horter Hash-and-Sign Lattice-Based Signatures
|
2022 |
Espitau, Thomas |
On the Feasibility of Unclonable Encryption, and More
|
2022 |
Ananth, Prabhanjan |
On Codes and Learning with Errors over Function Fields
|
2022 |
Bombar, Maxime |
CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs
|
2022 |
Cremers, Cas |
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General
|
2022 |
Lyubashevsky, Vadim |
Universally Composable End-to-End Secure Messaging
|
2022 |
Canetti, Ran |
On the Impossibility of Key Agreements from Quantum Random Oracles
|
2022 |
Austrin, Per |
MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase
|
2022 |
Boschini, Cecilia |
Practical Statistically-Sound Proofs of Exponentiation in Any Group
|
2022 |
Hoffmann, Charlotte |
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
|
2022 |
Matt, Christian |
Multimodal Private Signatures
|
2022 |
Nguyen, Khoa |
On the Insider Security of MLS
|
2022 |
Alwen, Joël |
A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling
|
2022 |
Pino, Rafael del |
Succinct Classical Verification of Quantum Computation
|
2022 |
Bartusek, James |
Batch Arguments for NP and More from Standard Bilinear Group Assumptions
|
2022 |
Waters, Brent |
Syndrome Decoding in the Head: Shorter Signatures from Zero-Knowledge Proofs
|
2022 |
Feneuil, Thibauld |
Breaking Rainbow Takes a Weekend on a Laptop
|
2022 |
Beullens, Ward |
Correlated Pseudorandomness from Expand-Accumulate Codes
|
2022 |
Boyle, Elette |
Password-Authenticated Key Exchange from Group Actions
|
2022 |
Abdalla, Michel |
Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation
|
2022 |
Ishai, Yuval |