Accepted Papers
Conference Proceedings
You can temporarily access to conference proceedings through the following link: Africacrypt 2024 Conference Proceedings
Accepted papers
On the Double Differential Uniformity of Vectorial Boolean Functions
Said Eddahmani and Sihem Mesnager
CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness
Sofia Celi, Shai Levin and Joe Rowell
TooLIP: How to Find New Instances of FiLIP Cipher With Smaller Key Size and New Filters
François Gérard, Agnese Gini and Pierrick Méaux
Same Values Analysis Attack on Weierstrass Binary Elliptic Curves
Aubain Jose Mayeukeu and Emmanuel Fouotsa
On the Generalizations of the Rank Metric Over Finite Chain Rings
Hermann Tchatchiem Kamche and Hervé Tale Kalachi
The Cool and the Cruel: Separating Hard Parts of LWE Secrets
Niklas Nolte, Mohamed Mahlou, Emily Wenger, Cathy Li, Samuel Stevens, Francois Charton and Kristin Lauter
Efficient Oblivious Transfer for One-Sided Active Adaptive Adversaries
Isheeta Nargis
DiTRU: A Resurrection of NTRU over Dihedral Group
Ali Raya, Vikas Kumar and Sugata Gangopadhyay
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy
Yongge Wang and Qutaibah Malluhi
QCCA security of Fujisaki-Okamoto transformation in the Quantum Random Oracle Model
Xu Liu and Mingqiang Wang
iUC-Secure Distributed File Transfer From Standard Attribute-based Encryption
Gael Marcadet, Leo Robert and Pascal Lafourcade
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs
Anaïs Barthoulot, Olivier Blazy and Sebastien Canard
Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber
Duyên Pay and Francois-Xavier Standaert
Cryptanalysis of a New Variant of the RSA Cryptosystem
Abderrahmane Nitaj, Nurul Nur Hanisah Adenan and Muhammad Rezal Bin Kamel Ariffin
Quasi-Optimal Permutation Ranking and Applications to PERK
Alessandro Budroni, Slim Bettaieb, Marco Palumbi and Décio Luiz Gazzoni Filho
Finding Dense Submodules with Algebraic Lattice Reduction
Alexander Karenin and Elena Kirshanova
Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption
Elena Kirshanova, Chiara Marcolla and Sergi Rovira
Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV
River Moreira Ferreira and Ludovic Perret
Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves
Mónica P. Arenas, Georgios Fotiadis and Elisavet Konstantinou