A Rational Protocol Treatment of 51% Attacks
|
2021 |
Badertscher, Christian |
Secure Wire Shuffling in the Probing Model
|
2021 |
Coron, Jean-Sebastien |
Improved Torsion-Point Attacks on SIDH Varlants
|
2021 |
Quehen, Victoria de |
Asymptotically-Good Arithmetic Secret Sharing over Z/p‘Z with Strong Multiplication and Its Applications to Efficient MPC
|
2021 |
Cramer, Ronald |
Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes
|
2021 |
Maji, Hemanta K. |
Meet-in-the-Middle Attacks Revisited: Key-Recovery Collision and Preimage Attacks
|
2021 |
Dong, Xiaoyang |
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques
|
2021 |
Liu, Fukang |
The Cost to Break SIKE: A Comparative Hardware-Based Analysıs with AES and SHA-3
|
2021 |
Longa, Patrick |
Non-malleable Codes for Bounded Parallel-Time Tampering
|
2021 |
Dachman-Soled, Dana |
Upslices, Downslices, and Secret-Sharing with Complexity of 1.5
|
2021 |
Applebaum, Benny |
Large Message Homomorphic Secret Sharing from DCR and Applications
|
2021 |
Roy, Lawrence |
Tight State-Restoration Soundness in the Algebraic Group Model
|
2021 |
Ghoshal, Ashrujit |
Separating Adaptive Streaming from Oblivious Streaming Using the Bounded Storage Model
|
2021 |
Kaplan, Haim |
MoSS: Modular Security Specifications Framework
|
2021 |
Herzberg, Amir |
Provable Security Analysis of FIDO2
|
2021 |
Barbosa, Manuel |
Towards Tight Random Probing Security
|
2021 |
Cassiers, Gaëtan |
SSE and SSD: Page-Efficient Searchable Symmetric Encryption
|
2021 |
Bossuat, Angele |
Differential-Linear Cryptanalysis from an Algebraic Perspective
|
2021 |
Liu, Meicheng |
Thinking Outside the Superbox
|
2021 |
Bordes, Nicolas |
Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes
|
2021 |
Couteau, Geoffroy |