DE CIFRIS KOINE
Introduction to CIFRIS24 ACTA
Giulia Cavicchioni, Luca De Feo, Leonardo Errati, Barbara Masucci, Massimiliano Sala
Page range: 2-3
DOI: https://doi.org/10.69091/koine/vol-5-I00
La De Cifris e la crittografia italiana
Barbara Masucci
Page range: 7-8
DOI: https://doi.org/10.69091/koine/vol-5-I01
De Cifris Partners: Athilab
Chiara Ballari
Page range: 9-9
DOI: https://doi.org/10.69091/koine/vol-5-I02
De Cifris Partners: Random Power
Massimo Caccia
Page range: 10-10
DOI: https://doi.org/10.69091/koine/vol-5-I03
De Cifris Partners: ThinkQuantum
Simone Capeleto
Page range: 11-11
DOI: https://doi.org/10.69091/koine/vol-5-I04
De Cifris Partners: FORKBOMB BV
Andrea D'Intino
Page range: 12-12
DOI: https://doi.org/10.69091/koine/vol-5-I05
De Cifris Partners: QTI SRL
Alessandra Matteis
Page range: 13-13
DOI: https://doi.org/10.69091/koine/vol-5-I06
Introduction to the scientific session
Luca De Feo, Barbara Masucci
Page range: 15-16
DOI: https://doi.org/10.69091/koine/vol-5-S01
Quadratic-like balanced functions and permutations
Claude Carlet, Irene Villa
Page range: 18-19
DOI: https://doi.org/10.69091/koine/vol-5-S02
On second-order derivatives of Boolean functions and cubic APN permutations in even dimension
Augustine Musukwa
Page range: 20-22
DOI: https://doi.org/10.69091/koine/vol-5-S03
20 Years of Leakage-Resilient Cryptography
Daniele Venturi
Page range: 24-26
DOI: https://doi.org/10.69091/koine/vol-5-S04
Security Analysis of ZKPoK based on MQ problem in the Multi-Instance Setting
Delaram Kahrobaei, Ludovic Perret, Martina Vigorito
Page range: 27-29
DOI: https://doi.org/10.69091/koine/vol-5-S05
Algorithms for solving the matrix code equivalence problem
Simona Samardjiska
Page range: 31-33
DOI: https://doi.org/10.69091/koine/vol-5-S06
Smaller public-keys for MinRank-based schemes
Antonio J. Di Scala, Carlo Sanna
Page range: 34-36
DOI: https://doi.org/10.69091/koine/vol-5-S07
Investigation of Metabelian Platform Groups for Protocols Based on the (Simultaneous) Conjugacy Search Problem
Delaram Kahrobaei, Carmine Monetta, Ludovic Perret, Maria Tota, Martina Vigorito
Page range: 37-39
DOI: https://doi.org/10.69091/koine/vol-5-S08
First-degree prime ideals of composite extensions
Giordano Santilli, Daniele Taufer
Page range: 41-43
DOI: https://doi.org/10.69091/koine/vol-5-S09
A Novel Related Nonce Attack for ECDSA .
Marco Macchetti, Nils Amiet
Page range: 44-47
DOI: https://doi.org/10.69091/koine/vol-5-S10
Application of Mordell–Weil lattices with large kissing numbers to acceleration of multi-scalar multiplication on elliptic curves
Dmitrii Koshelev
Page range: 48-51
DOI: https://doi.org/10.69091/koine/vol-5-S11
Low Latency Designs: Primitives and Beyond
Gregor Leander
Page range: 53-55
DOI: https://doi.org/10.69091/koine/vol-5-S12
Polynomial functional encryption schemes
Maria Ferrara, Paolo Santonastaso, Antonio Tortora, Ferdinando Zullo
Page range: 56-57
DOI: https://doi.org/10.69091/koine/vol-5-S13
Modern Techniques in Somewhat Homomorphic Encryption Schemes
Massimo Giulietti, Paolo Martinelli, Marco Timpanella
Page range: 58-60
DOI: https://doi.org/10.69091/koine/vol-5-S14
Dynamic-FROST: Schnorr Threshold Signatures with a Flexible Committee
Annalisa Cimatti, Francesco De Sclavis, Giuseppe Galano, Sara Giammusso, Michela Iezzi, Antonio Muci, Matteo Nardelli, Marco Pedicini
Page range: 62-64
DOI: https://doi.org/10.69091/koine/vol-5-S15
BTLE: Atomic Swaps with Time-Lock Puzzles
Barbara Fadi, Enrico Guglielmino, Nadir Murru, Claudio Schifanella
Page range: 65-66
DOI: https://doi.org/10.69091/koine/vol-5-S16
Introduction to FCIR24
Michela Iezzi, Massimiliano Sala
Page range: 69-69
DOI: https://doi.org/10.69091/koine/vol-5-W01
Secure and Private Data Sharing in Financial Institutions
Carsten Maple
Page range: 70-70
DOI: https://doi.org/10.69091/koine/vol-5-W02
Progress on Private Computation
Christian Rechberger
