BLOOM: Bimodal Lattice One-Out-of-Many Proofs and ApplicationsVadim LyubashevskyNgoc Khanh Nguyen2022ASIACRYPT 2022
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring PrivacyLeonard DervishiXinyue Wanget al.2022AMIA Annual Symposium 2022
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through PreprocessingJonathan BootleKaoutar El Khiyaouiet al.2022ESORICS 2022
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge ProtocolsPankaj DayamaArpita Patraet al.2022PETS 2022
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association StudiesAnisa HalimiLeonard Dervishiet al.2022PETS 2022
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterfliesNir DruckerTomer Pelleg2022CSCML 2022
AI-Assisted Controls Change Management for Cybersecurity in the CloudHarshal TupsamudreArun Kumaret al.2022IAAI 2022
CHORS: Hardening High-Assurance Security Systems with Trusted ComputingWojciech OzgaRasha Faqehet al.2022SAC 2022