Secure and Efficient Delegation of Elliptic-Curve Pairing
|
2020 |
Crescenzo, Giovanni Di |
How Not to Create an Isogeny-Based PAKE
|
2020 |
Azarderakhsh, Reza |
New Methods and Abstractions for RSA-Based Forward Secure Signatures
|
2020 |
Hohenberger, Susan |
Timed Signatures and Zero-Knowledge Proofs—Timestamping in the Blockchain Era—
|
2020 |
Abadi, Aydin |
Minting Mechanism for Proof of Stake Blockchains
|
2020 |
Deuber, Dominic |
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
|
2020 |
Bouman, Niek J. |
Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority
|
2020 |
Blanton, Marina |
The Lattice-Based Digital Signature Scheme qTESLA
|
2020 |
Alkim, Erdem |
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
|
2020 |
Eldefrawy, Karim |
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model
|
2020 |
Le, Huy Quoc |
Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector Arithmetic
|
2020 |
Pereira, Hilder Vitor Lima |
Offline Witness Encryption with Semi-adaptive Security
|
2020 |
Chvojka, Peter |
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?
|
2020 |
Fujita, Rintaro |
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks
|
2020 |
Hiwatashi, Keitaro |
Saber on ESP32
|
2020 |
Wang, Bin |
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, Bound Vectors
|
2020 |
Hutchinson, Aaron |
Random Walks and Concurrent Zero-Knowledge
|
2020 |
Aiyer, Anand |
Tweaking Key-Alternating Feistel Block Ciphers
|
2020 |
Yan, Hailun |
Classical Misuse Attacks on NIST Round 2 PQC
|
2020 |
Huguenin-Dumittan, Loïs |
Efficient Anonymous Multi-group Broadcast Encryption
|
2020 |
Kim, Intae |