Cryptanalysis of the Multivariate Encryption Scheme EFLASH
|
2020 |
Øygarden, Morten |
A Fast Characterization Method for Semi-invasive Fault Injection Attacks
|
2020 |
Wu, Lichao |
Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model
|
2020 |
Xiao, Yuting |
Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
|
2020 |
Avoine, Gildas |
TMPS: Ticket-Mediated Password Strengthening
|
2020 |
Kelsey, John |
Consensus from Signatures of Work
|
2020 |
Garay, Juan A. |
Better Bootstrapping for Approximate Homomorphic Encryption
|
2020 |
Han, Kyoohyung |
Traceable Inner Product Functional Encryption
|
2020 |
Do, Xuan Thanh |
Cut-and-Choose for Garbled RAM
|
2020 |
Miao, Peihan |
My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined Attacks
|
2020 |
Dhooghe, Siemen |
Modeling Memory Faults in Signature and Authenticated Encryption Schemes
|
2020 |
Fischlin, Marc |
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
|
2020 |
Kwon, Jihoon |
Efficient FPGA Implementations of LowMC and Picnic
|
2020 |
Kales, Daniel |
Post-quantum Provably-Secure Authentication and MAC from Mersenne Primes
|
2020 |
Ferradi, Houda |
How to Construct CSIDH on Edwards Curves
|
2020 |
Moriya, Tomoki |
Traceable Ring Signatures with Post-quantum Security
|
2020 |
Feng, Hanwen |
One-More Assumptions Do Not Help Fiat-Shamir-type Signature Schemes in NPROM
|
2020 |
Fukumitsu, Masayuki |
A Non-interactive Shuffle Argument with Low Trust Assumptions
|
2020 |
Aggelakis, Antonis |
Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations
|
2020 |
Mouha, Nicky |
SoK: A Consensus Taxonomy in the Blockchain Era
|
2020 |
Garay, Juan |