Non-interactive Zero Knowledge from Sub-exponential DDH
|
2021 |
Jain, Abhishek |
Aggregatable Distributed Key Generation
|
2021 |
Gurkan, Kobi |
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
|
2021 |
Lai, Yi-Fu |
Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott Problem
|
2021 |
Costello, Craig |
The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV Which Forges a Signature Within 210 Minutes
|
2021 |
Ding, Against Jintai |
On the Security of Homomorphic Encryption on Approximate Numbers
|
2021 |
Li, Baiyu |
Rotational Cryptanalysis from a Differential-Linear Perspective: Practical Distinguishers for Round-Reduced FRIET, Xoodoo, and Alzette
|
2021 |
Liu, Yunwen |
Tightly-Secure Authenticated Key Exchange, Revisited
|
2021 |
Jager, Tibor |
One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols
|
2021 |
Kutas, Peter |
Decentralized Multi-authority ABE for DNFs from LWE
|
2021 |
Datta, Pratish |
On the Ideal Shortest Vector Problem over Random Rational Primes
|
2021 |
Pan, Yanbin |
Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha
|
2021 |
Coutinho, Murilo |
New Representations of the AES Key Schedule
|
2021 |
Leurent, Gaetan |
On the (in)security of ROS
|
2021 |
Benhamouda, Fabrice |
Analysing the HPKE Standard
|
2021 |
Alwen, Joel |
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)
|
2021 |
Dinur, Itai |
Post-Quantum Multi-Party Computation
|
2021 |
Agarwal, Amit |
New Lattice Two-Stage Sampling Technique and its Application to Functional Encryption — Stronger Security and Smaller Ciphertexts
|
2021 |
Lai, Qiai |
A Deeper Look at Machine Learming-Based Cryptanalysis
|
2021 |
Benamira, Adrien |
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing
|
2021 |
Bao, Zhenzhen |