Fast Blind Rotation for Bootstrapping FHEs
|
2023 |
Xiang, Binwu |
Tri-State Circuits: A Circuit Model that Captures RAM
|
2023 |
Heath, David |
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
|
2023 |
Freitag, Cody |
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding
|
2023 |
Bombar, Maxime |
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE
|
2023 |
Agrawal, Shweta |
Algebraic Reductions of Knowledge
|
2023 |
Kothapalli, Abhiram |
Accelerating HE Operations from Key Decomposition Technique
|
2023 |
Kim, Miran |
Limits of Breach-Resistant and Snapshot-Oblivious RAMs
|
2023 |
Persiano, Giuseppe |
Computational Wiretap Coding from Indistinguishability Obfuscation
|
2023 |
Ishai, Yuval |
Fork-Resilient Continuous Group Key Agreement
|
2023 |
Alwen, Joël |
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
|
2023 |
Davies, Gareth T. |
On Active Attack Detection in Messaging with Immediate Decryption
|
2023 |
Barooti, Khashayar |
Streaming Functional Encryption
|
2023 |
Guan, Jiaxin |
On the Impossibility of Algebraic NIZK in Pairing-Free Groups
|
2023 |
Giunta, Emanuele |
Correlation Intractability and SNARGs from Sub-exponential DDH
|
2023 |
Choudhuri, Arka Rai |
HERMES: Efficient Ring Packing Using MLWE Ciphertexts and Application to Transciphering
|
2023 |
Bae, Youngjin |
MacORAMa: Optimal Oblivious RAM with Integrity
|
2023 |
Mathialagan, Surya |
The Pseudorandom Oracle Model and Ideal Obfuscation
|
2023 |
Jain, Aayush |
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications
|
2023 |
Yeo, Kevin |
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation
|
2023 |
Gellert, Kai |