Title | Authors |
---|---|
A General Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Key-Aggregation |
|
A New Approach to Efficient and Secure Fixed-point Computation |
|
Alternative key schedules for the AES |
|
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing |
|
Automated Issuance of Post-Quantum Certificates: a New Challenge |
|
Biscuit: New MPCitH Signatures from Structured Multivariate Polynomials |
|
Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures |
|
Breaking DPA-protected Kyber via the pair-pointwise multiplication |
|
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining |
|
DoSat: A DDoS Attack on the Vulnerable Time-varying Topology of LEO Satellite Networks |
|
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World |
|
Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols |
|
Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections |
|
Fair Private Set Intersection using Smart Contracts |
|
Generalized Initialization of the Duplex Construction |
|
“Hello? Is there anybody in there?” Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure |
|
How Users Investigate Phishing Emails that Lack Traditional Phishing Cues |
|
KIVR: Committing Authenticated Encryption Using Plaintext Redundancy and Application to GCM, CCM, and More |
|
Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps |
|
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function |
|
Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption |
|
Mirrored Commitment: Fixing “Randomized Partial Checking” and Applications |
|
Non-malleable Fuzzy Extractors |
|
On the Untapped Potential of the Quantum FLT-based Inversion |
|
Privacy-Preserving Verifiable CNNs |
|
Programmable Payment Channels |
|
ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security |
|
Security Analysis of BigBlueButton and eduMEET |
|
SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations |
|
Two-Party Decision Tree Training from Updatable Order-Revealing Encryption |
|
Upgrading Fuzzy Extractors |
|
Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures |
|
Verification Protocol for Stable Matching from Conditional Disclosure of Secrets |
|
X-Lock: a secure XOR-based fuzzy extractor for resource constrained devices |
|