Non-interactive Zero Knowledge from Sub-exponential DDH
|
2021 |
Jain, Abhishek |
Aggregatable Distributed Key Generation
|
2021 |
Gurkan, Kobi |
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
|
2021 |
Lai, Yi-Fu |
Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott Problem
|
2021 |
Costello, Craig |
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes
|
2021 |
Ding, Against Jintai |
On the Security of Homomorphic Encryption on Approximate Numbers
|
2021 |
Li, Baiyu |
Rotational Cryptanalysis from a Differential-Linear Perspective: Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette
|
2021 |
Liu, Yunwen |
New Representations of the AES Key Schedule
|
2021 |
Leurent, Gaetan |
On the (in)security of ROS
|
2021 |
Benhamouda, Fabrice |
Analysing the HPKE Standard
|
2021 |
Alwen, Joel |
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)
|
2021 |
Dinur, Itai |
Post-Quantum Multi-Party Computation
|
2021 |
Agarwal, Amit |
New Lattice Two-Stage Sampling Technique and its Application to Functional Encryption — Stronger Security and Smaller Ciphertexts
|
2021 |
Lai, Qiai |
A Deeper Look at Machine Learming-Based Cryptanalysis
|
2021 |
Benamira, Adrien |
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
|
2021 |
Bao, Zhenzhen |
Delay Encryption
|
2021 |
Burdges, Jeffrey |
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
|
2021 |
Katsumata, Shuichi |
Improved Cryptanalysis of UOV and Rainbow
|
2021 |
Beullens, Ward |
A 2n/2-Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP
|
2021 |
Aggarwal, Divesh |
Homomorphic Encryption Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-sparse Keys
|
2021 |
Bossuat, Jean-Philippe |