Security Analysis of the WhatsApp End-to-End Encrypted Backup ProtocolGareth T. DaviesSebastian Falleret al.2023CRYPTO 2023
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence ProblemWard Beullens2023CRYPTO 2023
A Framework for Practical Anonymous Credentials from LatticesJonathan BootleVadim Lyubashevskyet al.2023CRYPTO 2023
On the Hardness of Scheme-Switching Between SIMD FHE SchemesKarim EldefrawyNicholas Geniseet al.2023PQCrypto 2023
Easy-plane dominant stochastic magnetic tunnel junction with synthetic antiferromagnetic layersJonathan Z. SunChristopher Safranskiet al.2023Physical Review B
Efficient ransomware detection with machine learning in storage systemsRoman PletkaDionysios Diamantopouloset al.2023FMS 2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented AttacksSalman AhmedHans Liljestrandet al.2023USENIX Security 2023