Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage
|
2020 |
Campanelli, Matteo |
Privacy-Preserving Pattern Matching on Encrypted Data
|
2020 |
Bkakria, Anis |
Efficient Homomorphic Comparison Methods with Optimal Complexity
|
2020 |
Cheon, Jung Hee |
Radical Isogenies
|
2020 |
Castryck, Wouter |
Improved Classical and Quantum Algorithms for Subset-Sum
|
2020 |
Bonnetain, Xavier |
Multi-chent Oblivious RAM with Poly-logarithmic Communication
|
2020 |
Chow, Sherman S. M. |
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
|
2020 |
Esgin, Muhammed F. |
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers
|
2020 |
Micciancio, Daniele |
B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted Torsion
|
2020 |
Costello, Craig |
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices
|
2020 |
Beullens, Ward |
A Combinatorial Approach to Quantum Random Functions
|
2020 |
Döttling, Nico |
Estimating Quantum Speedups for Lattice Sieves
|
2020 |
Albrecht, Martin R. |
Security Limitations of Classical-Client Delegated Quantum Computing
|
2020 |
Badertscher, Christian |
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories
|
2020 |
Dong, Xiaoyang |
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
|
2020 |
Liu, Xiangyu |
Fuzzy Asymmetric Password-Authenticated Key Exchange
|
2020 |
Erwig, Andreas |
Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions
|
2020 |
Yoshida, Yusuke |
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
|
2020 |
Chen, Rongmao |
Lattice-Based E-Cash, Revisited
|
2020 |
Deo, Amit |
Cryptographic Group Actions and Applications
|
2020 |
Alamati, Navid |