Multicast Key Agreement, Revisited
|
2022 |
Bienstock, Alexander |
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
|
2022 |
Chevallier-Mames, Benoît |
Faster Isogenies for Post-quantum Cryptography: SIKE
|
2022 |
Elkhatib, Rami |
CCA Secure A Posteriori Openable Encryption in the Standard Model
|
2022 |
Bultel, Xavier |
Adaptively Secure Laconic Function Evaluation for NC1
|
2022 |
Rosie, Răzvan |
New Attacks from Old Distinguishers Improved Attacks on Serpent
|
2022 |
Broll, Marek |
Subversion-Resilient Enhanced Privacy ID
|
2022 |
Faonio, Antonio |
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument
|
2022 |
Gjøsteen, Kristian |
Fully Projective Radical Isogenies in Constant- Time
|
2022 |
Chi-Domínguez, Jesús-Javier |
Approximate Homomorphic Encryption with Reduced Approximation Error
|
2022 |
Kim, Andrey |
More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes
|
2022 |
Wu, Han |
Pholkos — Efficient Large-State Tweakable Block Ciphers from the AES Round Function
|
2022 |
Bossert, Jannis |
Private Liquidity Matching Using MPC
|
2022 |
Atapoor, Shahla |
Attacks on Pseudo Random Number Generators Hiding a Linear Structure
|
2022 |
Martinez, Florette |
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEBAD M1/M3
|
2022 |
Fan, Yanhong |
On Fingerprinting Attacks and Length-Hiding Encryption
|
2022 |
Gellert, Kai |
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices
|
2022 |
Mukhtar, Naila |
Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
|
2022 |
Cao, Weiqgiong |
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
|
2022 |
Cui, Jiamin |
Side-Channeling the Kalyna Key Expansion
|
2022 |
Chuengsatiansup, Chitchanok |