On the Isogeny Problem with Torsion Point Information
|
2022 |
Fouotsa, Tako Boris |
Making Private Function Evaluation Safer, Faster, and Simpler
|
2022 |
Liu, Yi |
Two-Round Oblivious Linear Evaluation from Learning with Errors
|
2022 |
Branco, Pedro |
Traceable PRFs: Full Collusion Resistance and Active Security
|
2022 |
Maitra, Sarastij |
Radical Isogenies on Montgomery Curves
|
2022 |
Onuki, Hiroshi |
Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber
|
2022 |
D’Anvers, Jan-Pieter |
Post-quantum Security of Plain OAEP Transform
|
2022 |
Ebrahimi, Ehsan |
On the Security of OSIDH
|
2022 |
Dartois, Pierrick |
Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary Codes
|
2022 |
Karpman, Pierre |
On the Bottleneck Complexity of MPC with Correlated Randomness
|
2022 |
Orlandi, Claudio |
CNF-FSS and Its Applications
|
2022 |
Bunn, Paul |
Efficıient Verifiable Partially-Decryptable Commitments from Lattices and Applications
|
2022 |
Esgin, Muhammed F. |
Towards a Simpler Lattice Gadget Toolkit
|
2022 |
Zhang, Shiduo |
A Unified Framework for Non-universal SNAKKs
|
2022 |
Lipmaa, Helger |
Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model
|
2022 |
Devevey, Julien |
Syndrome Decoding Estimator
|
2022 |
Esser, Andre |
Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN
|
2022 |
Abram, Damiano |
Storing and Retrieving Secrets on a Blockchain
|
2022 |
Goyal, Vipul |
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes
|
2022 |
Connolly, Aisling |
Reusable Two-Round MPC from LPN
|
2022 |
Bartusek, James |