Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
|
2022 |
Cao, Weiqgiong |
Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
|
2022 |
Cui, Jiamin |
Side-Channeling the Kalyna Key Expansion
|
2022 |
Chuengsatiansup, Chitchanok |
A New Adaptive Attack on SIDH
|
2022 |
Fouotsa, Tako Boris |
Dynamic Universal Accumulator with Batch Update over Bilinear Groups
|
2022 |
Vitto, Giuseppe |
FASTA — A Stream Cipher for Fast FHE Evaluation
|
2022 |
Cid, Carlos |
Robust Subgroup Multi-signatures for Consensus
|
2022 |
Galindo, David |
Multicast Key Agreement, Revisited
|
2022 |
Bienstock, Alexander |
A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
|
2022 |
Chevallier-Mames, Benoît |
Faster Isogenies for Post-quantum Cryptography: SIKE
|
2022 |
Elkhatib, Rami |
CCA Secure A Posteriori Openable Encryption in the Standard Model
|
2022 |
Bultel, Xavier |
Adaptively Secure Laconic Function Evaluation for NC1
|
2022 |
Rosie, Răzvan |
New Attacks from Old Distinguishers Improved Attacks on Serpent
|
2022 |
Broll, Marek |
Subversion-Resilient Enhanced Privacy ID
|
2022 |
Faonio, Antonio |
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument
|
2022 |
Gjøsteen, Kristian |
Fully Projective Radical Isogenies in Constant- Time
|
2022 |
Chi-Domínguez, Jesús-Javier |
Approximate Homomorphic Encryption with Reduced Approximation Error
|
2022 |
Kim, Andrey |
More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes
|
2022 |
Wu, Han |
Pholkos — Efficient Large-State Tweakable Block Ciphers from the AES Round Function
|
2022 |
Bossert, Jannis |
Private Liquidity Matching Using MPC
|
2022 |
Atapoor, Shahla |