Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC
|
2020 |
Badertscher, Christian |
Classical Verification of Quantum Computations with Efficient Verifier
|
2020 |
Chia, Nai-Hui |
On the Security of Time-Lock Puzzles and Timed Commitments
|
2020 |
Katz, Jonathan |
Transparent Error Correcting in a Computationally Bounded World.
|
2020 |
Grossman, Ofer |
Secure Quantum Extraction Protocols
|
2020 |
Ananth, Prabhanjan |
Super-Linear Time-Memory Trade-Offs for Symmetric Encryption
|
2020 |
Dai, Wei |
New Techniques in Replica Encodings with Client Setup
|
2020 |
Garg, Rachit |
On Pseudorandom Encodings
|
2020 |
Agrikola, Thomas |
Security Analysis of SPAKE2
|
2020 |
Shoup, Victor |
Lower Bounds on the Time/Memory Tradeoff of Function Inversion
|
2020 |
Chawin, Dror |
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions
|
2020 |
Rotem, Lior |
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness
|
2020 |
Jaeger, Joseph |
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries
|
2020 |
Fehr, Serge |
On Average-Case Hardness in TFNP from One-Way Functions
|
2020 |
Hubácek, Pavel |
Schrödinger's Pirate: How to Trace a Quantum Decoder
|
2020 |
Zhandry, Mark |
Quantum Encryption with Certified Deletion
|
2020 |
Broadbent, Anne |
Non-interactive Classical Verification of Quantum Computation
|
2020 |
Alagic, Gorjan |
Coupling of Random Systems
|
2020 |
Lanzenberger, David |
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity
|
2020 |
Dodis, Yevgeniy |
Zero-Communication Reduction
|
2020 |
Narayanan, Varun |