Handling Adaptive Compromise for Practical Encryption Schemes
|
2020 |
Jaeger, Joseph |
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
|
2020 |
Alwen, Joël |
Universally Composable Relaxed Password Authenticated Key Exchange
|
2020 |
Abdalla, Michel |
Functional Encryption for Attribute-Weighted Sums from k-Lin
|
2020 |
Abdalla, Michel |
New Techniques for Traitor Tracing: Size N1/3 and More from Pairings
|
2020 |
Zhandry, Mark |
Dynamic Decentralized Functional Encryption
|
2020 |
Chotard, Jérémy |
Indifferentiability for Public Key Cryptosystems
|
2020 |
Zhandry, Mark |
Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees
|
2020 |
Jost, Daniel |
The Memory-Tightness of Authenticated Encryption
|
2020 |
Ghoshal, Ashrujit |
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
|
2020 |
Gunsing, Aldo |
Leakage-Resilient Key Exchange and Two-Seed Extractors
|
2020 |
Li, Xin |
Verifiable Registration-Based Encryption
|
2020 |
Goyal, Rishab |
Fully Deniable Interactive Encryption
|
2020 |
Canetti, Ran |
Chosen Ciphertext Security from Injective Trapdoor Functions
|
2020 |
Hohenberger, Susan |
Quantifying the Security Cost of Migrating Protocols to Practice
|
2020 |
Patton, Christopher |
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
|
2020 |
Akshima |
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
|
2020 |
Davidson, Alex |
Collusion Resistant Watermarkable PRFs from Standard Assumptions
|
2020 |
Yang, Rupeng |
Security Analysis of NIST CTR-DRBG
|
2020 |
Hoang, Viet Tung |
Anonymous Tokens with Private Metadata Bit
|
2020 |
Kreuter, Ben |