Personensuche
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
The Key Lattice Framework for Concurrent Group Messaging:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
2
Traffic Analysis by Adversaries with Partial Visibility:
, In:
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
3
On the Hardness of Scheme-Switching Between SIMD FHE Scheme:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
4
Short Concurrent Covert Authenticated Key Exchange (Short c..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
5
Boosting the Performance of High-Assurance Cryptography: Pa..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
7
Communication-Efficient Proactive MPC for Dynamic Groups wi..:
, In:
?
Proceedings of the 49th Annual International Symposium on Computer Architecture ,
8
CraterLake : a hardware accelerator for efficient unboun..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
9
How Byzantine is a Send Corruption?:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
10