Privacy-Preserving Data Aggregation with Probabilistic Range Validation
|
2021 |
Dekker, F. W. |
A Differentially Private Hybrid Approach to Traffic Monitoring
|
2021 |
Rocha, Rogerio V. M. |
VESTIGE: Identifying Binary Code Provenance for Vulnerability Detection
|
2021 |
Ji, Yuede |
Proactive Detection of Phishing Kit Traffic
|
2021 |
Cui, Qian |
SoK: Auditability and Accountability in Distributed Payment Systems
|
2021 |
Chatzigiannis, Panagiotis |
Defending Web Servers Against Flash Crowd Attacks
|
2021 |
Tandon, Rajat |
Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols
|
2021 |
Davis, Hannah |
Improved Structured Encryption for SQL Databases via Hybrid Indexing
|
2021 |
Cash, David |
An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings
|
2021 |
Abspoel, Mark |
Efficient Methods to Search for Best Differential Characteristics on SKINNY
|
2021 |
Delaune, Stephanie |
Cryptanalysis of the Binary Permuted Kernel Problem
|
2021 |
Paiva, Thales Bandiera |
Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements
|
2021 |
Roessink, Ruben Groot |
Towards Efficient LPN-Based Symmetric Encryption
|
2021 |
Bogos, Sonia |
Breaking and Fixing Third-Party Payment Service for Mobile Apps
|
2021 |
Shi, Shangcheng |
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing
|
2021 |
Bai, Shuangpeng |
Threat for the Secure Remote Password Protocol and a Leak in Apple’s Cryptographic Library
|
2021 |
Russon, Andy |
LLVM-Based Circuit Compilation for Practical Secure Computation
|
2021 |
Heldmann, Tim |
TurboIKOS: Improved Non-interactive Zero Knowledge and Post-quantum Signatures
|
2021 |
Gvili, Yaron |
Security Comparisons and Performance Analyses of Post-quantum Signature Algorithms
|
2021 |
Raavi, Manohar |