Compilation of Function Representations for Secure Computing Paradigms
|
2021 |
Baghery, Karim |
Oblivious TLS via Multi-party Computation
|
2021 |
Abram, Damiano |
SoK: Game-Based Security Models for Group Key Exchange
|
2021 |
Poettering, Bertram |
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys
|
2021 |
Niu, Chao |
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
|
2021 |
Farshim, Pooya |
SoK: How (not) to Design and Implement Post-quantum Cryptography
|
2021 |
Howe, James |
Balancing Privacy and Accountability in Blockchain Identity Management
|
2021 |
Damgärd, Ivan |
A Framework to Optimize Implementations of Matrices
|
2021 |
Lin, Da |
Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
|
2021 |
Cozzo, Daniele |
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
|
2021 |
Aranha, Diego F. |
Inverse-Sybil Attacks in Automated Contact Tracing
|
2021 |
Auerbach, Benedikt |
On the Hardness of Module-LWE with Binary Secret
|
2021 |
Boudgoust, Katharina |
Multi-party Revocation in Sovrin: Performance through Distributed Trust
|
2021 |
Helminger, Lukas |
Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures
|
2021 |
Chalkias, Konstantinos |
A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption
|
2021 |
Venema, Marloes |
EPID with Malicious Revocation
|
2021 |
Sanders, Olivier |
FAN: A Lightweight Authenticated Cryptographic Algorithm
|
2021 |
Jiao, Lin |
Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions
|
2021 |
Zhao, Yuqing |
Noisy Simon Period Finding
|
2021 |
May, Alexander |
Signed Diffie-Hellman Key Exchange with Tight Security
|
2021 |
Pan, Jiaxin |