Linked e-resources
Details
Table of Contents
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing
Decryption Algorithm Substitution Attacks
Subversion-Resistant Simulation (Knowledge) Sound NIZKs
Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Efficient Fully Secure Leakage-Deterring Encryption
Sharing the LUOV: Threshold Post-Quantum Signatures
Commodity-Based 2PC for Arithmetic Circuits
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Forgery Attacks on FlexAE and FlexAEAD
Key Recovery Attacks on Some Rank Metric Code-based Signatures
On the Security of Multikey Homomorphic Encryption
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model
Distributing any Elliptic Curve Based Protocol.
Decryption Algorithm Substitution Attacks
Subversion-Resistant Simulation (Knowledge) Sound NIZKs
Classification of self-dual codes of length 20 over nmathbb{Z}_4 and length at most 18 over nmathbb{F}_2 + unmathbb{F}_2
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange
Efficient Fully Secure Leakage-Deterring Encryption
Sharing the LUOV: Threshold Post-Quantum Signatures
Commodity-Based 2PC for Arithmetic Circuits
Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions
Forgery Attacks on FlexAE and FlexAEAD
Key Recovery Attacks on Some Rank Metric Code-based Signatures
On the Security of Multikey Homomorphic Encryption
RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations
Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data
Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model
Distributing any Elliptic Curve Based Protocol.