Page range: 71-72
DOI: https://doi.org/10.69091/koine/vol-5-W03
Layer-2 Innovations for Scalable Blockchain Payments
Giuseppe Galano
Page range: 73-75
DOI: https://doi.org/10.69091/koine/vol-5-W04
Decentralized Finance: Labyrinth
Amit Chaudhary
Page range: 76-77
DOI: https://doi.org/10.69091/koine/vol-5-W05
Confidential Knowledge Graphs through Synthetic Augmentation
Luigi Bellomarini, Costanza Catalano, Andrea Coletta, Michela Iezzi
Page range: 78-80
DOI: https://doi.org/10.69091/koine/vol-5-W06
Introduction to ReAdPQC24
Giulio Codogni, Roberto La Scala, Edoardo Persichetti, Federico Pintore
Page range: 82-82
DOI: https://doi.org/10.69091/koine/vol-5-W07
Post-Quantum Signatures from Secure Multiparty Computation
Thibauld Feneuil
Page range: 83-85
DOI: https://doi.org/10.69091/koine/vol-5-W08
The Regular Multivariate Quadratic Problem
Rocco Mora, Antoine Joux
Page range: 86-88
DOI: https://doi.org/10.69091/koine/vol-5-W09
MinRank Attacks in Multivariate Cryptography
Ryann Cartor
Page range: 89-90
DOI: https://doi.org/10.69091/koine/vol-5-W10
Attack-based encryption using isogenies .
Luciano Maino
Page range: 91-93
DOI: https://doi.org/10.69091/koine/vol-5-W11
SQIsign2D-West: The Fast, the Small, and the Safer
Andrea Basso, Pierrick Dartois, Luca De Feo, Antonin Leroux, Luciano Maino, Giacomo Pope, Damien Robert, Benjamin Wesolowski
Page range: 94-96
DOI: https://doi.org/10.69091/koine/vol-5-W12
Introduction to TAC24
Riccardo Longo, Alessandro Tomasi, Chiara Spadafora, Silvio Ranise, Stefano Berlato
Page range: 98-98
DOI: https://doi.org/10.69091/koine/vol-5-W13
Transparency, trust and accountability
Filippo Valsorda
Page range: 99-100
DOI: https://doi.org/10.69091/koine/vol-5-W14
Lova - A Novel Framework for Verifying Mathematical Proofs with Incrementally Verifiable Computation
Noel Elias
Page range: 101-104
DOI: https://doi.org/10.69091/koine/vol-5-W15
Work in progress: HASHTA AI - Share and compute securely your data
Amit Chaudhary
Page range: 105-108
DOI: https://doi.org/10.69091/koine/vol-5-W16
Work in progress: Extensible Decentralized Verifiable Refreshable Secret Sharing Protocol with Extension to Threshold Access Trees for Wallet Key Recovery
Sara Montanari
Page range: 109-111
DOI: https://doi.org/10.69091/koine/vol-5-W17
Improving Security and Performance of Cryptographic Access Control with Trusted Execution Environments
Stefano Berlato
Page range: 112-114
DOI: https://doi.org/10.69091/koine/vol-5-W18
Work in progress: On the combination of Searchable Encryption and Attribute-based encryption
Enrico Sorbera
Page range: 115-117
DOI: https://doi.org/10.69091/koine/vol-5-W19
Introduction to NTC24
Federico Accossato, Gessica Alecci, Danilo Bazzanella, Laura Capuano, Giuseppe D'Alconzo, Simone Dutto, Nadir Murru, Giordano Santilli
Page range: 119-119
DOI: https://doi.org/10.69091/koine/vol-5-W20
Hessians of elliptic curves: isogenies and graphs
Federico Pintore, Marzio Mula, Daniele Taufer
Page range: 120-122
DOI: https://doi.org/10.69091/koine/vol-5-W21
Proving knowledge of an isogeny using modular polynomials
Marzio Mula, T. den Hollander, S. Kleine, Sebastian A. Splinder
Page range: 123-126
DOI: https://doi.org/10.69091/koine/vol-5-W22
Lattices and Cryptography, an Overview
Stefano Barbero
Page range: 127-128
DOI: https://doi.org/10.69091/koine/vol-5-W23
A Note on the P-values Distribution in NIST SP 800-22 Rev. 1a Statistical Tests
Guglielmo Morgari, Vittorio Bagini, Danilo Bazzanella, Alessandro Giacchetto
Page range: 129-131
DOI: https://doi.org/10.69091/koine/vol-5-W24
Introduction to CPSID24
Andrea D'Intino, Denis "Jaromil" Roio
Page range: 133-133
DOI: https://doi.org/10.69091/koine/vol-5-W25
Overview of the current digital identity standards
Andrea D'Intino
Page range: 134-135
DOI: https://doi.org/10.69091/koine/vol-5-W26
Current status of the implementation of the Italian Wallet and Trust Framework Infrastructure .
