Implicit White-Box Implementations: White-Boxing ARX Ciphers
|
2022 |
Ranea, Adrián |
Certified Everlasting Zero-Knowledge Proof for QMA
|
2022 |
Hiroka, Taiga |
Cryptography from Pseudorandom Quantum States
|
2022 |
Ananth, Prabhanjan |
Semi-quantum Tokenized Signatures
|
2022 |
Shmueli, Omri |
Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching
|
2022 |
Garimella, Gayathri |
Two-Round MPC Without Round Collapsing Revisited — Towards Efficient Malicious Protocols
|
2022 |
Lin, Hutjia |
Parallel Repetition of (k1,ku)-Special-Sound Multi-round Interactive Proofs
|
2022 |
Attema, Thomas |
Succinct Interactive Oracle Proofs: Applications and Limitations
|
2022 |
Nassar, Shafık |
Candidate Witness Encryption from Lattice Techniques
|
2022 |
Tsabary, Rotem |
Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt
|
2022 |
Hülsing, Andreas |
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
|
2022 |
Bao, Zhenzhen |
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruption
|
2022 |
Nielsen, Jesper Buus |
Securing Approximate Homomorphic Encryption Using Differential Privacy
|
2022 |
Li, Baiyu |
SoftSpokenOT: Quieter OT Extension from Small-Field Silent VOLE in the Minicrypt Model
|
2022 |
Roy, Lawrence |
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions
|
2022 |
Fernando, Rex |
(Nondeterministic) Hardness vs. Non-malleability
|
2022 |
Ball, Marshall |
Quantum Commitments and Signatures Without One-Way Functions
|
2022 |
Morimae, Tomoyuki |
More Efficient Dishonest Majority Secure Computation over Z 2 k via Galois Rings
|
2022 |
Escudero, Daniel |
Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash
|
2022 |
Kiyoshima, Susumu |
Faster Sounder Succinet Arguments and IOPs
|
2022 |
Holmgren, Justin |