attack on Weierstrass Binary Elliptic Curves

Aubain Jose Mayeukeu and Emmanuel Fouotsa


On the Generalizations of the Rank Metric Over Finite Chain Rings

Hermann Tchatchiem Kamche and Hervé Tale Kalachi


The Cool and the Cruel: Separating Hard Parts of LWE Secrets

Niklas Nolte, Mohamed Mahlou, Emily Wenger, Cathy Li, Samuel Stevens, Francois Charton and Kristin Lauter


Efficient Oblivious Transfer for One-Sided Active Adaptive Adversaries

Isheeta Nargis


DiTRU: A Resurrection of NTRU over Dihedral Group

Ali Raya, Vikas Kumar and Sugata Gangopadhyay


Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy

Yongge Wang and Qutaibah Malluhi


QCCA security of Fujisaki-Okamoto transformation in the Quantum Random Oracle Model

Xu Liu and Mingqiang Wang


iUC-Secure Distributed File Transfer From Standard Attribute-based Encryption

Gael Marcadet, Leo Robert and Pascal Lafourcade


Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs

Anaïs Barthoulot, Olivier Blazy and Sebastien Canard


Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber

Duyên Pay and Francois-Xavier Standaert


Cryptanalysis of a New Variant of the RSA Cryptosystem

Abderrahmane Nitaj, Nurul Nur Hanisah Adenan and Muhammad Rezal Bin Kamel Ariffin


Quasi-Optimal Permutation Ranking and Applications to PERK

Alessandro Budroni, Slim Bettaieb, Marco Palumbi and Décio Luiz Gazzoni Filho


Finding Dense Submodules with Algebraic Lattice Reduction

Alexander Karenin and Elena Kirshanova


Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption

Elena Kirshanova, Chiara Marcolla and Sergi Rovira


Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV

River Moreira Ferreira and Ludovic Perret


Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves

Mónica P. Arenas, Georgios Fotiadis and Elisavet Konstantinou