Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association StudiesAnisa HalimiLeonard Dervishiet al.2022PETS 2022
Timing leakage analysis of non-constant-time NTT implementations with Harvey butterfliesNir DruckerTomer Pelleg2022CSCML 2022
AI-Assisted Controls Change Management for Cybersecurity in the CloudHarshal TupsamudreArun Kumaret al.2022IAAI 2022
CHORS: Hardening High-Assurance Security Systems with Trusted ComputingWojciech OzgaRasha Faqehet al.2022SAC 2022
Optimized implementation of Rijndael256 on modern x86-64 platformsNir DruckerShai Gueron2022ITNG 2022
Efficient Lattise-Based Blind Signatures via Gaussian One-Time SignaturesVadim LyubashevskyNgoc Khanh Nguyenet al.2022PKC 2022
Anonymous Transactions with Revocation and Auditing in Hyperledger FabricDmytro BogatovAngelo De Caroet al.2021CANS 2021