About the Resource category
|
|
0
|
2378
|
July 30, 2022
|
[Resource Topic] 2025/1193: Non-Homomorphic Key Blinding from Symmetric Primitives
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1192: PrivacyGo: Privacy-Preserving Ad Measurement with Multidimensional Intersection
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1191: A Polynomial Public-Key Cryptosystem Based on Jacobian-Preserving Composition
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1190: Towards AI-driven Optimization of Robust Probing Model-compliant Masked Hardware Gadgets Using Evolutionary Algorithms
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1189: Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1188: Depth-Optimized Quantum Implementation of CHAM
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1187: Ligerito: A Small and Concretely Fast Polynomial Commitment Scheme
|
|
0
|
1
|
June 27, 2025
|
[Resource Topic] 2025/1186: Unconditional Individual Verifiability with Receipt Freeness via Post-Cast Isolation
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1185: From Worst-Case Hardness of $\mathsf{NP}$ to Quantum Cryptography via Quantum Indistinguishability Obfuscation
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1184: zkGPT: An Efficient Non-interactive Zero-knowledge Proof Framework for LLM Inference
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1183: PA1 Security on Release of Unverified Plaintext in Encrypt-then-MAC AE Schemes
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1182: Pseudorandom Correlation Generators for Multiparty Beaver Triples over $\mathbb{F}_2$
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1181: UOV-Based Verifiable Timed Signature Scheme
|
|
0
|
0
|
June 24, 2025
|
[Resource Topic] 2025/1180: Cryptanalysis of HiAE
|
|
0
|
1
|
June 24, 2025
|
[Resource Topic] 2025/1179: A Tale of Two Worlds, a Formal Story of WireGuard Hybridization
|
|
0
|
0
|
June 24, 2025
|
[Resource Topic] 2025/1178: Engel p-adic Supersingular Isogeny-based Cryptography over Laurent series
|
|
0
|
0
|
June 24, 2025
|
[Resource Topic] 2025/1177: Mind the Gap: Securing QKD Interfaces with Post-Quantum Proxies
|
|
0
|
0
|
June 24, 2025
|
[Resource Topic] 2025/1176: Solve Approximate CVP via Variants of Nearest-Colattice
|
|
0
|
1
|
June 23, 2025
|
[Resource Topic] 2025/1175: Simple VESS
|
|
0
|
2
|
June 23, 2025
|
[Resource Topic] 2025/1174: Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments
|
|
0
|
0
|
June 23, 2025
|
[Resource Topic] 2025/1173: The Effectiveness of Differential Privacy in Real-world Settings: A Metrics-based Framework to help Practitioners Visualise and Evaluate $\varepsilon$
|
|
0
|
0
|
June 23, 2025
|
[Resource Topic] 2025/1172: Guarding the Signal: Secure Messaging with Reverse Firewalls
|
|
0
|
1
|
June 23, 2025
|
[Resource Topic] 2025/1171: Beyond LWE: a Lattice Framework for Homomorphic Encryption
|
|
0
|
5
|
June 23, 2025
|
[Resource Topic] 2025/1170: Optimized Rank Sort for Encrypted Real Numbers
|
|
0
|
0
|
June 23, 2025
|
[Resource Topic] 2025/1169: Understanding Lasso: A Novel Lookup Argument Protocol
|
|
0
|
1
|
June 23, 2025
|
[Resource Topic] 2025/1168: On Frontrunning Risks in Batch-Order Fair Systems for Blockchains (Extended Version)
|
|
0
|
0
|
June 20, 2025
|
[Resource Topic] 2025/1167: Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester
|
|
0
|
1
|
June 20, 2025
|
[Resource Topic] 2025/1166: Threshold Signatures Reloaded: ML-DSA and Enhanced Raccoon with Identifiable Aborts
|
|
0
|
0
|
June 20, 2025
|
[Resource Topic] 2025/1165: Automated Analysis and Synthesis of Message Authentication Codes
|
|
0
|
3
|
June 20, 2025
|