Encrypted Key-Value Stores
|
2020 |
Agarwal, Archita |
Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448
|
2020 |
Niasar, Mojtaba Bisheh |
Protocol Analysis with Time
|
2020 |
Aparicio-Sánchez, Damián |
Security of Public Key Encryption Against Resetting Attacks
|
2020 |
Krämer, Juliane |
The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and Signatures
|
2020 |
Bellare, Mihir |
Vetted Encryption
|
2020 |
Hovd, Martha Norberg |
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
|
2020 |
Arte, Vivek |
Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-Resilience
|
2020 |
Zhang, Linru |
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model
|
2020 |
Nguyen, Giang Linh Duc |
Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-party Computation
|
2020 |
Choudhury, Ashish |
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
|
2020 |
Pietrzak, Krzysztof |
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification
|
2020 |
Almeida, José Bacelar |
Formal Verification of Fair Exchange Based on Bitcoin Smart Contracts
|
2020 |
Shi, Cheng |
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
|
2020 |
Azouaoui, Melissa |
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
|
2020 |
Dutta, Abhraneel |
More Glimpses of the RC4 Internal State Array
|
2020 |
Chakraborty, Pranab |
Counting Active S-Boxes is not Enough
|
2020 |
Dunkelman, Orr |
Adaptively Secure Threshold Symmetric-Key Encryption
|
2020 |
Mukherjee, Pratyay |
Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
|
2020 |
Paul, Arinjita |
Adaptive Security of Practical Garbling Schemes
|
2020 |
Jafargholi, Zahra |