The Matrix Reloaded: Multiplication Strategies in FrodoKEM
|
2021 |
Bos, Joppe W. |
FO-like Combiners and Hybrid Post-Quantum Cryptography
|
2021 |
Huguenin-Dumittan, Lois |
On the Higher-Bit Version of Approximate Inhomogeneous Short Integer Solution Problem
|
2021 |
Dévéhat, Anaëlle Le |
Attestation Waves: Platform Trust via Remote Power Analysis
|
2021 |
Delgado-Lozano, Ignacio M. |
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting
|
2021 |
Finogina, Tamara |
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
|
2021 |
Hell, Martin |
Efficient Threshold-Optimal ECDSA
|
2021 |
Pettit, Michaella |
Report and Trace Ring Signatures
|
2021 |
Fraser, Ashley |
Practical Continuously Non-malleable Randomness Encoders in the Random Oracle Model
|
2021 |
Faonio, Antonio |
How Distance-Bounding Can Detect Internet Traffic Hijacking
|
2021 |
Arfaoui, Ghada |
Towards Quantum Large-Scale Password Guessing on Real-World Distributions
|
2021 |
Dürmuth, Markus |
THC: Practical and Cost-Effective Verification of Delegated Computation
|
2021 |
Rauzy, Pablo |
TIRAMISU: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
|
2021 |
Baghery, Karim |
Partition Oracles from Weak Key Forgeries
|
2021 |
Armour, Marcel |
BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
|
2021 |
Alkadri, Nabil Alkeilani |
GMMT: A Revocable Group Merkle Multi-tree Signature Scheme
|
2021 |
Yehia, Mahmoud |
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
|
2021 |
Bogatov, Dmytro |
Cross-Domain Attribute-Based Access Control Encryption
|
2021 |
Sedaghat, Mahdi |
Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption
|
2021 |
Ibarrondo, Alberto |
Selectively Linkable Group Signatures—Stronger Security and Preserved Verifiability
|
2021 |
Fraser, Ashley |