About the Resource category
|
|
0
|
1519
|
July 30, 2022
|
[Resource Topic] 2024/767: Bootstrapping Bits with CKKS
|
|
0
|
11
|
May 20, 2024
|
[Resource Topic] 2024/766: Breaking Verifiable Delay Functions in the Random Oracle Model
|
|
0
|
11
|
May 20, 2024
|
[Resource Topic] 2024/765: Information-Theoretic Multi-Server PIR with Global Preprocessing
|
|
0
|
12
|
May 20, 2024
|
[Resource Topic] 2024/764: Decentralized Multi-Client Functional Encryption with Strong Security
|
|
0
|
9
|
May 20, 2024
|
[Resource Topic] 2024/763: On SIS-problem-based random Feistel ciphers and its statistical evaluation of resistance against differential cryptanalysis
|
|
0
|
7
|
May 20, 2024
|
[Resource Topic] 2024/762: Extractable Witness Encryption for Signed Vector Digests from Pairings and Trust-Scalable One-Time Programs
|
|
0
|
10
|
May 20, 2024
|
[Resource Topic] 2024/761: Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage
|
|
0
|
8
|
May 20, 2024
|
[Resource Topic] 2024/760: SQIsign2D-West: The Fast, the Small, and the Safer
|
|
0
|
9
|
May 20, 2024
|
[Resource Topic] 2024/759: Enhancing Watermarked Language Models to Identify Users
|
|
0
|
10
|
May 20, 2024
|
[Resource Topic] 2024/758: Admissible Parameters for the Crossbred Algorithm and Semi-regular Sequences over Finite Fields
|
|
0
|
11
|
May 20, 2024
|
[Resource Topic] 2024/757: Formal Definition and Verification for Combined Random Fault and Random Probing Security
|
|
0
|
11
|
May 20, 2024
|
[Resource Topic] 2024/756: (Strong) aPAKE Revisited: Capturing Multi-User Security and Salting
|
|
0
|
11
|
May 20, 2024
|
[Resource Topic] 2024/755: Efficient Second-Order Masked Software Implementations of Ascon in Theory and Practice
|
|
0
|
8
|
May 20, 2024
|
[Resource Topic] 2024/754: Adversary Resilient Learned Bloom Filters
|
|
0
|
9
|
May 20, 2024
|
[Resource Topic] 2024/753: Summation-based Private Segmented Membership Test from Threshold-Fully Homomorphic Encryption
|
|
0
|
12
|
May 20, 2024
|
[Resource Topic] 2024/752: More Embedded Curves for SNARK-Pairing-Friendly Curves
|
|
0
|
10
|
May 20, 2024
|
[Resource Topic] 2024/751: Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography
|
|
0
|
9
|
May 20, 2024
|
[Resource Topic] 2024/750: Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs
|
|
0
|
12
|
May 20, 2024
|
[Resource Topic] 2024/749: Reducing the CRS Size in Registered ABE Systems
|
|
0
|
9
|
May 20, 2024
|
[Resource Topic] 2024/748: PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem
|
|
0
|
9
|
May 20, 2024
|
[Resource Topic] 2024/747: Scaling Lattice Sieves across Multiple Machines
|
|
0
|
11
|
May 20, 2024
|
[Resource Topic] 2024/746: The Art of Bonsai: How Well-Shaped Trees Improve the Communication Cost of MLS
|
|
0
|
11
|
May 20, 2024
|
[Resource Topic] 2024/745: $\mathsf{FRAST}$: TFHE-friendly Cipher Based on Random S-boxes
|
|
0
|
25
|
May 16, 2024
|
[Resource Topic] 2024/744: An NVMe-based Secure Computing Platform with FPGA-based TFHE Accelerator
|
|
0
|
24
|
May 16, 2024
|
[Resource Topic] 2024/743: Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings -- with a Break-Fix Strategy
|
|
0
|
21
|
May 16, 2024
|
[Resource Topic] 2024/742: Efficient Universally-Verifiable Electronic Voting with Everlasting Privacy
|
|
0
|
22
|
May 16, 2024
|
[Resource Topic] 2024/741: A Deniability Analysis of Signal's Initial Handshake PQXDH
|
|
0
|
19
|
May 16, 2024
|
[Resource Topic] 2024/740: Multi-Client Functional Encryption with Public Inputs and Strong Security
|
|
0
|
21
|
May 16, 2024
|
[Resource Topic] 2024/739: BGJ15 Revisited: Sieving with Streamed Memory Access
|
|
0
|
22
|
May 16, 2024
|