Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
|
2020 |
Kaafarani, Ali El |
Topology-Hiding Computation for Networks with Unknown Delays
|
2020 |
LaVigne, Rio |
Threshold Ring Signatures: New Definitions and Post-quantum Security
|
2020 |
Haque, Abida |
Linearly-Homomorphic Signatures and Scalable Mix-Nets
|
2020 |
Hébant, Chloé |
The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier
|
2020 |
Ducas, Leo |
Threshold Schemes from Isogeny Assumptions
|
2020 |
Feo, Luca De |
Bandwidth-Efficient Threshold EC-DSA
|
2020 |
Castagnos, Guilhem |
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
|
2020 |
Hazay, Carmit |
MonZ2ka: Fast Maliciously Secure Two Party Computation on Z2k
|
2020 |
Catalano, Dario |
Tight and Optimal Reductions for Signatures Based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures
|
2020 |
Chailloux, André |
Improved Classical Cryptanalysis of SIKE in Practice
|
2020 |
Costello, Craig |
A Short-List of Pairing-Friendly Curves Resistant to Special TNFS at the 128-Bit Security Level
|
2020 |
Guillevic, Aurore |
Efficient Redactable Signature and Application to Anonymous Credentials
|
2020 |
Sanders, Olivier |
Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control
|
2020 |
Brakerski, Zvika |
Boosting Verifiable Computation on Encrypted Data
|
2020 |
Fiore, Dario |
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors
|
2020 |
Bai, Shi |
Blazing Fast OT for Three-Round UC OT Extension
|
2020 |
Canetti, Ran |
Faster Cofactorization with ECM Using Mixed Representations
|
2020 |
Bouvier, Cyril |
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
|
2020 |
Zhang, Jiang |
Sublinear-Round Byzantine Agreement Under Corrupt Majority
|
2020 |
Chan, T.-H. Hubert |