Francesco Marino
Page range: 136-137
DOI: https://doi.org/10.69091/koine/vol-5-W27
Challenges and upcoming standards
Simone Onofri, Denis Roio
Page range: 138-139
DOI: https://doi.org/10.69091/koine/vol-5-W28
Introduction to SymCrypt
Marco Calderini, George Petrides, Irene Villa
Page range: 141-141
DOI: https://doi.org/10.69091/koine/vol-5-W29
Stream ciphers encoded by difference equations over finite fields and their cryptanalysis
Roberto La Scala
Page range: 142-143
DOI: https://doi.org/10.69091/koine/vol-5-W30
On the computation of the Walsh-Hadamard Transform using Binomial Trees
Luca Mariot
Page range: 144-144
DOI: https://doi.org/10.69091/koine/vol-5-W31
(Cryptographic) Functions for Designing Locally Recoverable Codes in Distributed Storag
Sihem Mesnager
Page range: 145-147
DOI: https://doi.org/10.69091/koine/vol-5-W32
Introduction to CodeMath24
Massimo Giulietti, Giuseppe Marino, Olga Polverino, Ferdinando Zullo
Page range: 149-149
DOI: https://doi.org/10.69091/koine/vol-5-W33
Hadamard products of codes: an Additive Combinatorics perspective
Gilles Zémor
Page range: 150-152
DOI: https://doi.org/10.69091/koine/vol-5-W34
Recent results on scattered spaces and MRD codes
Daniele Bartoli
Page range: 153-153
DOI: https://doi.org/10.69091/koine/vol-5-W35
Cryptographic uses of (polar) Grassmannians
Luca Giuzzi, Ilaria Cardinali
Page range: 154-155
DOI: https://doi.org/10.69091/koine/vol-5-W36
CROSS: a signature scheme with restricted errors
Violetta Weger
Page range: 156-157
DOI: https://doi.org/10.69091/koine/vol-5-W37
Introduction to QCifris24
Paolo Villoresi, Marco Genovese, Fabio Sciarrino, Cristian Antonelli, Giuseppe Vallone
Page range: 159-159
DOI: https://doi.org/10.69091/koine/vol-5-W38
Introduction to Quantum Technologies for secure information from an Italian perspectives Abstract
Paolo Villoresi
Page range: 160-160
DOI: https://doi.org/10.69091/koine/vol-5-W39
Entanglement for quantum key distribution
Fabio Sciarrino
Page range: 161-161
DOI: https://doi.org/10.69091/koine/vol-5-W40
Genuine random numbers from quantum processes for cybersecurity
Giuseppe Vallone
Page range: 162-164
DOI: https://doi.org/10.69091/koine/vol-5-W41
National and European Quantum Communications for Enhanced Security: Technology and Applications
Tommaso Occhipinti, Simone Capeleto
Page range: 165-165
DOI: https://doi.org/10.69091/koine/vol-5-W42
Introduction to CifrisCloud
Michela Iezzi, Matteo Nardelli, Marco Pedici
Page range: 167-167
DOI: https://doi.org/10.69091/koine/vol-5-W43
ANTI-fraud: ABE Solutions
Martina Palmucci
Page range: 168-171
DOI: https://doi.org/10.69091/koine/vol-5-W44
An introduction to Functional Encryption with multivariate algebra
Roberto La Scala
Page range: 172-174
DOI: https://doi.org/10.69091/koine/vol-5-W45
Registered Functional Encryption
Daniele Friolo, Danilo Francati, Monosij Maitra, Giulio Malavolta, Ahmadreza Rahimi, Daniele Venturi
Page range: 175-180
DOI: https://doi.org/10.69091/koine/vol-5-W46