Encrypted Key-Value Stores
|
2020 |
Agarwal, Archita |
Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448
|
2020 |
Niasar, Mojtaba Bisheh |
Protocol Analysis with Time
|
2020 |
Aparicio-Sánchez, Damián |
Security of Public Key Encryption Against Resetting Attacks
|
2020 |
Krämer, Juliane |
The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and Signatures
|
2020 |
Bellare, Mihir |
Vetted Encryption
|
2020 |
Hovd, Martha Norberg |
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
|
2020 |
Arte, Vivek |
Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-Resilience
|
2020 |
Zhang, Linru |
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model
|
2020 |
Nguyen, Giang Linh Duc |
Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-party Computation
|
2020 |
Choudhury, Ashish |
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
|
2020 |
Grassi, Lorenzo |
Evaluation of Quantum Cryptanalysis on SPECK
|
2020 |
Anand, Ravi |
Making the BKW Algorithm Practical for LWE
|
2020 |
Budroni, Alessandro |
Gadget-Based iNTRU Lattice Trapdoors
|
2020 |
Genise, Nicholas |
Skipping the q in Group Signatures
|
2020 |
Blazy, Olivier |
Simpler Constructions of Asymmetric Primitives from Obfuscation
|
2020 |
Farshim, Pooya |
Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
|
2020 |
Choudhury, Ashish |
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials
|
2020 |
Phalakarn, Kittiphop |
High Throughput Secure MPC over Small Population in Hybrid Networks (Extended Abstract)
|
2020 |
Choudhury, Ashish |
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
|
2020 |
Arte, Vivek |