Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting
|
2021 |
Shen, Yaobin |
Traceable Secret Sharing and Applications
|
2021 |
Goyal, Vipul |
Quadratic Secret Sharing and Conditional Disclosure of Secrets ...
|
2021 |
Beimel, Amos |
Meet-in-the-Middle Attacks Revisited: Key-Recovery Collision and Preimage Attacks
|
2021 |
Dong, Xiaoyang |
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
|
2021 |
Liu, Fukang |
The Cost to Break SIKE: A Comparative Hardware-Based Analysıs with AES and SHA-3
|
2021 |
Longa, Patrick |
Non-malleable Codes for Bounded Parallel-Time Tampering
|
2021 |
Dachman-Soled, Dana |
Upslices, Downslices, and Secret-Sharing with Complexity of 1.5
|
2021 |
Applebaum, Benny |
Large Message Homomorphic Secret Sharing from DCR and Applications
|
2021 |
Roy, Lawrence |
A Rational Protocol Treatment of 51% Attacks
|
2021 |
Badertscher, Christian |
Secure Wire Shuffling in the Probing Model
|
2021 |
Coron, Jean-Sebastien |
Improved Torsion-Point Attacks on SIDH Varlants
|
2021 |
Quehen, Victoria de |
Asymptotically-Good Arithmetic Secret Sharing over Z/p‘Z with Strong Multiplication and Its Applications to Efficient MPC
|
2021 |
Cramer, Ronald |
Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes
|
2021 |
Maji, Hemanta K. |
Tight State-Restoration Soundness in the Algebraic Group Model
|
2021 |
Ghoshal, Ashrujit |
Separating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage Model
|
2021 |
Kaplan, Haim |
MoSS: Modular Security Specifications Framework
|
2021 |
Herzberg, Amir |
Provable Security Analysis of FIDO2
|
2021 |
Barbosa, Manuel |
Towards Tight Random Probing Security
|
2021 |
Cassiers, Gaëtan |
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
|
2021 |
Bossuat, Angele |