Cryptanalysis of the Multivariate Encryption Scheme EFLASH
|
2020 |
Øygarden, Morten |
A Fast Characterization Method for Semi-invasive Fault Injection Attacks
|
2020 |
Wu, Lichao |
Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model
|
2020 |
Xiao, Yuting |
Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
|
2020 |
Avoine, Gildas |
TMPS: Ticket-Mediated Password Strengthening
|
2020 |
Kelsey, John |
Consensus from Signatures of Work
|
2020 |
Garay, Juan A. |
Better Bootstrapping for Approximate Homomorphic Encryption
|
2020 |
Han, Kyoohyung |
Traceable Inner Product Functional Encryption
|
2020 |
Do, Xuan Thanh |
Cut-and-Choose for Garbled RAM
|
2020 |
Miao, Peihan |
Generic Attack on Iterated Tweakable FX Constructions
|
2020 |
Sibleyras, Ferdinand |
Universal Forgery Attack Against GCM-RUP
|
2020 |
Li, Yanbin |
Overdrive2k: Efficient Secure MPC over Z2k from Somewhat Homomorphic Encryption
|
2020 |
Orsini, Emmanuela |
Faster Homomorphic Encryption is not Enough: Improved Heuristic for Multiplicative Depth Minimization of Boolean Circuits
|
2020 |
Aubry, Pascal |
Improved Secure Integer Comparison via Homomorphic Encryption
|
2020 |
Bourse, Florian |
Another Look at Some Isogeny Hardness Assumptions
|
2020 |
Merz, Simon-Philipp |
My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined Attacks
|
2020 |
Dhooghe, Siemen |
Modeling Memory Faults in Signature and Authenticated Encryption Schemes
|
2020 |
Fischlin, Marc |
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups
|
2020 |
Kwon, Jihoon |
Efficient FPGA Implementations of LowMC and Picnic
|
2020 |
Kales, Daniel |
Post-quantum Provably-Secure Authentication and MAC from Mersenne Primes
|
2020 |
Ferradi, Houda |