On Forging SPHINCS+-Haraka Signatures on a Fault-Tolerant Quantum Computer
|
2021 |
Berger, Robin M. |
Implementing and Measuring KEMTLS
|
2021 |
Celi, Sofia |
Attribute-Based Access Control for Inner Product Functional Encryption from LWE
|
2021 |
Pal, Tapas |
Differential-ML Distinguisher: Machine Learning Based Generic Extension for Differential Cryptanalysis
|
2021 |
Yadav, Tarun |
Train or Adapt a Deeply Learned Profile?
|
2021 |
Genevey-Metat, Christophe |
Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoToo
|
2021 |
Hevia, Alejandro |
3 Honest Majority MPC with Abort with Minimal Online Communication
|
2021 |
Dalskov, Anders |
The Cost of IEEFE Arithmetic in Secure Computation
|
2021 |
Archer, David W. |
A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates
|
2021 |
Bisheh-Niasar, Mojtaba |
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange
|
2021 |
Stebila, Nina Bindel. Douglas |
Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling
|
2021 |
Makri, Eleftheria |
Constructions for Quantum Indistinguishability Obfuscation
|
2021 |
Broadbent, Anne |
Autocorrelations of Vectorial Boolean Functions
|
2021 |
Canteaut, Anne |
Weight-Based Nakamoto-Style Blockchains
|
2021 |
Kamp, Simon Holmgaard |
LOVE a Pairing
|
2021 |
Aranha, Diego E |
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
|
2021 |
Munch-Hansen, Alexander |
Improved Threshold Signatures, Proactive Secret Sharing, and Input Certification from LSS Isomorphisms
|
2021 |
E, Diego |
Tight Bounds for Simon’s Algorithm
|
2021 |
Bonnetain, Xavier |
Post-quantum Key-Blinding for Authentication in Anonymity Networks
|
2021 |
Eaton, Edward |
Classical Attacks on a Variant of the RSA Cryptosystem
|
2021 |
Nitaj, Abderrahmane |