Post-quantum Anonymity of Kyber
|
2023 |
Maram, Varun |
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model
|
2023 |
Shan, Tianshu |
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications
|
2023 |
Heninger, Nadia |
SCALLOP: Scaling the CSI-FiSh
|
2023 |
Feo, Luca De |
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH
|
2023 |
Badrinarayanan, Saikrishna |
EKE Meets Tight Security in the Universally Composable Framework
|
2023 |
Liu, Xiangyu |
Sender-binding Key Encapsulation
|
2023 |
Benz, Laurin |
A Lightweight Identification Protocol Based on Lattices
|
2023 |
Düzlü, Samed |
Hull Attacks on the Lattice Isomorphism Problem
|
2023 |
Ducas, Léo |
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
|
2023 |
Baum, Carsten |
Generic Models for Group Actions
|
2023 |
Duman, Julien |
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded
|
2023 |
Datta, Pratish |
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs
|
2023 |
Venema, Marloes |
A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure)
|
2023 |
Roy, Lawrence |
Pattern Matching in Encrypted Stream from Inner Product Encryption
|
2023 |
Bouscatié, Élie |
A Thorough Treatment of Highly-Efficient NTRU Instantiations
|
2023 |
Duman, Julien |
A Key-Recovery Attack Against Mitaka in the t-Probing Model
|
2023 |
Prest, Thomas |
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures
|
2023 |
Hébant, Chloé |
Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments
|
2023 |
Chvojka, Peter |
Efficient and Universally Composable Single Secret Leader Election from Pairings
|
2023 |
Catalano, Dario |