Stacking Sigmas: A Framework to Compose Sigma-Protocols for Disjunctions | 0 | 0.34 | 2022 |
Algorithm-Substitution Attacks on Cryptographic Puzzles. | 0 | 0.34 | 2022 |
One-Time Programs from Commodity Hardware. | 0 | 0.34 | 2022 |
Efficient Proofs of Software Exploitability for Real-world Processors. | 0 | 0.34 | 2022 |
Efficient Set Membership Proofs using MPC-in-the-Head. | 0 | 0.34 | 2022 |
SoK: Cryptographic Confidentiality of Data on Mobile Devices. | 0 | 0.34 | 2022 |
Fluid Mpc: Secure Multiparty Computation With Dynamic Participants | 1 | 0.35 | 2021 |
Efficient Set Membership Proofs using MPC-in-the-Head. | 0 | 0.34 | 2021 |
Cost-Effective Mission Assurance Engineering Through Simulation | 0 | 0.34 | 2021 |
KeyForge: Non-Attributable Email from Forward-Forgeable Signatures | 0 | 0.34 | 2021 |
Mission Assurance for Autonomous Undersea Vehicles | 0 | 0.34 | 2020 |
ZEXE: Enabling Decentralized Private Computation | 2 | 0.35 | 2020 |
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures. | 0 | 0.34 | 2019 |
Giving State to the Stateless - Augmenting Trustworthy Computation with Ledgers. | 2 | 0.36 | 2019 |
Using SMT Solvers to Automate Chosen Ciphertext Attacks. | 0 | 0.34 | 2019 |
A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK. | 5 | 0.40 | 2018 |
Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication. | 0 | 0.34 | 2018 |
How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies | 0 | 0.34 | 2018 |
Practical State Recovery Attacks against Legacy RNG Implementations. | 2 | 0.39 | 2018 |
Where did I leave my keys?: lessons from the Juniper Dual EC incident. | 1 | 0.37 | 2018 |
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control. | 0 | 0.34 | 2017 |
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards. | 9 | 0.44 | 2017 |
Decentralized Anonymous Micropayments. | 1 | 0.36 | 2017 |
Verified Correctness and Security of mbedTLS HMAC-DRBG. | 7 | 0.51 | 2017 |
Outsourcing Medical Dataset Analysis: A Possible Solution. | 0 | 0.34 | 2017 |
Bolt: Anonymous Payment Channels for Decentralized Currencies. | 24 | 1.15 | 2017 |
Developers are Not the Enemy!: The Need for Usable Security APIs. | 21 | 0.84 | 2016 |
A Systematic Analysis of the Juniper Dual EC Incident. | 22 | 0.89 | 2016 |
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. | 1 | 0.35 | 2016 |
A Protocol for Privately Reporting Ad Impressions at Scale. | 5 | 0.42 | 2016 |
Keynote: On Subverting Trust. | 0 | 0.34 | 2016 |
Downgrade Resilience in Key-Exchange Protocols | 11 | 0.67 | 2016 |
Accountable Privacy for Decentralized Anonymous Payments. | 1 | 0.38 | 2016 |
Dancing On The Lip Of The Volcano: Chosen Ciphertext Attacks On Apple Imessage | 7 | 0.48 | 2016 |
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice | 80 | 2.82 | 2015 |
Forward Secure Asynchronous Messaging from Puncturable Encryption | 17 | 0.61 | 2015 |
Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs | 22 | 0.96 | 2015 |
Keys under doormats: mandating insecurity by requiring government access to all data and communications. | 9 | 0.70 | 2015 |
Keys under doormats | 10 | 0.85 | 2015 |
Automated Analysis and Synthesis of Block-Cipher Modes of Operation | 42 | 1.37 | 2014 |
On the practical exploitability of dual EC in TLS implementations | 5 | 0.82 | 2014 |
The Brown Cloud Project: A New Blue? | 0 | 0.34 | 2014 |
Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity. | 3 | 0.44 | 2014 |
Zerocash: Decentralized Anonymous Payments from Bitcoin | 205 | 8.93 | 2014 |
Silver Bullet Talks with Matthew Green. | 0 | 0.34 | 2014 |
Decentralized Anonymous Credentials. | 1 | 0.36 | 2013 |
Using SMT solvers to automate design tasks for encryption and signature schemes | 15 | 0.58 | 2013 |
Dialogue with the Brown Cloud: A Virtual Conversation | 0 | 0.34 | 2013 |
Zerocoin: Anonymous Distributed E-Cash from Bitcoin | 175 | 14.20 | 2013 |
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes | 14 | 0.56 | 2013 |