Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting
|
2021 |
Shen, Yaobin |
Traceable Secret Sharing and Applications
|
2021 |
Goyal, Vipul |
Quadratic Secret Sharing and Conditional Disclosure of Secrets ...
|
2021 |
Beimel, Amos |
Tight State-Restoration Soundness in the Algebraic Group Model
|
2021 |
Ghoshal, Ashrujit |
Separating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage Model
|
2021 |
Kaplan, Haim |
MoSS: Modular Security Specifications Framework
|
2021 |
Herzberg, Amir |
Provable Security Analysis of FIDO2
|
2021 |
Barbosa, Manuel |
Towards Tight Random Probing Security
|
2021 |
Cassiers, Gaëtan |
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
|
2021 |
Bossuat, Angele |
Differential-Linear Cryptanalysis from an Algebraic Perspective
|
2021 |
Liu, Meicheng |
Thinking Outside the Superbox
|
2021 |
Bordes, Nicolas |
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
|
2021 |
Couteau, Geoffroy |
Improved Computational Extractors and Their Applications
|
2021 |
Khurana, Dakshita |
Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for LPN
|
2021 |
Yu, Yu |
Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing
|
2021 |
Chandran, Nishanth |
Meet-in-the-Middle Attacks Revisited: Key-Recovery Collision and Preimage Attacks
|
2021 |
Dong, Xiaoyang |
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
|
2021 |
Liu, Fukang |
The Cost to Break SIKE: A Comparative Hardware-Based Analysıs with AES and SHA-3
|
2021 |
Longa, Patrick |
Non-malleable Codes for Bounded Parallel-Time Tampering
|
2021 |
Dachman-Soled, Dana |
Upslices, Downslices, and Secret-Sharing with Complexity of 1.5
|
2021 |
Applebaum, Benny |