Post-quantum Anonymity of Kyber
|
2023 |
Maram, Varun |
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model
|
2023 |
Shan, Tianshu |
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications
|
2023 |
Heninger, Nadia |
SCALLOP: Scaling the CSI-FiSh
|
2023 |
Feo, Luca De |
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH
|
2023 |
Badrinarayanan, Saikrishna |
EKE Meets Tight Security in the Universally Composable Framework
|
2023 |
Liu, Xiangyu |
Sender-binding Key Encapsulation
|
2023 |
Benz, Laurin |
A Thorough Treatment of Highly-Efficient NTRU Instantiations
|
2023 |
Duman, Julien |
A Key-Recovery Attack Against Mitaka in the t-Probing Model
|
2023 |
Prest, Thomas |
Tracing a Linear Subspace: Application to Linearly-Homomorphic Group Signatures
|
2023 |
Hébant, Chloé |
Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments
|
2023 |
Chvojka, Peter |
Efficient and Universally Composable Single Secret Leader Election from Pairings
|
2023 |
Catalano, Dario |
Certifying Giant Nonprimes
|
2023 |
Hoffmann, Charlotte |
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles
|
2023 |
Shi, Elaine |
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption
|
2023 |
Hoffmann, Clément |
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA
|
2023 |
Bellare, Mihir |
Extendable Threshold Ring Signatures with Enhanced Anonymity
|
2023 |
Avitabile, Gennaro |
Security Analysis of RSA-BSSA
|
2023 |
Lysyanskaya, Anna |
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus
|
2023 |
Srinivasan, Shravan |
A Lightweight Identification Protocol Based on Lattices
|
2023 |
Düzlü, Samed |