1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE);
Quantum Cryptography and Possible Attacks-slide
Security of continuous variable quantum key distribution against general attacks
A new secret handshakes scheme with dynamic matching based on zss
Searching Encrypted Cloud Data: Academia and Industry Done Right
Carnegie Mellon Paper
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs New York University Efficient Public-Key Cryptography in the Presence of Leakage.
Proving Security Protocols Correct— Correctly Jonathan Herzog 21 March 2006 The author's affiliation with The MITRE Corporation is provided for identification.
A Designer’s Guide to KEMs Alex Dent [email protected] alex.
1 An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model (Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min.
ON CONTINUAL LEAKAGE OF DISCRETE LOG REPRESENTATIONS Shweta Agrawal IIT, Delhi Joint work with Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs Several.
A Brief History of Provable Security and PKE