Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions
|
2020 |
Yoshida, Yusuke |
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption
|
2020 |
Chen, Rongmao |
Lattice-Based E-Cash, Revisited
|
2020 |
Deo, Amit |
Cryptographic Group Actions and Applications
|
2020 |
Alamati, Navid |
SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRF
|
2020 |
Moriya, Tomoki |
Unbounded HIBE with Tight Security
|
2020 |
Langrehr, Roman |
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions
|
2020 |
Kim, Sam |
Towards Classical Hardness of Module-LWE: The Linear Rank Case
|
2020 |
Boudgoust, Katharina |
Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices
|
2020 |
Bernard, Olivier |
Oblivious Pseudorandom Functions from Isogenies
|
2020 |
Boneh, Dan |
Quantum Circuit Implementations of AES with Fewer Qubits
|
2020 |
Zou, Jian |
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage
|
2020 |
Campanelli, Matteo |
Privacy-Preserving Pattern Matching on Encrypted Data
|
2020 |
Bkakria, Anis |
Efficient Homomorphic Comparison Methods with Optimal Complexity
|
2020 |
Cheon, Jung Hee |
Radical Isogenies
|
2020 |
Castryck, Wouter |
Improved Classical and Quantum Algorithms for Subset-Sum
|
2020 |
Bonnetain, Xavier |
Multi-chent Oblivious RAM with Poly-logarithmic Communication
|
2020 |
Chow, Sherman S. M. |
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings
|
2020 |
Esgin, Muhammed F. |
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers
|
2020 |
Micciancio, Daniele |
B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted Torsion
|
2020 |
Costello, Craig |