About the Resource category
|
|
0
|
2261
|
July 30, 2022
|
[Resource Topic] 2024/1848: Non-Interactive Zero-Knowledge Proofs with Certified Deletion
|
|
0
|
26
|
November 11, 2024
|
[Resource Topic] 2024/1847: Notions of Quantum Reductions and Impossibility of Statistical NIZK
|
|
0
|
25
|
November 11, 2024
|
[Resource Topic] 2024/1846: The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy
|
|
0
|
27
|
November 11, 2024
|
[Resource Topic] 2024/1845: Single-Server Client Preprocessing PIR with Tight Space-Time Trade-off
|
|
0
|
23
|
November 11, 2024
|
[Resource Topic] 2024/1844: KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies
|
|
0
|
27
|
November 11, 2024
|
[Resource Topic] 2024/1843: Khatam: Reducing the Communication Complexity of Code-Based SNARKs
|
|
0
|
25
|
November 11, 2024
|
[Resource Topic] 2024/1842: Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs
|
|
0
|
24
|
November 11, 2024
|
[Resource Topic] 2024/1841: Verifying Jolt zkVM Lookup Semantics
|
|
0
|
25
|
November 11, 2024
|
[Resource Topic] 2024/1840: Ideal Pseudorandom Codes
|
|
0
|
24
|
November 11, 2024
|
[Resource Topic] 2024/1839: Cryptographically Secure Digital Consent
|
|
0
|
27
|
November 11, 2024
|
[Resource Topic] 2024/1838: Pushing the QAM method for finding APN functions further
|
|
0
|
20
|
November 11, 2024
|
[Resource Topic] 2024/1837: A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme
|
|
0
|
19
|
November 11, 2024
|
[Resource Topic] 2024/1836: Symmetric Encryption on a Quantum Computer
|
|
0
|
24
|
November 11, 2024
|
[Resource Topic] 2024/1835: Hybrid Zero-Knowledge from Garbled Circuits
|
|
0
|
22
|
November 11, 2024
|
[Resource Topic] 2024/1834: Scutum: Temporal Verification for Cross-Rollup Bridges via Goal-Driven Reduction
|
|
0
|
32
|
November 8, 2024
|
[Resource Topic] 2024/1833: Private Neural Network Training with Packed Secret Sharing
|
|
0
|
28
|
November 8, 2024
|
[Resource Topic] 2024/1832: How to Delete Without a Trace: Certified Deniability in a Quantum World
|
|
0
|
30
|
November 8, 2024
|
[Resource Topic] 2024/1831: Fast Two-party Threshold ECDSA with Proactive Security
|
|
0
|
30
|
November 8, 2024
|
[Resource Topic] 2024/1830: A Tight Analysis of GHOST Consistency
|
|
0
|
31
|
November 8, 2024
|
[Resource Topic] 2024/1829: Compiled Nonlocal Games from any Trapdoor Claw-Free Function
|
|
0
|
36
|
November 8, 2024
|
[Resource Topic] 2024/1828: Classic McEliece Hardware Implementation with Enhanced Side-Channel and Fault Resistance
|
|
0
|
28
|
November 8, 2024
|
[Resource Topic] 2024/1827: OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM
|
|
0
|
27
|
November 8, 2024
|
[Resource Topic] 2024/1826: Cloning Games, Black Holes and Cryptography
|
|
0
|
26
|
November 8, 2024
|
[Resource Topic] 2024/1825: BrakingBase - a linear prover, poly-logarithmic verifier, field agnostic polynomial commitment scheme
|
|
0
|
25
|
November 8, 2024
|
[Resource Topic] 2024/1824: Constructing Dembowski–Ostrom permutation polynomials from upper triangular matrices
|
|
0
|
26
|
November 8, 2024
|
[Resource Topic] 2024/1823: A Composability Treatment of Bitcoin's Transaction Ledger with Variable Difficulty
|
|
0
|
26
|
November 8, 2024
|
[Resource Topic] 2024/1822: Anonymous Public-Key Quantum Money and Quantum Voting
|
|
0
|
25
|
November 8, 2024
|
[Resource Topic] 2024/1821: SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
|
|
0
|
27
|
November 8, 2024
|
[Resource Topic] 2024/1820: On the Power of Oblivious State Preparation
|
|
0
|
25
|
November 8, 2024
|