[Resource Topic] 2022/632: Recovering Rainbow's Secret Key with a First-Order Fault Attack
|
|
0
|
161
|
July 31, 2022
|
[Resource Topic] 2022/630: Enforcing fine-grained constant-time policies
|
|
0
|
108
|
July 31, 2022
|
[Resource Topic] 2022/625: Byzantine Fault Tolerance from Weak Certificates
|
|
0
|
162
|
July 31, 2022
|
[Resource Topic] 2022/619: Asynchronous Dynamic Proactive Secret Sharing under Honest Majority: Refreshing Without a Consistent View on Shares
|
|
0
|
117
|
July 31, 2022
|
[Resource Topic] 2022/610: On the Differential Spectrum of a Differentially $3$-Uniform Power Function
|
|
0
|
148
|
July 31, 2022
|
[Resource Topic] 2022/602: Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip
|
|
0
|
83
|
July 31, 2022
|
[Resource Topic] 2022/600: A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations
|
|
0
|
123
|
July 31, 2022
|
[Resource Topic] 2022/594: A CONCRETE approach to torus fully homomorphic encryption
|
|
0
|
138
|
July 31, 2022
|
[Resource Topic] 2022/589: Unnecessary Input Heuristics & PayJoin Transactions
|
|
0
|
131
|
July 31, 2022
|
[Resource Topic] 2022/584: Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
|
|
0
|
145
|
July 31, 2022
|
[Resource Topic] 2022/554: Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication
|
|
0
|
121
|
July 31, 2022
|
[Resource Topic] 2022/551: Marlin: Two-Phase BFT with Linearity
|
|
0
|
124
|
July 31, 2022
|
[Resource Topic] 2022/547: Fast signing method in RSA with high speed verification
|
|
0
|
127
|
July 31, 2022
|
[Resource Topic] 2022/545: Logic Locking - Connecting Theory and Practice
|
|
0
|
117
|
July 31, 2022
|
[Resource Topic] 2022/540: On the revision of NIST 800-22 Test Suites
|
|
0
|
150
|
July 31, 2022
|
[Resource Topic] 2022/520: Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments
|
|
0
|
70
|
July 31, 2022
|
[Resource Topic] 2022/491: Multi-Party Computation in the GDPR
|
|
0
|
124
|
July 31, 2022
|
[Resource Topic] 2022/485: Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic
|
|
0
|
121
|
July 31, 2022
|
[Resource Topic] 2022/474: Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication
|
|
0
|
113
|
July 31, 2022
|
[Resource Topic] 2022/457: Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT
|
|
0
|
93
|
July 31, 2022
|
[Resource Topic] 2022/427: Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications
|
|
0
|
109
|
July 31, 2022
|
[Resource Topic] 2022/426: Spectre Declassified: Reading from the Right Place at the Wrong Time
|
|
0
|
102
|
July 31, 2022
|
[Resource Topic] 2022/409: Proof-of-Stake Is a Defective Mechanism
|
|
0
|
120
|
July 31, 2022
|
[Resource Topic] 2022/402: Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
|
|
0
|
79
|
July 31, 2022
|
[Resource Topic] 2022/400: Quantum Advantage from Any Non-Local Game
|
|
0
|
91
|
July 31, 2022
|
[Resource Topic] 2022/394: Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions
|
|
0
|
100
|
July 31, 2022
|
[Resource Topic] 2022/392: Poly Onions: Achieving Anonymity in the Presence of Churn
|
|
0
|
75
|
July 31, 2022
|
[Resource Topic] 2022/391: An Improved Model on the Vague Sets-Based DPoS’s Voting Phase in Blockchain
|
|
0
|
107
|
July 31, 2022
|
[Resource Topic] 2022/378: Share & Shrink: Ad-Hoc Threshold FHE with Short Ciphertexts and its Application to Almost-Asynchronous MPC
|
|
0
|
102
|
July 31, 2022
|
[Resource Topic] 2022/343: Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation
|
|
0
|
89
|
July 31, 2022
|