The Matrix Reloaded: Multiplication Strategies in FrodoKEM
|
2021 |
Bos, Joppe W. |
FO-like Combiners and Hybrid Post-Quantum Cryptography
|
2021 |
Huguenin-Dumittan, Lois |
On the Higher-Bit Version of Approximate Inhomogeneous Short Integer Solution Problem
|
2021 |
Dévéhat, Anaëlle Le |
Attestation Waves: Platform Trust via Remote Power Analysis
|
2021 |
Delgado-Lozano, Ignacio M. |
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting
|
2021 |
Finogina, Tamara |
Cross-Domain Attribute-Based Access Control Encryption
|
2021 |
Sedaghat, Mahdi |
Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption
|
2021 |
Ibarrondo, Alberto |
Selectively Linkable Group Signatures—Stronger Security and Preserved Verifiability
|
2021 |
Fraser, Ashley |
Issuer-Hiding Attribute-Based Credentials
|
2021 |
Bobolz, Jan |
Linear-Time Oblivious Permutations for SPDZ
|
2021 |
Laud, Peeter |
Countermeasures Against Backdoor Attacks Towards Malware Detectors
|
2021 |
Narisada, Shintaro |
Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services
|
2021 |
Fietkau, Julian |
Function-Private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions
|
2021 |
Miranda, Nolan |
SoK: Secure Memory Allocation
|
2021 |
Novkovie, Bojan |
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training
|
2021 |
Hasegawa, Kento |
Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular ZK-SNARKs
|
2021 |
Abdolmaleki, Behzad |
Partition Oracles from Weak Key Forgeries
|
2021 |
Armour, Marcel |
BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
|
2021 |
Alkadri, Nabil Alkeilani |
GMMT: A Revocable Group Merkle Multi-tree Signature Scheme
|
2021 |
Yehia, Mahmoud |
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
|
2021 |
Bogatov, Dmytro |