Differential privacy is a widely used notion of security that enables th...
We show the security of multi-user key establishment on a single line of...
Secure multi-party computation (SMPC) protocols allow several parties th...
Differential privacy provides a theoretical framework for processing a
d...
The problem of private learning has been extensively studied in classica...
Approximate combinatorial optimisation has emerged as one of the most
pr...
This paper, for the first time, addresses the questions related to the
c...
Physical unclonable functions provide a unique 'fingerprint' to a physic...
We introduce a secure hardware device named a QEnclave that can secure t...
Due to the special no-cloning principle, quantum states appear to be ver...
In this paper, we continue the line of work initiated by Boneh and Zhand...
Cryptanalysis on standard quantum cryptographic systems generally involv...
The generation of certifiable randomness is one of the most promising
ap...
Finding a concrete use case for quantum computers in the near term is st...
Secure delegated quantum computing allows a computationally weak client ...
It is of folkloric belief that the security of classical cryptographic
p...
Recently, major progress has been made towards the realisation of the qu...
Physical Unclonable Functions (PUFs) are physical devices with unique
be...
The functionality of classically-instructed remotely prepared random sec...
The search for an application of near-term quantum devices is widespread...
Recent advances at Google, IBM, as well as a number of research groups
i...
We define the functionality of delegated pseudo-secret random qubit gene...
In August 2015 the cryptographic world was shaken by a sudden and surpri...