Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode
|
2020 |
Hirose, Shoichi |
Rotational Cryptanalysis on MAC Algorithm Chaskey
|
2020 |
Kraleva, Liliya |
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption
|
2020 |
Faonio, Antonio |
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities
|
2020 |
Eldefrawy, Karim |
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model
|
2020 |
Le, Huy Quoc |
Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector Arithmetic
|
2020 |
Pereira, Hilder Vitor Lima |
Offline Witness Encryption with Semi-adaptive Security
|
2020 |
Chvojka, Peter |
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?
|
2020 |
Fujita, Rintaro |
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks
|
2020 |
Hiwatashi, Keitaro |
Saber on ESP32
|
2020 |
Wang, Bin |
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, Bound Vectors
|
2020 |
Hutchinson, Aaron |
Random Walks and Concurrent Zero-Knowledge
|
2020 |
Aiyer, Anand |
Tweaking Key-Alternating Feistel Block Ciphers
|
2020 |
Yan, Hailun |
Classical Misuse Attacks on NIST Round 2 PQC
|
2020 |
Huguenin-Dumittan, Loïs |
Efficient Anonymous Multi-group Broadcast Encryption
|
2020 |
Kim, Intae |
Secure Two-Party Computation in a Quantum World
|
2020 |
Büscher, Niklas |
Secure and Efficient Delegation of Elliptic-Curve Pairing
|
2020 |
Crescenzo, Giovanni Di |
How Not to Create an Isogeny-Based PAKE
|
2020 |
Azarderakhsh, Reza |
New Methods and Abstractions for RSA-Based Forward Secure Signatures
|
2020 |
Hohenberger, Susan |
Timed Signatures and Zero-Knowledge Proofs—Timestamping in the Blockchain Era—
|
2020 |
Abadi, Aydin |