Composable Oblivious Pseudo-Random Functions via Garbled CircuitsSebastian FallerAstrid Ottenhueset al.2023LatinCrypt 2023
Efficient Pruning for Machine Learning under Homomorphic EncryptionEhud AharoniMoran Baruchet al.2023ESORICS 2023
Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized SmoothingDaniel GibertGiulio Zizzoet al.2023ESORICS 2023
Security Analysis of the WhatsApp End-to-End Encrypted Backup ProtocolGareth T. DaviesSebastian Falleret al.2023CRYPTO 2023
A Framework for Practical Anonymous Credentials from LatticesJonathan BootleVadim Lyubashevskyet al.2023CRYPTO 2023
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence ProblemWard Beullens2023CRYPTO 2023
Lattice-Based Succinct Arguments for NP with Polylogarithmic-Time VerificationJonathan BootleAlessandro Chiesaet al.2023CRYPTO 2023
On the Hardness of Scheme-Switching Between SIMD FHE SchemesKarim EldefrawyNicholas Geniseet al.2023PQCrypto 2023