Security Analysis of NIST CTR-DRBG
|
2020 |
Hoang, Viet Tung |
Anonymous Tokens with Private Metadata Bit
|
2020 |
Kreuter, Ben |
Random Probing Security: Verification, Composition, Expansion and New Constructions
|
2020 |
Belaïd, Sonia |
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
|
2020 |
Patel, Sarvar |
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
|
2020 |
Bellizia, Davide |
Fast and Secure Updatable Encryption
|
2020 |
Boyd, Colin |
New Constructions of Hinting PRGs, OWFs with Encryption, and More
|
2020 |
Goyal, Rishab |
Incompressible Encodings
|
2020 |
Moran, Tal |
Amplifying the Security of Functional Encryption, Unconditionally
|
2020 |
Jain, Aayush |
On Succinct Arguments and Witness Encryption from Groups
|
2020 |
Barta, Ohad |
Handling Adaptive Compromise for Practical Encryption Schemes
|
2020 |
Jaeger, Joseph |
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
|
2020 |
Alwen, Joël |
Universally Composable Relaxed Password Authenticated Key Exchange
|
2020 |
Abdalla, Michel |
Functional Encryption for Attribute-Weighted Sums from k-Lin
|
2020 |
Abdalla, Michel |
New Techniques for Traitor Tracing: Size N1/3 and More from Pairings
|
2020 |
Zhandry, Mark |
Dynamic Decentralized Functional Encryption
|
2020 |
Chotard, Jérémy |
Indifferentiability for Public Key Cryptosystems
|
2020 |
Zhandry, Mark |
Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees
|
2020 |
Jost, Daniel |
The Memory-Tightness of Authenticated Encryption
|
2020 |
Ghoshal, Ashrujit |
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
|
2020 |
Gunsing, Aldo |