KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACNS (20. : 2022 : Rom) Applied cryptography and network security
1. Verfasser: Günther, Felix (VerfasserIn)
Weitere Verfasser: Rastikian, Simon (VerfasserIn), Towa, Patrick (VerfasserIn), Wiggers, Thom (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication 2022 Shrestha, Prakash
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge 2022 Esquivel-Vargas, Herson
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols 2022 Pankova, Alisa
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation 2022 Bossuat, Jean-Philippe
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security 2022 Badrinarayanan, Saikrishna
Improving the Privacy of Tor Onion Services 2022 Eaton, Edward
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems 2022 Chhatrapati, Arush
RSA Key Recovery from Digit Equivalence Information 2022 Chuengsatiansup, Chitchanok
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges 2022 Hadipour, Hosein
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle 2022 Inoue, Akiko
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile 2022 Zhao, Liang
Progressive and Efficient Verification for Digital Signatures 2022 Boschini, Cecilia
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities 2022 Eldefrawy, Karim
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking 2022 Arfaoui, Ghada
Don’t Tamper with Dual System Encryption 2022 Yuen, Tsz Hon
Covert Authentication from Lattices 2022 Kumar, Rajendra
Efficient Two-Party Exponentiation from Quotient Transfer 2022 Lu, Yi
Revocable Hierarchical Attribute-Based Signatures from Lattices 2022 Gardham, Daniel
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA 2022 Phalakarn, Kittiphop
Carry-Less to BIKE Faster 2022 Chen, Ming-Shing
Alle Artikel auflisten