53:08 Transitioning the TLS protocol to post-quantum cryptography CANS - Cryptology and Network Security 1.1K views - 4 years ago
43:28 MP-SPDZ: A Versatile Framework for Multi-Party Computation CANS - Cryptology and Network Security 1.7K views - 4 years ago
50:24 Mitigating TOCTOU in Hybrid Remote Attestation (RATA: Remote Attestation with TOCTOU Avoidance) CANS - Cryptology and Network Security 91 views - 4 years ago
45:58 On the Security of (UWB) Distance Measurement CANS - Cryptology and Network Security 1.6K views - 4 years ago
18:56 Practical Privacy-Preserving Face Identification based on Function-Hiding Functional Encryption CANS - Cryptology and Network Security 158 views - 4 years ago
14:47 Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric CANS - Cryptology and Network Security 84 views - 4 years ago
17:00 Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services CANS - Cryptology and Network Security 317 views - 4 years ago
20:57 Tiramisu: Black Box Simulation Extractable NIZKs in the Updatable CRS Model CANS - Cryptology and Network Security 120 views - 4 years ago
13:45 Issuer-Hiding Attribute-Based Credentials CANS - Cryptology and Network Security 232 views - 4 years ago
19:24 THC: Practical and Cost Effective Verification of Delegated Computation CANS - Cryptology and Network Security 49 views - 4 years ago
19:44 Cross Domain Attribute Based Access Control Encryption CANS - Cryptology and Network Security 110 views - 4 years ago
19:42 Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training CANS - Cryptology and Network Security 51 views - 4 years ago
19:58 FO-like Combiners and Hybrid Post-Quantum Cryptography CANS - Cryptology and Network Security 98 views - 4 years ago
23:00 How Distance-bounding can Detect Internet Traffic Hijacking CANS - Cryptology and Network Security 87 views - 4 years ago
21:00 How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting CANS - Cryptology and Network Security 50 views - 4 years ago
18:30 BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs CANS - Cryptology and Network Security 189 views - 4 years ago
21:22 GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme CANS - Cryptology and Network Security 146 views - 4 years ago
19:45 On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem CANS - Cryptology and Network Security 253 views - 4 years ago
23:48 Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction CANS - Cryptology and Network Security 577 views - 4 years ago
22:04 Countermeasures against Backdoor Attacks towards Malware Detectors CANS - Cryptology and Network Security 75 views - 4 years ago
22:25 Selectively Linkable Group Signatures – Stronger Security and Preserved Verifiability CANS - Cryptology and Network Security 65 views - 4 years ago
17:21 Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed ... CANS - Cryptology and Network Security 59 views - 4 years ago
26:00 The Matrix Reloaded: Multiplication Strategies in FrodoKEM CANS - Cryptology and Network Security 339 views - 4 years ago
18:55 Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs CANS - Cryptology and Network Security 124 views - 4 years ago
15:28 Linear-time oblivious permutations for SPDZ CANS - Cryptology and Network Security 89 views - 4 years ago
20:43 Partition Oracles from Weak Key Forgeries CANS - Cryptology and Network Security 40 views - 4 years ago
14:55 Towards Quantum Large Scale Password Guessing on Real World Distributions CANS - Cryptology and Network Security 107 views - 4 years ago
15:01 Attestation Waves Platform Trust via Remote Power Analysis CANS - Cryptology and Network Security 104 views - 4 years ago
25:19 Efficient Threshold Optimal ECDSA CANS - Cryptology and Network Security 578 views - 4 years ago
1:03:39 Toward Secure Public Key Infrastructure: Fixing the Foundations of Applied Cryptography - Part 3 CANS - Cryptology and Network Security 104 views - 5 years ago
58:30 Probabilistic Data Structures in Adversarial Settings CANS - Cryptology and Network Security 280 views - 5 years ago
59:54 Toward Secure Public Key Infrastructure: Fixing the Foundations of Applied Cryptography - Part 2 CANS - Cryptology and Network Security 118 views - 5 years ago
56:26 Bluetooth and the Pitfalls of Wireless Protocols CANS - Cryptology and Network Security 217 views - 5 years ago
54:07 Post-Quantum Secure Group Key Exchange with Logarithmic Complexity CANS - Cryptology and Network Security 137 views - 5 years ago
1:09:01 Toward Secure Public Key Infrastructure: Fixing the Foundations of Applied Cryptography - Part 1 CANS - Cryptology and Network Security 292 views - 5 years ago
53:39 Weaponizing Network Side Channels: From TCP Hijacking to DNS Cache Poisoning CANS - Cryptology and Network Security 189 views - 5 years ago
23:52 Accelerating Lattice based Proxy Re Encryption schemes on GPUs - Full version CANS - Cryptology and Network Security 80 views - 5 years ago
12:53 Assembly or Optimized C for Lightweight Cryptography on RISC V CANS - Cryptology and Network Security 154 views - 5 years ago
25:35 Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model CANS - Cryptology and Network Security 102 views - 5 years ago
6:56 Accelerating Lattice based Proxy Re Encryption schemes on GPUs - Short version CANS - Cryptology and Network Security 65 views - 5 years ago
21:51 Semi-Commutative Masking: A Framework for Isogeny-based Protocols CANS - Cryptology and Network Security 70 views - 5 years ago
20:17 HMAC and “Secure Preferences”: Revisiting Chromium based Browsers Security CANS - Cryptology and Network Security 392 views - 5 years ago
19:36 Detecting Covert Cryptomining using HPC CANS - Cryptology and Network Security 53 views - 5 years ago
13:33 Provably Secure Scalable Distributed Authentication for Clouds CANS - Cryptology and Network Security 57 views - 5 years ago
18:15 Stronger Targeted Poisoning Attacks Against Malware Detection CANS - Cryptology and Network Security 78 views - 5 years ago
19:07 Integral Cryptanalysis of Reduced-Round Tweakable TWINE CANS - Cryptology and Network Security 224 views - 5 years ago
20:27 Lightweight Virtual Payment Channels CANS - Cryptology and Network Security 154 views - 5 years ago
23:06 Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE CANS - Cryptology and Network Security 79 views - 5 years ago
14:58 Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains CANS - Cryptology and Network Security 80 views - 5 years ago
19:18 Energy Analysis of Lightweight AEAD Circuits CANS - Cryptology and Network Security 75 views - 5 years ago
20:19 Enhancing Code Based Zero knowledge Proofs using Rank Metric CANS - Cryptology and Network Security 128 views - 5 years ago
20:06 Cross-Site Search Attacks: Unauthorized Queries over Private Data CANS - Cryptology and Network Security 92 views - 5 years ago
19:44 Trenchcoat: Human-Computable Hashing Algorithms for Password Generation CANS - Cryptology and Network Security 380 views - 5 years ago
27:24 A Secure Algorithm for Rounded Gaussian Sampling CANS - Cryptology and Network Security 48 views - 5 years ago
22:37 An Attack on Some Signature Schemes Constructed From Five Pass Identification Schemes CANS - Cryptology and Network Security 144 views - 5 years ago
17:22 STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android ... CANS - Cryptology and Network Security 79 views - 5 years ago
20:01 Distance-Bounding, Privacy-Preserving Attribute-based Credentials CANS - Cryptology and Network Security 96 views - 5 years ago
21:08 Forward Secure 0 RTT Goes Live Implementation and Performance Analysis in QUIC CANS - Cryptology and Network Security 226 views - 5 years ago