DE CIFRIS KOINE
Articles and Volumes
A complete list of all available volumes of De Cifris Koine and their articles.
Issues of Koine are completely free (Diamond Open Access), and we also provide their covers so anyone can create their own copy.
Vol. 4: DE CIFRIS PROTOCOLS▼
Introduction to Advanced Cryptographic Protocols
Elizabeth A. Quaglia, Daniele Venturi
Page range: 2-6
DOI: https://doi.org/10.69091/koine/vol-4-I01
PRIMITIVES
Secret Sharing with Arithmetic Properties
Ignacio Cascudo
Page range: 8-27
DOI: https://doi.org/10.69091/koine/vol-4-P01
Vector Commitment and Verifiable Outsourced Storage
Dario Fiore
Page range: 28-44
DOI: https://doi.org/10.69091/koine/vol-4-P02
SNARKs
Markulf Kohlweiss, Anca Nitulescu
Page range: 45-71
DOI: https://doi.org/10.69091/koine/vol-4-P03
PROTOCOLS
An Introduction to Key Establishment
Bertram Poettering
Page range: 73-99
DOI: https://doi.org/10.69091/koine/vol-4-P04
Blockchains and Cryptography
Alessandra Scafuro
Page range: 100-130
DOI: https://doi.org/10.69091/koine/vol-4-P05
An Introduction to Electronic Voting
Oliver Pereira
Page range: 131-156
DOI: https://doi.org/10.69091/koine/vol-4-P06
Vol. 3: ERUDITORUM ACTA 2024▼
Introduzione a De Cifris Eruditorum
Antonino Alì, Massimiliano Sala
Page range: 2-4
DOI: https://doi.org/10.69091/koine/vol-3-I01
Francesci-Partenio, una disputa crittografica nel Rinascimento
Paolo Bonavoglia
Page range: 5-23
DOI: https://doi.org/10.69091/koine/vol-3-E01
Scrivere per nascondere, leggere per scoprire. Le origini della crittografia
Marco Moraglio
Page range: 24-34
DOI: https://doi.org/10.69091/koine/vol-3-E02
Epigrafi cifrate nelle chiese antiche
Cosimo Palma
Page range: 35-51
DOI: https://doi.org/10.69091/koine/vol-3-E03
Il nuovo framework giuridico cyber dell’Italia. La crittografia come strumento di cybersicurezza e per l’autonomia strategica nazionale
Marcello Albergoni
Page range: 52-58
DOI: https://doi.org/10.69091/koine/vol-3-E04
Human Rights Implications of Encryption Backdoors
Antonino Alì
Page range: 59-72
DOI: https://doi.org/10.69091/koine/vol-3-E05
Vol. 2: DE CIFRIS SEMINARS▼
Introduction to De Cifris Seminars
Danilo Bazzanella, Guido Codogni, Nadir Murru, Roberto Zunino
Page range: 2-4
DOI: https://doi.org/10.69091/koine/vol-2-I01
EXTENDED ABSTRACTS: THEORY
Group Theoretical Approach for Symmetric Encryption
Riccardo Aragona
Page range: 6-9
DOI: https://doi.org/10.69091/koine/vol-2-T01
An overview on cryptanalysis of ARX cyphers
Stefano Barbero
Page range: 10-13
DOI: https://doi.org/10.69091/koine/vol-2-T02
Efficient cryptanalysis over multivariate Ore Extensions
Michela Ceria, Theo Moriarty and Andrea Visconti
Page range: 14-17
DOI: https://doi.org/10.69091/koine/vol-2-T03
On adapting NTRU for Post-Quantum Public-Key Encryption
Simone Dutto, Guglielmo Morgari and Edoardo Signorini
Page range: 18-21
DOI: https://doi.org/10.69091/koine/vol-2-T04
Cryptanalysis of round-reduced AES
Lorenzo Grassi
Page range: 22-26
DOI: https://doi.org/10.69091/koine/vol-2-T05
Shift Invariance in Symmetric Cryptography
Luca Mariot
Page range: 27-30
DOI: https://doi.org/10.69091/koine/vol-2-T06
An investigation on integer factorization applied to public key cryptography
Giordano Santilli
Page range: 31-35
DOI: https://doi.org/10.69091/koine/vol-2-T07
EXTENDED ABSTRACTS: APPLICATIONS
Non-interactive time-based proof-of-stake finality
Giovanni Antino and Iris Dimmi
Page range: 36-39
DOI: https://doi.org/10.69091/koine/vol-2-A01
Privacy-preserving Information Sharing
Carlo Blundo
Page range: 40-46
DOI: https://doi.org/10.69091/koine/vol-2-A02
The links between Machine Learning and Blockchain
Andrea Gangemi
Page range: 47-50
DOI: https://doi.org/10.69091/koine/vol-2-A03
