Round-Optimal Black-Box Protocol Compilers
|
2022 |
Ishai, Yuval |
Rubato: Noisy Ciphers for Approximate Homomorphic Encryption
|
2022 |
Ha, Jincheol |
Limits of Polynomial Packings for Zpk and Fpk
|
2022 |
Cheon, Jung Hee |
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs
|
2022 |
Yao, Li |
Incompressible Cryptography
|
2022 |
Guan, Jiaxin |
Garbled Circuits with Sublinear Evaluator
|
2022 |
Haque, Abida |
Lightweight, Maliciously Secure Verifiable Function Secret Sharing
|
2022 |
Castro, Leo de |
On the Security of ECDSA with Additive Key Derivation and Presignatures
|
2022 |
Groth, Jens |
Secure Multiparty Computation wıth Sublinear Preprocessing
|
2022 |
Boyle, Elette |
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
|
2022 |
Gentry, Craig |
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE
|
2022 |
Jutla, Charanjit S. |
Indistinguishability Obfuscation from LPN over Fp, DLIN, and PRGs in NC0
|
2022 |
Jain, Aayush |
COA-Secure Obfuscation and Applications
|
2022 |
Canetti, Ran |
Unclonable Polymers and Their Cryptographic Applications
|
2022 |
Almashaqbeh, Ghada |
EPIGRAM: Practical Garbled RAM
|
2022 |
Heath, David |
Round-Optimal Byzantine Agreement
|
2022 |
Ghinea, Diana |
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss
|
2022 |
Wu, Ke |
Universally Composable Subversion-Resilient Cryptography
|
2022 |
Chakraborty, Suvradip |
Round-Optimal Multi-party Computation with Identifiable Abort
|
2022 |
Ciampi, Michele |
Secure Multiparty Computation with Free Branching
|
2022 |
Goel, Aarushi |