EPIGRAM: Practical Garbled RAM
|
2022 |
Heath, David |
Round-Optimal Byzantine Agreement
|
2022 |
Ghinea, Diana |
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss
|
2022 |
Wu, Ke |
Universally Composable Subversion-Resilient Cryptography
|
2022 |
Chakraborty, Suvradip |
Round-Optimal Multi-party Computation with Identifiable Abort
|
2022 |
Ciampi, Michele |
Secure Multiparty Computation with Free Branching
|
2022 |
Goel, Aarushi |
High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization
|
2022 |
Lee, Yongwoo |
Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round
|
2022 |
Abram, Damiano |
Round-Optimal and Communication-Efficient Multiparty Computation
|
2022 |
Ciampi, Michele |
Guaranteed Output in O(√n) Rounds for Round-Robin Sampling Protocols
|
2022 |
Cohen, Ran |
Highly Efficient OT-Based Multiplication Protocols
|
2022 |
Haitner, Iftach |
Asymptotically Quasi-Optimal Cryptography
|
2022 |
Castro, Leo de |
Field Instruction Multiple Data
|
2022 |
Aung, Khin Mi Mi |
Round-Optimal Black-Box Protocol Compilers
|
2022 |
Ishai, Yuval |
Rubato: Noisy Ciphers for Approximate Homomorphic Encryption
|
2022 |
Ha, Jincheol |
Limits of Polynomial Packings for Zpk and Fpk
|
2022 |
Cheon, Jung Hee |
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs
|
2022 |
Yao, Li |
Incompressible Cryptography
|
2022 |
Guan, Jiaxin |
Garbled Circuits with Sublinear Evaluator
|
2022 |
Haque, Abida |
Lightweight, Maliciously Secure Verifiable Function Secret Sharing
|
2022 |
Castro, Leo de |