Fast Blind Rotation for Bootstrapping FHEs
|
2023 |
Xiang, Binwu |
Tri-State Circuits: A Circuit Model that Captures RAM
|
2023 |
Heath, David |
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
|
2023 |
Freitag, Cody |
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
|
2023 |
Bombar, Maxime |
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE
|
2023 |
Agrawal, Shweta |
Algebraic Reductions of Knowledge
|
2023 |
Kothapalli, Abhiram |
HERMES: Efficient Ring Packing Using MLWE Ciphertexts and Application to Transciphering
|
2023 |
Bae, Youngjin |
MacORAMa: Optimal Oblivious RAM with Integrity
|
2023 |
Mathialagan, Surya |
The Pseudorandom Oracle Model and Ideal Obfuscation
|
2023 |
Jain, Aayush |
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications
|
2023 |
Yeo, Kevin |
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation
|
2023 |
Gellert, Kai |
Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums
|
2023 |
Agrawal, Shweta |
Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN
|
2023 |
Raghuraman, Srinivasan |
A Note on Non-interactive Zero-Knowledge from CDH
|
2023 |
Couteau, Geoffroy |
Accelerating HE Operations from Key Decomposition Technique
|
2023 |
Kim, Miran |
Limits of Breach-Resistant and Snapshot-Oblivious RAMs
|
2023 |
Persiano, Giuseppe |
Computational Wiretap Coding from Indistinguishability Obfuscation
|
2023 |
Ishai, Yuval |
Fork-Resilient Continuous Group Key Agreement
|
2023 |
Alwen, Joël |
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
|
2023 |
Davies, Gareth T. |
On Active Attack Detection in Messaging with Immediate Decryption
|
2023 |
Barooti, Khashayar |