Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation
|
2020 |
Hoffmann, Clément |
Proof-of-Reputation Blockchain with Nakamoto Fallback
|
2020 |
Kleinrock, Leonard |
Verifpal: Cryptographic Protocol Analysis for the Real World
|
2020 |
Kobeissi, Nadim |
Cryptanalysis of the Permutation Based Algorithm SpoC
|
2020 |
Kraleva, Liliya |
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings
|
2020 |
Cid, Carlos |
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
|
2020 |
Eichlseder, Maria |
On a Dual/Hybrid Approach to Small Secret LWE
|
2020 |
Espitau, Thomas |
On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality
|
2020 |
Yamashita, Kyosuke |
Encrypted Key-Value Stores
|
2020 |
Agarwal, Archita |
Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448
|
2020 |
Niasar, Mojtaba Bisheh |
Protocol Analysis with Time
|
2020 |
Aparicio-Sánchez, Damián |
Security of Public Key Encryption Against Resetting Attacks
|
2020 |
Krämer, Juliane |
The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and Signatures
|
2020 |
Bellare, Mihir |
Vetted Encryption
|
2020 |
Hovd, Martha Norberg |
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
|
2020 |
Arte, Vivek |
Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-Resilience
|
2020 |
Zhang, Linru |
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model
|
2020 |
Nguyen, Giang Linh Duc |
Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-party Computation
|
2020 |
Choudhury, Ashish |
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
|
2020 |
Grassi, Lorenzo |
Evaluation of Quantum Cryptanalysis on SPECK
|
2020 |
Anand, Ravi |