Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
|
2020 |
Pietrzak, Krzysztof |
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification
|
2020 |
Almeida, José Bacelar |
Formal Verification of Fair Exchange Based on Bitcoin Smart Contracts
|
2020 |
Shi, Cheng |
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
|
2020 |
Azouaoui, Melissa |
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
|
2020 |
Dutta, Abhraneel |
More Glimpses of the RC4 Internal State Array
|
2020 |
Chakraborty, Pranab |
Counting Active S-Boxes is not Enough
|
2020 |
Dunkelman, Orr |
Adaptively Secure Threshold Symmetric-Key Encryption
|
2020 |
Mukherjee, Pratyay |
Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
|
2020 |
Paul, Arinjita |
Adaptive Security of Practical Garbling Schemes
|
2020 |
Jafargholi, Zahra |
CCA-Secure ABE Using Tag and Pair Encoding
|
2020 |
Blazy, Olivier |
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
|
2020 |
Grassi, Lorenzo |
Evaluation of Quantum Cryptanalysis on SPECK
|
2020 |
Anand, Ravi |
Making the BKW Algorithm Practical for LWE
|
2020 |
Budroni, Alessandro |
Gadget-Based iNTRU Lattice Trapdoors
|
2020 |
Genise, Nicholas |
Skipping the q in Group Signatures
|
2020 |
Blazy, Olivier |
Simpler Constructions of Asymmetric Primitives from Obfuscation
|
2020 |
Farshim, Pooya |
Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
|
2020 |
Choudhury, Ashish |
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials
|
2020 |
Phalakarn, Kittiphop |
High Throughput Secure MPC over Small Population in Hybrid Networks (Extended Abstract)
|
2020 |
Choudhury, Ashish |