1st Workshop on Data Integrity and Secure Cloud Computing (DISCC-2022)Pradip BoseJennifer Dworaket al.2022MICRO 2022
Sequential Digital Signatures for Cryptographic Software-Update AuthenticationBertram PoetteringSimon Rastikian2022ESORICS 2022
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through PreprocessingJonathan BootleKaoutar El Khiyaouiet al.2022ESORICS 2022
Atomic cross-chain exchanges of shared assetsKrishnasuri NarayanamVenkatraman Ramakrishnaet al.2022AFT 2022
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More GeneralVadim LyubashevskyNgoc Khanh Nguyenet al.2022CRYPTO 2022
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge ProtocolsPankaj DayamaArpita Patraet al.2022PETS 2022
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterfliesNir DruckerTomer Pelleg2022CSCML 2022
KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round TripFelix GüntherSimon Rastikianet al.2022ACNS 2022