Post-quantum cryptography and the automotive industry
Efstathia Katsigianni
Page range: 51-54
DOI: https://doi.org/10.69091/koine/vol-2-A04
Digital Identity - modern tools and perspectives
Alessandro Tomasi
Page range: 55-57
DOI: https://doi.org/10.69091/koine/vol-2-A05
KDFs: an essential (and usually transparent) component of real-world applications
Andrea Visconti
Page range: 58-61
DOI: https://doi.org/10.69091/koine/vol-2-A06
RESEARCH PAPERS
Vol. 1: CIFRIS23 ACTA▼
Introduction to CIFRIS23 ACTA
Massimiliano Sala, Michele Ciampi, Roberto Civino, Daniele Friolo, Sihem Mesnager
Page range: 2-5
DOI: https://doi.org/10.69091/koine/vol-1-I01
Cryptography and its Applications in the Italian Scenario
Massimo Giulietti
Page range: 17-18
DOI: https://doi.org/10.69091/koine/vol-1-I02
La visione di De Cifris: partnership con le aziende leader
Antonino Alì
Page range: 19-21
DOI: https://doi.org/10.69091/koine/vol-1-I03
SCIENTIFIC SESSION (MAIN PROGRAM)
Introduction to the Scientific Session
Michele Ciampi, Sihem Mesnager
Page range: 30-30
DOI: https://doi.org/10.69091/koine/vol-1-M01
Keynote: MPC in the head for isomorphisms and group action
Antoine Joux
Page range: 32-33
DOI: https://doi.org/10.69091/koine/vol-1-M02
Efficiency of SIDH-based signatures (yes, SIDH)
Wissam Ghantous, Federico Pintore and Mattia Veroni
Page range: 34-35
DOI: https://doi.org/10.69091/koine/vol-1-M03
The group structure of elliptic curves over Z/NZ
Massimiliano Sala and Daniele Taufer
Page range: 36-38
DOI: https://doi.org/10.69091/koine/vol-1-M04
FPGA And Software Acceleration of Multi-Scalar Multiplication: CycloneMSM
Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, and Javier Varela
Page range: 40-40
DOI: https://doi.org/10.69091/koine/vol-1-M05
On Linear Codes with Random Multiplier Vectors and the Maximum Trace Dimension Property
Márton Erdélyi, Pál Hegedüs, Sándor Z. Kiss, and Gábor P. Nagy
Page range: 41-42
DOI: https://doi.org/10.69091/koine/vol-1-M06
On a generalization of the Deligne-Lustzig curve of Suzuki type and application to AG codes
Marco Timpanella
Page range: 43-44
DOI: https://doi.org/10.69091/koine/vol-1-M07
On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes
Kyosuke Yamashita and Keisuke Hara
Page range: 45-47
DOI: https://doi.org/10.69091/koine/vol-1-M08
Keynote: Threshold Implementations: Securing Implementations of Symmetric-Key Algorithms
Svetla Nikova
Page range: 49-51
DOI: https://doi.org/10.69091/koine/vol-1-M09
Differential experiments using parallel alternative operations
Marco Calderini, Roberto Civino, and Riccardo Invernizzi
Page range: 52-54
DOI: https://doi.org/10.69091/koine/vol-1-M10
Automatic Boomerang Attacks Search on Rijndael
Marine Minier, Loïc Rouquette, and Christine Solnon
Page range: 55-56
DOI: https://doi.org/10.69091/koine/vol-1-M11
Searchable Encryption with randomized ciphertext and randomized keyword search
Marco Calderini, Riccardo Longo, Massimiliano Sala, and Irene Villa
Page range: 58-60
DOI: https://doi.org/10.69091/koine/vol-1-M12
Cryptanalysis of a privacy-preserving authentication scheme
Sigurd Eskeland
Page range: 61-63
DOI: https://doi.org/10.69091/koine/vol-1-M13
mRLWE-CP-ABE: a revocable CP-ABE for post-quantum cryptography
Marco Cianfriglia, Elia Onofri and Marco Pedicini
Page range: 64-66
DOI: https://doi.org/10.69091/koine/vol-1-M14
WORKSHOPS
Introduction to CBDCs Workshop
Daniel Broby
Page range: 70-72
DOI: https://doi.org/10.69091/koine/vol-1-W01
Crypto assets' value and investor protection
Gianfranco Trovatore
Page range: 73-74
DOI: https://doi.org/10.69091/koine/vol-1-W02
What consensus mechanism will be used for Central Bank Digital Currencies (CBDCs)?
