Skip to content
‘Threshold ECDSA in Three Rounds’

NGN Research
‘Threshold ECDSA in Three Rounds’

‘Adaptively Secure MPC With Sublinear Communication Complexity’

NGN Research
‘Adaptively Secure MPC With Sublinear Communication Complexity’

‘Composition and Deformance: Measuring Imageability With a Text-to-Image Model’

NGN Research
‘Composition and Deformance: Measuring Imageability With a Text-to-Image Model’

‘Adapting Transformer Language Models for Predictive Typing in Brain-Computer Interfaces’

NGN Research
‘Adapting Transformer Language Models for Predictive Typing in Brain-Computer Interfaces’

‘Encrypted Databases Made Secure Yet Maintainable’

NGN Research
‘Encrypted Databases Made Secure Yet Maintainable’

‘UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework’

NGN Research
‘UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework’

‘Location-Independent GNSS Relay Attacks: A Lazy Attacker’s Guide to Bypassing Navigation Message Authentication’

NGN Research
‘Location-Independent GNSS Relay Attacks: A Lazy Attacker’s Guide to Bypassing Navigation Message Authentication’

‘Equivariant Single View Pose Prediction via Induced and Restricted Representations’

NGN Research
‘Equivariant Single View Pose Prediction via Induced and Restricted Representations’

‘The Surprising Effectiveness of Equivariant Models in Domains With Latent Symmetry’

NGN Research
‘The Surprising Effectiveness of Equivariant Models in Domains With Latent Symmetry’

‘Symmetries, Flat Minima and the Conserved Quantities of Gradient Flow’

NGN Research
‘Symmetries, Flat Minima and the Conserved Quantities of Gradient Flow’

‘Integrating Symmetry into Differentiable Planning with Steerable Convolutions’

NGN Research
‘Integrating Symmetry into Differentiable Planning with Steerable Convolutions’

‘On Correlation Bounds Against Polynomials’

NGN Research
‘On Correlation Bounds Against Polynomials’