DMA’n’Play: Practical Remote Attestation Based on Direct Memory Access
|
2023 |
Surminski, Sebastian |
QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
|
2023 |
Kern, Dustin |
A Framework for UC Secure Privacy Preserving Biometric Authentication Using Efficient Functional Encryption
|
2023 |
Ernst, Johannes |
On the Complete Non-malleability of the Fujisaki-Okamoto Transform
|
2023 |
Friolo, Daniele |
Low Memory Attacks on Small Key CSIDH
|
2023 |
Chi-Domínguez, Jesús-Javier |
GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges
|
2023 |
Beguinet, Hugo |
A New Approach to Garbled Circuits
|
2023 |
Acharya, Anasuya |
Mt. Random: Multi-tiered Randomness Beacons
|
2023 |
Cascudo, Ignacio |
Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities
|
2023 |
Xu, Yongfeng |
Publicly Auditable Functional Encryption
|
2023 |
Koutsos, Vlasis |
Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
|
2023 |
Ciampi, Michele |
An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps
|
2023 |
Sentana, I. Wayan Budi |
A Forkcipher-Based Pseudo-Random Number Generator
|
2023 |
Andreeva, Elena |
Practical Robust DKG Protocols for CSIDH
|
2023 |
Atapoor, Shahla |
Subversion-Resilient Authenticated Encryption Without Random Oracles
|
2023 |
Bemmann, Pascal |
Scored Anonymous Credentials
|
2023 |
Chow, Sherman S. M. |
Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS
|
2023 |
Hiwatashi, Keitaro |
Revisiting Transaction Ledger Robustness in the Miner Extractable Value Era
|
2023 |
Kamphuis, Fredrik |
Recommendation for a Holistic Secure Embedded ISA Extension
|
2023 |
Stolz, Florian |
Predicate Private Set Intersection with Linear Complexity
|
2023 |
Yang, Yaxi |