Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
|
2020 |
Grassi, Lorenzo |
Evaluation of Quantum Cryptanalysis on SPECK
|
2020 |
Anand, Ravi |
Making the BKW Algorithm Practical for LWE
|
2020 |
Budroni, Alessandro |
Gadget-Based iNTRU Lattice Trapdoors
|
2020 |
Genise, Nicholas |
Skipping the q in Group Signatures
|
2020 |
Blazy, Olivier |
Simpler Constructions of Asymmetric Primitives from Obfuscation
|
2020 |
Farshim, Pooya |
Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
|
2020 |
Choudhury, Ashish |
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials
|
2020 |
Phalakarn, Kittiphop |
High Throughput Secure MPC over Small Population in Hybrid Networks (Extended Abstract)
|
2020 |
Choudhury, Ashish |
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
|
2020 |
Arte, Vivek |
Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation
|
2020 |
Hoffmann, Clément |
Proof-of-Reputation Blockchain with Nakamoto Fallback
|
2020 |
Kleinrock, Leonard |
Verifpal: Cryptographic Protocol Analysis for the Real World
|
2020 |
Kobeissi, Nadim |
Cryptanalysis of the Permutation Based Algorithm SpoC
|
2020 |
Kraleva, Liliya |
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key Settings
|
2020 |
Cid, Carlos |
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
|
2020 |
Eichlseder, Maria |
On a Dual/Hybrid Approach to Small Secret LWE
|
2020 |
Espitau, Thomas |
On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality
|
2020 |
Yamashita, Kyosuke |
Encrypted Key-Value Stores
|
2020 |
Agarwal, Archita |
Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448
|
2020 |
Niasar, Mojtaba Bisheh |