About the Resource category
|
|
0
|
1263
|
July 30, 2022
|
[Resource Topic] 2024/492: Statistical testing of random number generators and their improvement using randomness extraction
|
|
0
|
14
|
March 27, 2024
|
[Resource Topic] 2024/491: Updatable Policy-Compliant Signatures
|
|
0
|
15
|
March 27, 2024
|
[Resource Topic] 2024/490: One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures
|
|
0
|
15
|
March 27, 2024
|
[Resource Topic] 2024/489: Guess and Determine Analysis Based on Set Split
|
|
0
|
15
|
March 27, 2024
|
[Resource Topic] 2024/488: Improving Generic Attacks Using Exceptional Functions
|
|
0
|
15
|
March 27, 2024
|
[Resource Topic] 2024/487: Real-Valued Somewhat-Pseudorandom Unitaries
|
|
0
|
17
|
March 26, 2024
|
[Resource Topic] 2024/486: Anamorphic Encryption: New Constructions and Homomorphic Realizations
|
|
0
|
19
|
March 26, 2024
|
[Resource Topic] 2024/485: A Variation on Knellwolf and Meier's Attack on the Knapsack Generator
|
|
0
|
16
|
March 26, 2024
|
[Resource Topic] 2024/484: Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives
|
|
0
|
15
|
March 26, 2024
|
[Resource Topic] 2024/483: Lower data attacks on Advanced Encryption Standard
|
|
0
|
22
|
March 26, 2024
|
[Resource Topic] 2024/482: Single Server PIR via Homomorphic Thorp Shuffles
|
|
0
|
17
|
March 26, 2024
|
[Resource Topic] 2022/621: Caulk: Lookup Arguments in Sublinear Time
|
|
2
|
289
|
March 24, 2024
|
[Resource Topic] 2024/481: Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation
|
|
0
|
20
|
March 22, 2024
|
[Resource Topic] 2024/480: Folding-based zkLLM
|
|
0
|
25
|
March 22, 2024
|
[Resource Topic] 2024/479: Making Hash-based MVBA Great Again
|
|
0
|
21
|
March 22, 2024
|
[Resource Topic] 2024/478: The Security of SHA2 under the Differential Fault Characteristic of Boolean Functions
|
|
0
|
19
|
March 22, 2024
|
[Resource Topic] 2024/477: Large Language Models for Blockchain Security: A Systematic Literature Review
|
|
0
|
24
|
March 22, 2024
|
[Resource Topic] 2024/476: OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning
|
|
0
|
21
|
March 22, 2024
|
[Resource Topic] 2024/475: CheckOut: User-Controlled Anonymization for Customer Loyalty Programs
|
|
0
|
19
|
March 22, 2024
|
[Resource Topic] 2024/474: Accumulation without Homomorphism
|
|
0
|
33
|
March 22, 2024
|
[Resource Topic] 2024/473: Extremely Simple Fail-Stop ECDSA Signatures
|
|
0
|
18
|
March 22, 2024
|
[Resource Topic] 2024/472: Sailfish: Towards Improving Latency of DAG-based BFT
|
|
0
|
24
|
March 22, 2024
|
[Resource Topic] 2024/471: Knot-based Key Exchange protocol
|
|
0
|
19
|
March 22, 2024
|
[Resource Topic] 2024/470: Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations
|
|
0
|
18
|
March 22, 2024
|
[Resource Topic] 2024/469: Malicious Security for Sparse Private Histograms
|
|
0
|
19
|
March 22, 2024
|
[Resource Topic] 2024/468: Zero-Dimensional Gröbner Bases for Rescue-XLIX
|
|
0
|
24
|
March 22, 2024
|
[Resource Topic] 2024/467: Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures
|
|
0
|
18
|
March 22, 2024
|
[Resource Topic] 2024/466: Arctic: Lightweight and Stateless Threshold Schnorr Signatures
|
|
0
|
23
|
March 22, 2024
|
[Resource Topic] 2024/465: Shorter VOLEitH Signature from Multivariate Quadratic
|
|
0
|
17
|
March 22, 2024
|