Indifferentiability for Public Key Cryptosystems
|
2020 |
Zhandry, Mark |
Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees
|
2020 |
Jost, Daniel |
The Memory-Tightness of Authenticated Encryption
|
2020 |
Ghoshal, Ashrujit |
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
|
2020 |
Gunsing, Aldo |
Leakage-Resilient Key Exchange and Two-Seed Extractors
|
2020 |
Li, Xin |
Verifiable Registration-Based Encryption
|
2020 |
Goyal, Rishab |
Fully Deniable Interactive Encryption
|
2020 |
Canetti, Ran |
Chosen Ciphertext Security from Injective Trapdoor Functions
|
2020 |
Hohenberger, Susan |
Handling Adaptive Compromise for Practical Encryption Schemes
|
2020 |
Jaeger, Joseph |
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
|
2020 |
Alwen, Joël |
Universally Composable Relaxed Password Authenticated Key Exchange
|
2020 |
Abdalla, Michel |
Functional Encryption for Attribute-Weighted Sums from k-Lin
|
2020 |
Abdalla, Michel |
New Techniques for Traitor Tracing: Size N1/3 and More from Pairings
|
2020 |
Zhandry, Mark |
Dynamic Decentralized Functional Encryption
|
2020 |
Chotard, Jérémy |
Security Analysis of NIST CTR-DRBG
|
2020 |
Hoang, Viet Tung |
Anonymous Tokens with Private Metadata Bit
|
2020 |
Kreuter, Ben |
Random Probing Security: Verification, Composition, Expansion and New Constructions
|
2020 |
Belaïd, Sonia |
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
|
2020 |
Patel, Sarvar |
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
|
2020 |
Bellizia, Davide |
Fast and Secure Updatable Encryption
|
2020 |
Boyd, Colin |