Publication | Date of Publication | Type |
---|
Circuit bootstrapping: faster and smaller | 2024-11-12 | Paper |
Improved homomorphic evaluation for hash function based on TFHE | 2024-07-19 | Paper |
Power of randomness recovery: tighter CCA-secure KEM in the QROM | 2024-07-19 | Paper |
Full domain functional bootstrapping with least significant bit encoding | 2024-07-17 | Paper |
Revisiting key switching techniques with applications to light-key FHE | 2024-05-31 | Paper |
IND-CCA security of Kyber in the quantum random oracle model, revisited | 2023-08-21 | Paper |
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization | 2023-08-04 | Paper |
Hybrid dual and meet-LWE attack | 2023-07-26 | Paper |
Attacking ECDSA leaking discrete bits with a more efficient lattice | 2022-07-01 | Paper |
Predicting the concrete security of LWE against the dual attack using binary search | 2022-06-08 | Paper |
Compact (Targeted Homomorphic) Inner Product Encryption from LWE | 2020-07-20 | Paper |
Towards Tightly Secure Deterministic Public Key Encryption | 2020-07-20 | Paper |
Preprocess-then-NTT Technique and its applications to Kyber and NewHope | 2019-10-31 | Paper |
Understanding and constructing AKE via double-key key encapsulation mechanism | 2019-01-23 | Paper |
Cramer-Shoup like chosen ciphertext security from LPN | 2018-12-07 | Paper |
Identity-based lossy encryption from learning with errors | 2018-10-24 | Paper |
Improved efficiency of MP12 | 2018-10-24 | Paper |
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper) | 2018-10-24 | Paper |
Lattice-based dual receiver encryption and more | 2018-09-26 | Paper |
Dual-mode cryptosystem based on the learning with errors problem | 2017-08-25 | Paper |
Lossy Key Encapsulation Mechanism and Its Applications | 2017-05-19 | Paper |
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation | 2017-05-05 | Paper |
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks | 2017-04-12 | Paper |
Approximate-Deterministic Public Key Encryption from Hard Learning Problems | 2016-12-21 | Paper |
Receiver Selective Opening Security from Indistinguishability Obfuscation | 2016-12-21 | Paper |
CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling | 2016-07-25 | Paper |
Lossy Projective Hashing and Its Applications | 2016-01-12 | Paper |
RSA-OAEP is RKA Secure | 2015-12-02 | Paper |
Related-Key Security for Hybrid Encryption | 2015-11-03 | Paper |
KDM-CCA Security from RKA Secure Authenticated Encryption | 2015-09-30 | Paper |
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation | 2015-09-29 | Paper |
Related Key Secure PKE from Hash Proof Systems | 2015-05-27 | Paper |
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP | 2015-02-10 | Paper |
How to Remove the Exponent GCD in HK09 | 2013-10-23 | Paper |
RKA Secure PKE Based on the DDH and HR Assumptions | 2013-10-23 | Paper |
Improved Tradeoff between Encapsulation and Decapsulation of HK09 | 2013-01-07 | Paper |
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring | 2012-06-29 | Paper |
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing | 2011-09-16 | Paper |
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key | 2011-07-07 | Paper |
Encryption Simulatability Reconsidered | 2011-05-19 | Paper |
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited | 2011-03-15 | Paper |
Improved efficiency of Kiltz07-KEM | 2010-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610050 | 2009-03-06 | Paper |