On an authentication scheme based on the Root Problem in the braid group
On Bounding Problems of Quantitative Information Flow
On Communication Protocols that Compute Almost Privately
On Compression of Cryptographic Keys
On Concurrent and Resettable Zero-Knowledge Proofs for NP
On formal verification of arithmetic-based cryptographic primitives
On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization
On improving security of GPT cryptosystems
On non-abelian homomorphic public-key cryptosystems
On Optimal Secure Message Transmission by Public Discussion
On Sampling, Anonymization, and Differential Privacy: Or, k-Anonymization Meets Differential Privacy
On secret sharing for graphs
On Secure Distributed Implementations of Dynamic Access Control
On Secure Workflow Decentralisation on the Internet
On Steganography in Lost Audio Packets
On the AAGL Protocol
On the Analysis and Generalization of Extended Visual Cryptography Schemes
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
On the Boundaries of Trust and Security in Computing and Communications Systems
On The Cost Distribution of a Memory Bound Function