Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication
|
2022 |
Shrestha, Prakash |
Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge
|
2022 |
Esquivel-Vargas, Herson |
Relations Between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
|
2022 |
Pankova, Alisa |
Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation
|
2022 |
Bossuat, Jean-Philippe |
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security
|
2022 |
Badrinarayanan, Saikrishna |
Improving the Privacy of Tor Onion Services
|
2022 |
Eaton, Edward |
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
|
2022 |
Chhatrapati, Arush |
RSA Key Recovery from Digit Equivalence Information
|
2022 |
Chuengsatiansup, Chitchanok |
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges
|
2022 |
Hadipour, Hosein |
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
|
2022 |
Inoue, Akiko |
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
|
2022 |
Zhao, Liang |
Progressive and Efficient Verification for Digital Signatures
|
2022 |
Boschini, Cecilia |
Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities
|
2022 |
Eldefrawy, Karim |
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking
|
2022 |
Arfaoui, Ghada |
Don’t Tamper with Dual System Encryption
|
2022 |
Yuen, Tsz Hon |
Covert Authentication from Lattices
|
2022 |
Kumar, Rajendra |
Efficient Two-Party Exponentiation from Quotient Transfer
|
2022 |
Lu, Yi |
Revocable Hierarchical Attribute-Based Signatures from Lattices
|
2022 |
Gardham, Daniel |
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA
|
2022 |
Phalakarn, Kittiphop |
Carry-Less to BIKE Faster
|
2022 |
Chen, Ming-Shing |