Full Quantum Equivalence of Group Action DLog and CDH, and More
|
2022 |
Montgomery, Hart |
SwirTEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves: Faster Indifferentiable Hashing to Elliptic Curves
|
2022 |
Chavez-Saab, Jorge |
Collusion-Resistant Functional Encryption for RAMs
|
2022 |
Ananth, Prabhanjan |
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH
|
2022 |
Datta, Pratish |
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forré
|
2022 |
Coutinho, Murilo |
Enhancing Differential-Neural Cryptanalysis
|
2022 |
Bao, Zhenzhen |
A Modular Approach to the Security Analysis of Two-Permutation Constructions
|
2022 |
Chen, Yu Long |
Random Sources in Private Computation
|
2022 |
Couteau, Geoffroy |
Efficient Adaptively-Secure Byzantine Agreement for Long Messages
|
2022 |
Bhangale, Amey |
Attaining GOD Beyond Honest Majority with Friends and Foes
|
2022 |
Hegde, Aditya |
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model
|
2022 |
Cascudo, Ignacio |
A Universally Composable Non-interactive Aggregate Cash System
|
2022 |
Jia, Yanxue |
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients
|
2022 |
Abusalah, Hamza |
Algebraic Meet-in-the-Middle Attack on LowMC
|
2022 |
Liu, Fukang |
Witness Encryption and Null-IO from Evasive LWE
|
2022 |
Vaikuntanathan, Vinod |
Towards Tight Security Bounds for OMAC, XCBC and TMAC
|
2022 |
Chattopadhyay, Soumya |
Practical Provably Secure Flooding for Blockchains
|
2022 |
Liu-Zhang, Chen-Da |
Multi-Client Functional Encryption with Fine-Grained Access Control
|
2022 |
Nguyen, Ky |
Non-interactive Secure Computation of Inner-Product from LPN and LWE
|
2022 |
Couteau, Geoffroy |
Concurrently Composable Non-interactive Secure Computation
|
2022 |
Morgan, Andrew |