Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities
|
2023 |
Xu, Yongfeng |
Publicly Auditable Functional Encryption
|
2023 |
Koutsos, Vlasis |
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
|
2023 |
Ciampi, Michele |
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps
|
2023 |
Sentana, I. Wayan Budi |
A Forkcipher-Based Pseudo-Random Number Generator
|
2023 |
Andreeva, Elena |
Practical Robust DKG Protocols for CSIDH
|
2023 |
Atapoor, Shahla |
Subversion-Resilient Authenticated Encryption Without Random Oracles
|
2023 |
Bemmann, Pascal |
Scored Anonymous Credentials
|
2023 |
Chow, Sherman S. M. |
Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS
|
2023 |
Hiwatashi, Keitaro |
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era
|
2023 |
Kamphuis, Fredrik |
Recommendation for a Holistic Secure Embedded ISA Extension
|
2023 |
Stolz, Florian |
Predicate Private Set Intersection with Linear Complexity
|
2023 |
Yang, Yaxi |
Private Information Retrieval with Result Verification for More Servers
|
2023 |
Ke, Pengzhen |
Efficient Isogeny Proofs Using Generic Techniques
|
2023 |
Cong, Kelong |
Optimal Security Notion for Decentralized Multi-Client Functional Encryption
|
2023 |
Nguyen, Ky |
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
|
2023 |
Wu, Huangting |
Robustly Reusable Fuzzy Extractors in a Post-quantum World
|
2023 |
Deo, Amit |
Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem
|
2023 |
Chan, T.-H. Hubert |
DMA’n’Play: Practical Remote Attestation Based on Direct Memory Access
|
2023 |
Surminski, Sebastian |
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
|
2023 |
Kern, Dustin |