Garbled Circuits with Sublinear Evaluator
|
2022 |
Haque, Abida |
Lightweight, Maliciously Secure Verifiable Function Secret Sharing
|
2022 |
Castro, Leo de |
On the Security of ECDSA with Additive Key Derivation and Presignatures
|
2022 |
Groth, Jens |
Secure Multiparty Computation wıth Sublinear Preprocessing
|
2022 |
Boyle, Elette |
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
|
2022 |
Gentry, Craig |
Sine Series Approximation of the Mod Function for Bootstrapping of Approximate HE
|
2022 |
Jutla, Charanjit S. |
Indistinguishability Obfuscation from LPN over Fp, DLIN, and PRGs in NC0
|
2022 |
Jain, Aayush |
COA-Secure Obfuscation and Applications
|
2022 |
Canetti, Ran |
Unclonable Polymers and Their Cryptographic Applications
|
2022 |
Almashaqbeh, Ghada |
Round-Optimal and Communication-Efficient Multiparty Computation
|
2022 |
Ciampi, Michele |
Guaranteed Output in O(√n) Rounds for Round-Robin Sampling Protocols
|
2022 |
Cohen, Ran |
Highly Efficient OT-Based Multiplication Protocols
|
2022 |
Haitner, Iftach |
Asymptotically Quasi-Optimal Cryptography
|
2022 |
Castro, Leo de |
Field Instruction Multiple Data
|
2022 |
Aung, Khin Mi Mi |
Round-Optimal Black-Box Protocol Compilers
|
2022 |
Ishai, Yuval |
Rubato: Noisy Ciphers for Approximate Homomorphic Encryption
|
2022 |
Ha, Jincheol |
Limits of Polynomial Packings for Zpk and Fpk
|
2022 |
Cheon, Jung Hee |
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs
|
2022 |
Yao, Li |
Incompressible Cryptography
|
2022 |
Guan, Jiaxin |
EPIGRAM: Practical Garbled RAM
|
2022 |
Heath, David |