Implicit White-Box Implementations: White-Boxing ARX Ciphers
|
2022 |
Ranea, Adrián |
Certified Everlasting Zero-Knowledge Proof for QMA
|
2022 |
Hiroka, Taiga |
Cryptography from Pseudorandom Quantum States
|
2022 |
Ananth, Prabhanjan |
Semi-quantum Tokenized Signatures
|
2022 |
Shmueli, Omri |
Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching
|
2022 |
Garimella, Gayathri |
Two-Round MPC Without Round Collapsing Revisited — Towards Efficient Malicious Protocols
|
2022 |
Lin, Hutjia |
Parallel Repetition of (k1,ku)-Special-Sound Multi-round Interactive Proofs
|
2022 |
Attema, Thomas |
Succinct Interactive Oracle Proofs: Applications and Limitations
|
2022 |
Nassar, Shafık |
Candidate Witness Encryption from Lattice Techniques
|
2022 |
Tsabary, Rotem |
Formal Verification of Saber’s Public-Key Encryption Scheme in EasyCrypt
|
2022 |
Hülsing, Andreas |
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing
|
2022 |
Bao, Zhenzhen |
Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruption
|
2022 |
Nielsen, Jesper Buus |
Securing Approximate Homomorphic Encryption Using Differential Privacy
|
2022 |
Li, Baiyu |
SoftSpokenOT: Quieter OT Extension from Small-Field Silent VOLE in the Minicrypt Model
|
2022 |
Roy, Lawrence |
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions
|
2022 |
Fernando, Rex |
Rotational Differential-Linear Distinguishers of ARX Ciphers with Arbitrary Output Linear Masks
|
2022 |
Niu, Zhongfeng |
Triangulating Rebound Attack on AES-like Hashing
|
2022 |
Dong, Xiaoyang |
Short Leakage Resilient and Non-malleable Secret Sharing Schemes
|
2022 |
Chandran, Nishanth |
Multi-input Attribute Based Encryption and Predicate Encryption
|
2022 |
Agrawal, Shweta |
Oblivious Message Retrieval
|
2022 |
Liu, Zeyu |