On the Multi-user Security of LWE-Based NIKE
|
2023 |
Langrehr, Roman |
One-Out-of-Many Unclonable Cryptography: Definitions, Constructions, and More
|
2023 |
Kitagawa, Fuyuki |
Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults
|
2023 |
Loss, Julian |
Agile Cryptography: A Universally Composable Approach
|
2023 |
Badertscher, Christian |
Composable Long-Term Security with Rewinding
|
2023 |
Berger, Robin |
Rigorous Foundations for Dual Attacks in Coding Theory
|
2023 |
Meyer-Hilfiger, Charles |
Pseudorandomness with Proof of Destruction and Applications
|
2023 |
Behera, Amit |
Weakening Assumptions for Publicly-Verifiable Deletion
|
2023 |
Bartusek, James |
Algebraic Group Model with Oblivious Sampling
|
2023 |
Lipmaa, Helger |
(Verifiable) Delay Functions from Lucas Sequences
|
2023 |
Hoffmann, Charlotte |
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited
|
2023 |
Cohen, Ran |
Simplex Consensus: A Simple and Fast Consensus Protocol
|
2023 |
Chan, Benjamin Y. |
Revocable Cryptography from Learning with Errors
|
2023 |
Ananth, Prabhanjan |
Semi-quantum Copy-Protectionand More
|
2023 |
Chevalier, Céline |
Public-Key Encryption with Quantum Keys
|
2023 |
Barooti, Khashayar |
Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols
|
2023 |
Cozzo, Daniele |
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals
|
2023 |
Felderhoff, Joel |
Publicly Verifiable Deletion from Minimal Assumptions
|
2023 |
Kitagawa, Fuyuki |
Limits in the Provable Security of ECDSA Signatures
|
2023 |
Hartmann, Dominik |