Verification Protocol for Stable Matching from Conditional Disclosure of Secrets
|
2024 |
Phalakarn, Kittiphop |
Non-malleable Fuzzy Extractors
|
2024 |
Francati, Danilo |
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More
|
2024 |
Naito, Yusuke |
Practical Lattice-Based Distributed Signatures for a Small Number of Signers
|
2024 |
Alkadri, Nabil Alkeilani |
Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials
|
2024 |
Bettale, Luk |
A New Approach to Efficient and Secure Fixed-Point Computation
|
2024 |
Frederiksen, Tore Kasper |
Upgrading Fuzzy Extractors
|
2024 |
Cachet, Chloe |
Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections
|
2024 |
Doan, Thi Van Thao |
Subversion-Resilient Signatures Without Random Oracles
|
2024 |
Bemmann, Pascal |
CryptoZoo: A Viewer for Reduction Proofs
|
2024 |
Brzuska, Chris |
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing
|
2024 |
Wang, Pengfei |
X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices
|
2024 |
Liberati, Edoardo |
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
|
2024 |
Berger, Robin |
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
|
2024 |
Emura, Keita |
Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols
|
2024 |
Carpent, Xavier |
Efficient Clustering on Encrypted Data
|
2024 |
Zhang, Mengyu |
Exploring SIDH-Based Signature Parameters
|
2024 |
Basso, Andrea |
Building MPCitH-Based Signatures from MQ, MinRank, and Rank SD
|
2024 |
Feneuil, Thibauld |