Traceable Receipt-Free Encryption. | 0 | 0.34 | 2022 |
How to Verifiably Encrypt Many Bits for an Election? | 0 | 0.34 | 2022 |
CLAPS: Client-Location-Aware Path Selection in Tor | 0 | 0.34 | 2020 |
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption With A Masked Tweakable Block Cipher | 0 | 0.34 | 2020 |
Towards Low-Energy Leakage-Resistant Authenticated Encryption From The Duplex Sponge Construction | 0 | 0.34 | 2020 |
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications. | 0 | 0.34 | 2020 |
Scaling Up Anonymous Communication with Efficient Nanopayment Channels. | 0 | 0.34 | 2020 |
How not to prove your election outcome | 0 | 0.34 | 2020 |
Reducing the Cost of Authenticity with Leakages - a \mathsf CIML2 -Secure \mathsf AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. | 0 | 0.34 | 2019 |
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher. | 0 | 0.34 | 2019 |
Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions. | 0 | 0.34 | 2019 |
Universally Verifiable MPC and IRV Ballot Counting. | 0 | 0.34 | 2019 |
Spookchain: Chaining A Sponge-Based Aead With Beyond-Birthday Security | 0 | 0.34 | 2019 |
Authenticated Encryption With Nonce Misuse And Physical Leakage: Definitions, Separation Results And First Construction (Extended Abstract) | 0 | 0.34 | 2019 |
SWAT: Seamless Web Authentication Technology | 0 | 0.34 | 2019 |
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge. | 0 | 0.34 | 2019 |
Pluginizing QUIC. | 7 | 0.49 | 2019 |
Knights and Knaves Run Elections: Internet Voting and Undetectable Electoral Fraud | 1 | 0.35 | 2019 |
TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications. | 0 | 0.34 | 2019 |
SoK: Uncentralisable Ledgers and their Impact on Voting Systems. | 0 | 0.34 | 2018 |
Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols. | 1 | 0.35 | 2018 |
Reconsidering Generic Composition: the Tag-then-Encrypt case. | 0 | 0.34 | 2018 |
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions. | 0 | 0.34 | 2018 |
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. | 1 | 0.37 | 2018 |
Universally Verifiable MPC with Applications to IRV Ballot Counting. | 0 | 0.34 | 2018 |
Marked Mix-Nets. | 0 | 0.34 | 2017 |
On Leakage-Resilient Authenticated Encryption With Decryption Leakages | 0 | 0.34 | 2017 |
Waterfiling: Balancing the Tor network with maximum diversity. | 3 | 0.42 | 2017 |
Formal Analysis of the FIDO 1.x Protocol. | 0 | 0.34 | 2017 |
Leakage-Resilient and Misuse-Resistant Authenticated Encryption. | 1 | 0.35 | 2016 |
Verifiable Multi-party Computation with Perfectly Private Audit Trail. | 1 | 0.36 | 2016 |
A comprehensive analysis of game-based ballot privacy definitions. | 17 | 0.66 | 2015 |
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives | 12 | 0.53 | 2015 |
SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions | 9 | 0.51 | 2015 |
Election Verifiability or Ballot Privacy: Do We Need to Choose? | 15 | 0.65 | 2013 |
Unconditionally Secure Oblivious Transfer from Real Network Behavior. | 0 | 0.34 | 2013 |
STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System | 22 | 1.07 | 2013 |
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions. | 18 | 0.68 | 2013 |
On Necessary and Sufficient Conditions for Private Ballot Submission. | 0 | 0.34 | 2012 |
Measuring vote privacy, revisited | 33 | 1.44 | 2012 |
How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios | 44 | 1.21 | 2012 |
Secure two-party computation over a Z-channel | 0 | 0.34 | 2011 |
Running mixnet-based elections with Helios | 13 | 0.63 | 2011 |
Adapting helios for provable ballot privacy | 19 | 0.64 | 2011 |
Leftover Hash Lemma, revisited | 35 | 1.08 | 2011 |
Implementing information-theoretically secure oblivious transfer from packet reordering | 1 | 0.36 | 2011 |
Practical leakage-resilient pseudorandom generators | 42 | 1.42 | 2010 |
Building oblivious transfer on channel delays | 5 | 0.46 | 2010 |
Group signatures are suitable for constrained devices | 5 | 0.46 | 2010 |
Leakage Resilient Cryptography in Practice. | 28 | 1.16 | 2009 |