Energy Analysis of Lightweight AEAD Circuits
|
2020 |
Caforio, Andrea |
Distance-Bounding, Privacy-Preserving Attribute-Based Credentials
|
2020 |
Bosk, Daniel |
Trenchcoat: Human-Computable Hashing Algorithms for Password Generation
|
2020 |
Rooparaghunath, Ruthu Hulikal |
Provably Secure Scalable Distributed Authentication for Clouds
|
2020 |
Huszti, Andrea |
Revisiting ECM on GPUs
|
2020 |
Wloka, Jonas |
Curves with Fast Computations in the First Pairing Group
|
2020 |
Clarisse, Rémi |
Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE
|
2020 |
Pal, Tapas |
Attack on LAC Key Exchange in Misuse Situation
|
2020 |
Greuet, Aurélien |
A Secure Algorithm for Rounded Gaussian Sampling
|
2020 |
Brannigan, Séamus |
Assembly or Optimized C for Lightweight Cryptography on RISC-V?
|
2020 |
Campos, Fabio |
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
|
2020 |
Luzio, Adriano Di |
Simulation Extractable Versions of Groth's zk-SNARK Revisited
|
2020 |
Baghery, Karim |
Compact Multi-Party Confidential Transactions
|
2020 |
Alupotha, Jayamine |
Integral Cryptanalysis of Reduced-Round Tweakable TWINE
|
2020 |
ElSheikh, Muhammad |
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
|
2020 |
Mantel, Heiko |
Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
|
2020 |
Sahu, Gyana |
Cross-Site Search Attacks: Unauthorized Queries over Private Data
|
2020 |
Meyuhas, Bar |
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Environments
|
2020 |
Kumar, Saurabh |
HMAC and “Secure Preferences”: Revisiting Chromium-Based Browsers Security
|
2020 |
Picazo-Sanchez, Pablo |
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
|
2020 |
Guilhem, Cyprien Delpech de Saint |