Polynomial Adaptation of Large-Scale CNNs for Homomorphic Encryption-Based Secure InferenceMoran BaruchNir Druckeret al.2024CSCML 2024
Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted DataNir DruckerShai Gueron2024CSCML 2024
Compute, but Verify: Efficient Multiparty Computation over Authenticated InputsMoumita DuttaChaya Ganeshet al.2024AsiaCrypt 2024
One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum SignaturesCarsten BaumWard Beullenset al.2024AsiaCrypt 2024
SQIsign2D-West: The Fast, the Small, and the SaferAndrea BassoPierrick Dartoiset al.2024AsiaCrypt 2024
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe PrivacyVadim LyubashevskyGregor Seileret al.2024CCS 2024
Password-Protected Key Retrieval with(out) HSM ProtectionSebastian FallerTobias Handirket al.2024CCS 2024
A Secure Multiparty Computation Platform for Squeaky-Clean Data RoomsPankaj DayamaVinayaka Panditet al.2024CCS 2024