Search

Your search keyword '"CONTI, MAURO"' showing total 28 results

Search Constraints

Start Over You searched for: Author "CONTI, MAURO" Remove constraint Author: "CONTI, MAURO" Journal cryptology and network security : 20th international conference, cans 2021, vienna, austria, december 13-15, 2021, proceedings Remove constraint Journal: cryptology and network security : 20th international conference, cans 2021, vienna, austria, december 13-15, 2021, proceedings
28 results on '"CONTI, MAURO"'

Search Results

1. Towards Quantum Large-Scale Password Guessing on Real-World Distributions

2. Attestation Waves: Platform Trust via Remote Power Analysis

3. GMMT: A Revocable Group Merkle Multi-tree Signature Scheme

4. BlindOR: an Efficient Lattice-Based Blind Signature Scheme from OR-Proofs

5. Efficient Threshold-Optimal ECDSA

6. Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model

7. Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric

8. Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs

9. THC: Practical and Cost-Effective Verification of Delegated Computation

10. Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training

11. How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting

12. SoK: Secure Memory Allocation

13. Countermeasures Against Backdoor Attacks Towards Malware Detectors

14. Issuer-Hiding Attribute-Based Credentials

15. Function-Private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions

16. How Distance-Bounding Can Detect Internet Traffic Hijacking

17. Linear-Time Oblivious Permutations for SPDZ

19. On the Higher-Bit Version of Approximate Inhomogeneous Short Integer Solution Problem

20. Free by Design: On the Feasibility of Free-Riding Attacks Against Zero-Rated Services

21. FO-like Combiners and Hybrid Post-Quantum Cryptography

22. The Matrix Reloaded: Multiplication Strategies in FrodoKEM

23. Report and Trace Ring Signatures

24. Selectively Linkable Group Signatures—Stronger Security and Preserved Verifiability

25. Partition Oracles from Weak Key Forgeries

26. Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction

27. Practical Privacy-Preserving Face Identification Based on Function-Hiding Functional Encryption

28. Cross-Domain Attribute-Based Access Control Encryption

Catalog

Books, media, physical & digital resources