A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
|
2021 |
Venema, Marloes |
EPID with Malicious Revocation
|
2021 |
Sanders, Olivier |
FAN: A Lightweight Authenticated Cryptographic Algorithm
|
2021 |
Jiao, Lin |
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions
|
2021 |
Zhao, Yuqing |
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
|
2021 |
Cozzo, Daniele |
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
|
2021 |
Aranha, Diego F. |
Inverse-Sybil Attacks in Automated Contact Tracing
|
2021 |
Auerbach, Benedikt |
On the Hardness of Module-LWE with Binary Secret
|
2021 |
Boudgoust, Katharina |
Multi-party Revocation in Sovrin: Performance through Distributed Trust
|
2021 |
Helminger, Lukas |
Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures
|
2021 |
Chalkias, Konstantinos |
Noisy Simon Period Finding
|
2021 |
May, Alexander |
Signed Diffie-Hellman Key Exchange with Tight Security
|
2021 |
Pan, Jiaxin |
More Efficient Shuffle Argument from Unique Factorizauion
|
2021 |
Krips, Toomas |
Mesh Messaging in Large-Scale Protests: Breaking Bridgefy
|
2021 |
Albrecht, Martin R. |
Cryptanalysis of a Dynamic Universal Accumulator over Bilinear Groups
|
2021 |
Biryukov, Alex |
On the Effectiveness of Time Travel to Inject COVID-19 Alerts
|
2021 |
Iovino, Vincenzo |
Dual Lattice Attacks for Closest Vector Problems (with Preprocessing)
|
2021 |
Laarhoven, Thijs |
On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study
|
2021 |
Chattopadhyay, Anupam |
Improvements to RSA Key Generation and CRT on Embedded Devices
|
2021 |
Hamburg, Mike |
Compilation of Function Representations for Secure Computing Paradigms
|
2021 |
Baghery, Karim |