Quantifying the Security Cost of Migrating Protocols to Practice
|
2020 |
Patton, Christopher |
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions
|
2020 |
Akshima |
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
|
2020 |
Davidson, Alex |
Collusion Resistant Watermarkable PRFs from Standard Assumptions
|
2020 |
Yang, Rupeng |
Handling Adaptive Compromise for Practical Encryption Schemes
|
2020 |
Jaeger, Joseph |
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
|
2020 |
Alwen, Joël |
Universally Composable Relaxed Password Authenticated Key Exchange
|
2020 |
Abdalla, Michel |
Functional Encryption for Attribute-Weighted Sums from k-Lin
|
2020 |
Abdalla, Michel |
New Techniques for Traitor Tracing: Size N1/3 and More from Pairings
|
2020 |
Zhandry, Mark |
Dynamic Decentralized Functional Encryption
|
2020 |
Chotard, Jérémy |
Security Analysis of NIST CTR-DRBG
|
2020 |
Hoang, Viet Tung |
Anonymous Tokens with Private Metadata Bit
|
2020 |
Kreuter, Ben |
Random Probing Security: Verification, Composition, Expansion and New Constructions
|
2020 |
Belaïd, Sonia |
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
|
2020 |
Patel, Sarvar |
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle
|
2020 |
Bellizia, Davide |
Fast and Secure Updatable Encryption
|
2020 |
Boyd, Colin |
New Constructions of Hinting PRGs, OWFs with Encryption, and More
|
2020 |
Goyal, Rishab |
Incompressible Encodings
|
2020 |
Moran, Tal |
Amplifying the Security of Functional Encryption, Unconditionally
|
2020 |
Jain, Aayush |
On Succinct Arguments and Witness Encryption from Groups
|
2020 |
Barta, Ohad |