Vincenzo Vespri and Filippo Zatti
Page range: 75-77
DOI: https://doi.org/10.69091/koine/vol-1-W03
CBDCs: A new generation of digital cash
Guneet Kaur and Andrea Bracciali
Page range: 78-81
DOI: https://doi.org/10.69091/koine/vol-1-W04
Introduction to PQ Workshop
Marco Baldi, Giulio Codogni, Elisa Gorla , Roberto La Scala, Alessio Meneghetti, Emanuela Orsini , Gerardo Pelosi, Edoardo Persichetti, and Federico Pintore
Page range: 83-84
DOI: https://doi.org/10.69091/koine/vol-1-W05
SQIsign The new herald of isogeny based crypto
Luca De Feo
Page range: 85-87
DOI: https://doi.org/10.69091/koine/vol-1-W06
No one should learn from these errors: surveying fault attack resistance of post quantum cryptosystems
Alessandro Barenghi
Page range: 88-90
DOI: https://doi.org/10.69091/koine/vol-1-W07
MCE and MEDS: From Group Actions to Signatures
Krijn Reijnders
Page range: 91-93
DOI: https://doi.org/10.69091/koine/vol-1-W08
Signatures from Five-Pass Zero-Knowledge Protocols and the Curious Case of CROSS
Paolo Santini
Page range: 94-96
DOI: https://doi.org/10.69091/koine/vol-1-W09
Introduction to TAC Workshop
Silvio Ranise and Alessandro Tomasi
Page range: 98-99
DOI: https://doi.org/10.69091/koine/vol-1-W10
Royal Rumbles in Cryptography: the NIST PQC Competition
Marco Baldi
Page range: 100-101
DOI: https://doi.org/10.69091/koine/vol-1-W11
Multiparty Class Group Encryption and Applications to E-Voting
Michele Battagliola, Giuseppe D’Alconzo, Andrea Gangemi, and Chiara Spadafora
Page range: 105-106
DOI: https://doi.org/10.69091/koine/vol-1-W13
Vote App: Verifiable and Coercion-Resistant I-Voting
Riccardo Longo, Chiara Spadafora, and Francesco Antonio Marino
Page range: 107-109
DOI: https://doi.org/10.69091/koine/vol-1-W14
OpenABE Bindings for Kotlin
Stefano Berlato, Roberto Carbone, and Silvio Ranise
Page range: 110-112
DOI: https://doi.org/10.69091/koine/vol-1-W15
Cryptographic Enforcement of Attribute-based Access Control Policies
Stefano Berlato, Alessandro Colombo, Roberto Carbone, and Silvio Ranise
Page range: 113-115
DOI: https://doi.org/10.69091/koine/vol-1-W16
Privacy Preserving Machine Learning with TFHE
Andrei Stoian
Page range: 118-118
DOI: https://doi.org/10.69091/koine/vol-1-W17
PPML: Machine learning on data you cannot see
Valerio Maggio
Page range: 119-120
DOI: https://doi.org/10.69091/koine/vol-1-W18
Introduction to Group-based Workshop
Norberto Gavioli, Carmine Monetta, and Marialaura Noce
Page range: 122-123
DOI: https://doi.org/10.69091/koine/vol-1-W19
The Impact of the Semidirect Discrete Logarithm Problem (SDLP) in Post-quantum Cryptography PQC
Delaram Kahrobaei
Page range: 124-126
DOI: https://doi.org/10.69091/koine/vol-1-W20
Some results on the groups generated by round functions
Riccardo Aragona
Page range: 127-129
DOI: https://doi.org/10.69091/koine/vol-1-W21
A method to cryptanalyze (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups
Martina Vigorito
Page range: 130-132
DOI: https://doi.org/10.69091/koine/vol-1-W22
Linearization of hard problems via right-angled Artin groups
Ramón Flores, Delaram Kahrobaei, and Thomas Koberda
Page range: 133-134
DOI: https://doi.org/10.69091/koine/vol-1-W23
A “smart” application of homomorphic encryption
Antonio Tortora
Page range: 135-136
DOI: https://doi.org/10.69091/koine/vol-1-W24