Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
|
2021 |
Cozzo, Daniele |
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
|
2021 |
Aranha, Diego F. |
Inverse-Sybil Attacks in Automated Contact Tracing
|
2021 |
Auerbach, Benedikt |
On the Hardness of Module-LWE with Binary Secret
|
2021 |
Boudgoust, Katharina |
Multi-party Revocation in Sovrin: Performance through Distributed Trust
|
2021 |
Helminger, Lukas |
Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures
|
2021 |
Chalkias, Konstantinos |
Noisy Simon Period Finding
|
2021 |
May, Alexander |
Signed Diffie-Hellman Key Exchange with Tight Security
|
2021 |
Pan, Jiaxin |
More Efficient Shuffle Argument from Unique Factorizauion
|
2021 |
Krips, Toomas |
Mesh Messaging in Large-Scale Protests: Breaking Bridgefy
|
2021 |
Albrecht, Martin R. |
Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups
|
2021 |
Biryukov, Alex |
On the Effectiveness of Time Travel to Inject COVID-19 Alerts
|
2021 |
Iovino, Vincenzo |
Dual Lattice Attacks for Closest Vector Problems (with Preprocessing)
|
2021 |
Laarhoven, Thijs |
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study
|
2021 |
Chattopadhyay, Anupam |
Improvements to RSA Key Generation and CRT on Embedded Devices
|
2021 |
Hamburg, Mike |
Compilation of Function Representations for Secure Computing Paradigms
|
2021 |
Baghery, Karim |
Oblivious TLS via Multi-party Computation
|
2021 |
Abram, Damiano |
SoK: Game-Based Security Models for Group Key Exchange
|
2021 |
Poettering, Bertram |
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys
|
2021 |
Niu, Chao |
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
|
2021 |
Farshim, Pooya |