Understanding the Error Sensitivity of Privacy-Aware ComputingMatías MazzantiEsteban Mocskoset al.2025ISCA 2025
A Near-DRAM Accelerator for Compiler-Generated Fully Homomorphic Encryption ApplicationsAlper Buyuktosunoglu2025ISCA 2025
Practical Cloud Native Compliance Automation with OSCAL CompassTakumi YanagawaChris Butler2025KubeCon Japan 2025
Secure Federated Learning in Distributed Environments: A Blockchain-Based ApproachEduardo Canovas MartinezJose Manuel Bernabe Murciaet al.2025CCGrid 2025
PRISM: Simple And Compact Identification and Signatures From Large Prime Degree IsogeniesAndrea BassoGiacomo Borinet al.2025PKC 2025
Key Derivation Functions Without a Grain of SaltMatilda BackendalSebastian Clermontet al.2025Eurocrypt 2025
PAKE Combiners and Efficient Post-Quantum InstantiationsJulia HesseMichael Rosenberg2025Eurocrypt 2025
The 2Hash OPRF Framework and Efficient Post-Quantum InstantiationsWard BeullensLucas Dodgsonet al.2025Eurocrypt 2025
POKE: A Compact and Efficient PKE from Higher-dimensional IsogeniesAndrea BassoLuciano Maino2025Eurocrypt 2025