CT-RSA B

29 papers

YearTitle / Authors
2020A Fast Characterization Method for Semi-invasive Fault Injection Attacks.
Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek
2020A Non-interactive Shuffle Argument with Low Trust Assumptions.
Antonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac
2020Another Look at Some Isogeny Hardness Assumptions.
Simon-Philipp Merz, Romy M. Minko, Christophe Petit
2020Better Bootstrapping for Approximate Homomorphic Encryption.
Kyoohyung Han, Dohyeong Ki
2020Consensus from Signatures of Work.
Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2020Cryptanalysis of the Multivariate Encryption Scheme EFLASH.
Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid
2020Cut-and-Choose for Garbled RAM.
Peihan Miao
2020Efficient FPGA Implementations of LowMC and Picnic.
Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner
2020Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations.
Nicky Mouha, Christopher Celi
2020FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups.
Jihoon Kwon, ByeongHak Lee, Jooyoung Lee, Dukjae Moon
2020Faster Homomorphic Encryption is not Enough: Improved Heuristic for Multiplicative Depth Minimization of Boolean Circuits.
Pascal Aubry, Sergiu Carpov, Renaud Sirdey
2020Generic Attack on Iterated Tweakable FX Constructions.
Ferdinand Sibleyras
2020How to Construct CSIDH on Edwards Curves.
Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2020Improved Secure Integer Comparison via Homomorphic Encryption.
Florian Bourse, Olivier Sanders, Jacques Traoré
2020Modeling Memory Faults in Signature and Authenticated Encryption Schemes.
Marc Fischlin, Felix Günther
2020My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined Attacks.
Siemen Dhooghe, Svetla Nikova
2020One-More Assumptions Do Not Help Fiat-Shamir-type Signature Schemes in NPROM.
Masayuki Fukumitsu, Shingo Hasegawa
2020Overdrive2k: Efficient Secure MPC over $\mathbb {Z}_{2^k}$ from Somewhat Homomorphic Encryption.
Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren
2020Policy-Based Sanitizable Signatures.
Kai Samelin, Daniel Slamanig
2020Post-quantum Provably-Secure Authentication and MAC from Mersenne Primes.
Houda Ferradi, Keita Xagawa
2020SoK: A Consensus Taxonomy in the Blockchain Era.
Juan A. Garay, Aggelos Kiayias
2020Symmetric-Key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy.
Gildas Avoine, Sébastien Canard, Loïc Ferreira
2020TMPS: Ticket-Mediated Password Strengthening.
John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sönmez Turan
2020Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model.
Yuting Xiao, Rui Zhang, Hui Ma
2020Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings
Stanislaw Jarecki
2020Traceable Inner Product Functional Encryption.
Xuan Thanh Do, Duong Hieu Phan, David Pointcheval
2020Traceable Ring Signatures with Post-quantum Security.
Hanwen Feng, Jianwei Liu, Qianhong Wu, Yanan Li
2020Universal Forgery Attack Against GCM-RUP.
Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu
2020Universally Composable Accumulators.
Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov