Post-quantum Anonymity of Kyber
|
2023 |
Maram, Varun |
QCCA-Secure Generic Transformations in the Quantum Random Oracle Model
|
2023 |
Shan, Tianshu |
The Hidden Number Problem with Small Unknown Multipliers: Cryptanalyzing MEGA in Six Queries and Other Applications
|
2023 |
Heninger, Nadia |
SCALLOP: Scaling the CSI-FiSh
|
2023 |
Feo, Luca De |
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH
|
2023 |
Badrinarayanan, Saikrishna |
EKE Meets Tight Security in the Universally Composable Framework
|
2023 |
Liu, Xiangyu |
Sender-binding Key Encapsulation
|
2023 |
Benz, Laurin |
A Lightweight Identification Protocol Based on Lattices
|
2023 |
Düzlü, Samed |
Hull Attacks on the Lattice Isomorphism Problem
|
2023 |
Ducas, Léo |
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
|
2023 |
Baum, Carsten |
Generic Models for Group Actions
|
2023 |
Duman, Julien |
Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded
|
2023 |
Datta, Pratish |
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs
|
2023 |
Venema, Marloes |
A Universally Composable PAKE with Zero Communication Cost: (And Why It Shouldn’t Be Considered UC-Secure)
|
2023 |
Roy, Lawrence |
Pattern Matching in Encrypted Stream from Inner Product Encryption
|
2023 |
Bouscatié, Élie |
POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption
|
2023 |
Hoffmann, Clément |
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA
|
2023 |
Bellare, Mihir |
Extendable Threshold Ring Signatures with Enhanced Anonymity
|
2023 |
Avitabile, Gennaro |
Security Analysis of RSA-BSSA
|
2023 |
Lysyanskaya, Anna |
Transparent Batchable Time-lock Puzzles and Applications to Byzantine Consensus
|
2023 |
Srinivasan, Shravan |