Personensuche
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
The Key Lattice Framework for Concurrent Group Messaging:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
2
Traffic Analysis by Adversaries with Partial Visibility:
, In:
?
Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science ,
3
Short Concurrent Covert Authenticated Key Exchange (Short c..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
4
Boosting the Performance of High-Assurance Cryptography: Pa..:
, In:
?
Post-Quantum Cryptography; Lecture Notes in Computer Science ,
5
On the Hardness of Scheme-Switching Between SIMD FHE Scheme:
, In:
?
Proceedings of the 49th Annual International Symposium on Computer Architecture ,
6
CraterLake : a hardware accelerator for efficient unboun..:
, In:
?
Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science ,
7
In-App Cryptographically-Enforced Selective Access Control ..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
8
How Byzantine is a Send Corruption?:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
9
Communication-Efficient Proactive MPC for Dynamic Groups wi..:
, In:
?
Cryptography and Coding; Lecture Notes in Computer Science ,
10
Optimizing Registration Based Encryption:
, In:
?
Lecture Notes in Computer Science; Stabilization, Safety, and Security of Distributed Systems ,
11
On Regenerating Codes and Proactive Secret Sharing: Relatio..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
12
Machine-checked ZKP for NP relations: Formally Verified Sec..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
13
Session details: Session 4A: Post-Quantum Cryptography:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
14
Communication-Efficient Proactive Secret Sharing for Dynami..:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
15