End-to-End Secure Messaging with Traceability Only for Illegal Content
|
2023 |
Bartusek, James |
Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging
|
2023 |
Rosler, Paul |
Randomized Half-Ideal Cipher on Groups with Applications to UC (a)PAKE
|
2023 |
Santos, Bruno Freitas Dos |
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening LIiveness
|
2023 |
Dodis, Yevgeniy |
Caveat Implementor! Key Recovery Attacks on MEGA
|
2023 |
Albrecht, Martin R. |
M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information
|
2023 |
Fouotsa, Tako Boris |
Disorientation Faults in CSIDH
|
2023 |
Banegas, Gustavo |
An Efficient Key Recovery Attack on SIDH
|
2023 |
Castryck, Wouter |
Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions
|
2023 |
Pan, Jiaxin |
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies
|
2023 |
Boneh, Dan |
Threshold and Multi-signature Schemes from Linear Hash Functions
|
2023 |
Tessaro, Stefano |
Rai-Choo! Evolving Blind Signatures to the Next Level
|
2023 |
Hanzlik, Lucjan |
Asymmetric Group Message Franking: Definitions and Constructions
|
2023 |
Lai, Junzuo |
A Direct Key Recovery Attackon SIDH
|
2023 |
Maino, Luciano |
Revisiting BBS Signatures
|
2023 |
Tessaro, Stefano |
Non-interactive Blind Signatures for Random Messages
|
2023 |
Hanzlik, Lucjan |
Short Signatures from Regular Syndrome Decoding in the Head
|
2023 |
Carozza, Eliana |
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication
|
2023 |
Hesse, Julia |
Finding Many Collisions via Reusable Quantum Walks: Application to Lattice Sieving
|
2023 |
Bonnetain, Xavier |
Just How Hard Are Rotations of Zn? Algorithms and Cryptography with the Simplest Lattice
|
2023 |
Bennett, Huck |