Secure and Efficient Delegation of Elliptic-Curve Pairing
|
2020 |
Crescenzo, Giovanni Di |
How Not to Create an Isogeny-Based PAKE
|
2020 |
Azarderakhsh, Reza |
New Methods and Abstractions for RSA-Based Forward Secure Signatures
|
2020 |
Hohenberger, Susan |
Timed Signatures and Zero-Knowledge Proofs—Timestamping in the Blockchain Era—
|
2020 |
Abadi, Aydin |
Minting Mechanism for Proof of Stake Blockchains
|
2020 |
Deuber, Dominic |
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
|
2020 |
Bouman, Niek J. |
Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority
|
2020 |
Blanton, Marina |
The Lattice-Based Digital Signature Scheme qTESLA
|
2020 |
Alkim, Erdem |
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
|
2020 |
Eldefrawy, Karim |
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model
|
2020 |
Le, Huy Quoc |
Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector Arithmetic
|
2020 |
Pereira, Hilder Vitor Lima |
Offline Witness Encryption with Semi-adaptive Security
|
2020 |
Chvojka, Peter |
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?
|
2020 |
Fujita, Rintaro |
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks
|
2020 |
Hiwatashi, Keitaro |
Saber on ESP32
|
2020 |
Wang, Bin |
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, Bound Vectors
|
2020 |
Hutchinson, Aaron |
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode
|
2020 |
Hirose, Shoichi |
Rotational Cryptanalysis on MAC Algorithm Chaskey
|
2020 |
Kraleva, Liliya |
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption
|
2020 |
Faonio, Antonio |
Random Walks and Concurrent Zero-Knowledge
|
2020 |
Aiyer, Anand |