An Attack on Some Signature Schemes Constructed from Five-Pass Identification Schemes
|
2020 |
Kales, Daniel |
Stronger Targeted Poisoning Attacks Against Malware Detection
|
2020 |
Narisada, Shintaro |
Detecting Word Based DGA Domains Using Ensemble Models
|
2020 |
Charan, P. V. Sai |
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
|
2020 |
Dallmeier, Fynn |
Optimized and Secure Pairing-Friendly Elliptic Curves Suitable for One Layer Proof Composition
|
2020 |
Housni, Youssef El |
Detecting Covert Cryptomining Using HPC
|
2020 |
Gangwal, Ankit |
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
|
2020 |
David, Bernardo |
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
|
2020 |
Luzio, Adriano Di |
Simulation Extractable Versions of Groth's zk-SNARK Revisited
|
2020 |
Baghery, Karim |
Compact Multi-Party Confidential Transactions
|
2020 |
Alupotha, Jayamine |
Integral Cryptanalysis of Reduced-Round Tweakable TWINE
|
2020 |
ElSheikh, Muhammad |
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
|
2020 |
Mantel, Heiko |
Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
|
2020 |
Sahu, Gyana |
Cross-Site Search Attacks: Unauthorized Queries over Private Data
|
2020 |
Meyuhas, Bar |
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments
|
2020 |
Kumar, Saurabh |
HMAC and “Secure Preferences”: Revisiting Chromium-Based Browsers Security
|
2020 |
Picazo-Sanchez, Pablo |
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
|
2020 |
Guilhem, Cyprien Delpech de Saint |
Lightweight Virtual Payment Channels
|
2020 |
Jourenko, Maxim |
Linear Complexity Private Set Intersection for Secure Two-Party Protocols
|
2020 |
Karakoç, Ferhat |
Enhancing Code Based Zero-Knowledge Proofs Using Rank Metric
|
2020 |
Bellini, Emanuele |