BLOOM: Bimodal Lattice One-out-of-Many Proofs and Applications
|
2022 |
Lyubashevsky, Vadim |
Linear-Map Vector Commitments and Their Practical Applications
|
2022 |
Campanelli, Matteo |
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures
|
2022 |
Catalano, Dario |
PointProofs, Revisited
|
2022 |
Libert, Benoît |
Statistical Decoding 2.0: Reducing Decoding to LPN
|
2022 |
Carrier, Kévin |
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies
|
2022 |
He, Jiahui |
Classically Verifiable NIZK for QMA with Preprocessing
|
2022 |
Morimae, Tomoyuki |
Recovering the Tight Security Proof of SPHINCS+
|
2022 |
Hülsing, Andreas |
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility
|
2022 |
Zhou, Zhelei |
Instantiability of Classical Random-Oracle-Model Encryption Transforms
|
2022 |
Murphy, Alice |
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model
|
2022 |
Apon, Daniel |
The Abe-Okamoto Partially Blind Signature Scheme Revisited
|
2022 |
Kastner, Julia |
Continuously Non-malleable Codes Against Bounded-Depth Tampering
|
2022 |
Brian, Gianluca |
Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning
|
2022 |
Flórez-Gutiérrez, Antonio |
On Rejection Sampling in Lyubashevsky’s Signature Scheme
|
2022 |
Devevey, Julien |
Hawk: Module LIP Makes Lattice Signatures Fast, Compact and Simple
|
2022 |
Ducas, Léo |
Universal Ring Signatures in the Standard Model
|
2022 |
Branco, Pedro |
An Analysis of the Algebraic Group Model
|
2022 |
Zhang, Cong |
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
|
2022 |
Zhou, Yuanyuan |
Functional Encryption with Secure Key Leasing
|
2022 |
Kitagawa, Fuyuki |