Volgen
Erik Pohle
Erik Pohle
COSIC, KU Leuven
Geverifieerd e-mailadres voor kuleuven.be
Titel
Geciteerd door
Geciteerd door
Jaar
Poster: Fast Evaluation of S-boxes in MPC
E Pohle, A Abidin, B Preneel
Network and Distributed System Security Symposium (NDSS 2022), Date: 2022/04 …, 2022
72022
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
AS Bhati, E Pohle, A Abidin, E Andreeva, B Preneel
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
42023
Secure Key Management for Multi-Party Computation in MOZAIK
E Marquet, J Moeyersons, E Pohle, M Van Kenhove, A Abidin, B Volckaert
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023
42023
Fast Evaluation of S-Boxes With Garbled Circuits
E Pohle, A Abidin, B Preneel
IEEE Transactions on Information Forensics and Security 19, 5530-5544, 2024
22024
MOZAIK: an end-to-end secure data sharing platform
A Abidin, E Marquet, J Moeyersons, X Limani, E Pohle, M Van Kenhove, ...
Proceedings of the Second ACM Data Economy Workshop, 34-40, 2023
22023
MAESTRO: Multi-party AES using Lookup Tables
H Morita, E Pohle, K Sadakane, P Scholl, K Tozawa, D Tschudi
Cryptology ePrint Archive, 2024
12024
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
A Abidin, E Pohle, B Preneel
European Symposium on Research in Computer Security, 86-105, 2023
12023
MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing
M Zbudila, E Pohle, A Abidin, B Preneel
Cryptology ePrint Archive, 2024
2024
Poster: MaSTer:(Practically) Maliciously Secure Truncation for Replicated Secret Sharing
M Zbudila, E Pohle, A Abidin, B Preneel
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–9