Full Quantum Equivalence of Group Action DLog and CDH, and More
|
2022 |
Montgomery, Hart |
SwirTEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves: Faster Indifferentiable Hashing to Elliptic Curves
|
2022 |
Chavez-Saab, Jorge |
Collusion-Resistant Functional Encryption for RAMs
|
2022 |
Ananth, Prabhanjan |
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH
|
2022 |
Datta, Pratish |
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forré
|
2022 |
Coutinho, Murilo |
Enhancing Differential-Neural Cryptanalysis
|
2022 |
Bao, Zhenzhen |
A Modular Approach to the Security Analysis of Two-Permutation Constructions
|
2022 |
Chen, Yu Long |
Random Sources in Private Computation
|
2022 |
Couteau, Geoffroy |
Efficient Adaptively-Secure Byzantine Agreement for Long Messages
|
2022 |
Bhangale, Amey |
Attaining GOD Beyond Honest Majority with Friends and Foes
|
2022 |
Hegde, Aditya |
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model
|
2022 |
Cascudo, Ignacio |
A Universally Composable Non-interactive Aggregate Cash System
|
2022 |
Jia, Yanxue |
SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients
|
2022 |
Abusalah, Hamza |
Cryptographic Primitives with Hinting Property
|
2022 |
Alamati, Navid |
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256
|
2022 |
Qin, Lingyue |
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery
|
2022 |
Song, Ling |
Towards Practical Topology-Hiding Computation
|
2022 |
Li, Shuaishuai |
Non-interactive Mimblewimble Transactions, Revisited
|
2022 |
Fuchsbauer, Georg |
Algebraic Meet-in-the-Middle Attack on LowMC
|
2022 |
Liu, Fukang |
Witness Encryption and Null-IO from Evasive LWE
|
2022 |
Vaikuntanathan, Vinod |