[Resource Topic] 2024/717: An Improved Threshold Homomorphic Cryptosystem Based on Class Groups
|
|
0
|
32
|
May 10, 2024
|
[Resource Topic] 2024/716: Unclonable Secret Sharing
|
|
0
|
27
|
May 10, 2024
|
[Resource Topic] 2024/715: A New Cryptographic Algorithm
|
|
0
|
31
|
May 10, 2024
|
[Resource Topic] 2024/714: Learning with Quantization, Polar Quantizer, and Secure Source Coding
|
|
0
|
25
|
May 10, 2024
|
[Resource Topic] 2024/713: Analyzing Pump and jump BKZ algorithm using dynamical systems
|
|
0
|
31
|
May 10, 2024
|
[Resource Topic] 2024/712: Quantum NV Sieve on Grover for Solving Shortest Vector Problem
|
|
0
|
36
|
May 10, 2024
|
[Resource Topic] 2024/711: Non-Transferable Anonymous Tokens by Secret Binding
|
|
0
|
29
|
May 10, 2024
|
[Resource Topic] 2024/710: BUFFing FALCON without Increasing the Signature Size
|
|
0
|
27
|
May 10, 2024
|
[Resource Topic] 2024/709: Masked Computation the Floor Function and its Application to the FALCON Signature
|
|
0
|
25
|
May 10, 2024
|
[Resource Topic] 2024/708: Automated Generation of Fault-Resistant Circuits
|
|
0
|
33
|
May 10, 2024
|
[Resource Topic] 2024/707: Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators
|
|
0
|
26
|
May 10, 2024
|
[Resource Topic] 2024/706: Linicrypt in the Ideal Cipher Model
|
|
0
|
24
|
May 10, 2024
|
[Resource Topic] 2024/705: Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users
|
|
0
|
22
|
May 10, 2024
|
[Resource Topic] 2024/704: Fully Automated Selfish Mining Analysis in Efficient Proof Systems Blockchains
|
|
0
|
19
|
May 10, 2024
|
[Resource Topic] 2024/703: An Efficient and Extensible Zero-knowledge Proof Framework for Neural Networks
|
|
0
|
28
|
May 10, 2024
|
[Resource Topic] 2024/702: Security Analysis of Signal's PQXDH Handshake
|
|
0
|
30
|
May 10, 2024
|
[Resource Topic] 2024/701: Quantum Unpredictability
|
|
0
|
21
|
May 10, 2024
|
[Resource Topic] 2024/700: Sublinear Distributed Product Checks on Replicated Secret-Shared Data over $\mathbb{Z}_{2^k}$ without Ring Extensions
|
|
0
|
21
|
May 10, 2024
|
[Resource Topic] 2024/699: An Efficient All-to-All GCD Algorithm for Low Entropy RSA Key Factorization
|
|
0
|
25
|
May 10, 2024
|
[Resource Topic] 2024/698: Private Computations on Streaming Data
|
|
0
|
22
|
May 10, 2024
|
[Resource Topic] 2024/697: LINE: Cryptosystem based on linear equations for logarithmic signatures
|
|
0
|
25
|
May 10, 2024
|
[Resource Topic] 2024/696: A Theoretical Take on a Practical Consensus Protocol
|
|
0
|
22
|
May 10, 2024
|
[Resource Topic] 2024/695: Beale Cipher 1 and Cipher 3: Numbers With No Messages
|
|
0
|
30
|
May 10, 2024
|
[Resource Topic] 2024/694: Lower-Bounds on Public-Key Operations in PIR
|
|
0
|
19
|
May 10, 2024
|
[Resource Topic] 2024/693: A Note of $\mathsf{Anemoi}$ Gröbner Bases
|
|
0
|
21
|
May 10, 2024
|
Isogeny Club - Season 4 - Talk #6:Using Kummer surfaces in SQIsign verification
|
|
0
|
34
|
May 9, 2024
|
[Resource Topic] 2024/692: Blink: An Optimal Proof of Proof-of-Work
|
|
0
|
32
|
May 6, 2024
|
[Resource Topic] 2024/691: White-box filtering attacks breaking SEL masking: from exponential to polynomial time
|
|
0
|
24
|
May 6, 2024
|
[Resource Topic] 2024/690: PN-based Attacks in the White-box Setting
|
|
0
|
24
|
May 6, 2024
|
[Resource Topic] 2024/689: Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models
|
|
0
|
28
|
May 6, 2024
|