Pre-computation Scheme of Window 𝜏NAF for Koblitz Curves Revisited
|
2021 |
Yu, Wei |
Fast Verification of Masking Schemes in Characteristic Two
|
2021 |
Bordes, Nicolas |
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
|
2021 |
Brian, Gianluca |
Security Analysis of Quantum Lightning
|
2021 |
Roberts, Bhaskar |
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN
|
2021 |
Couteau, Geoffroy |
Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
|
2021 |
Biryukov, Alex |
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
|
2021 |
Belaïd, Sonia |
Leakage Resilient Value Comparison with Application to Message Authentication
|
2021 |
Dobraunig, Christoph |
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
|
2021 |
Chung, Kai-Min |
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
|
2021 |
Beck, Gabrielle |
The More the Merrier: Reducing the Cost of Large Scale MPC
|
2021 |
Gordon, S. Dov |
Multiparty Reusable Non-interactive Secure Computation from LWE
|
2021 |
Benhamouda, Fabrice |
Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
|
2021 |
Polychroniadou, Antigoni |
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
|
2021 |
Boyle, Elette |
CIMINION: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
|
2021 |
Dobraunig, Christoph |
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
|
2021 |
Cayrel, Pierre-Louis |
Secure Software Leasing
|
2021 |
Ananth, Prabhanjan |
Classical vs Quantum Random Oracles
|
2021 |
Yamakawa, Takashi |
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
|
2021 |
Rindal, Peter |
Password Hashing and Preprocessing
|
2021 |
Farshim, Pooya |