About the Resource category
|
|
0
|
1868
|
July 30, 2022
|
[Resource Topic] 2024/1198: ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA
|
|
0
|
20
|
July 25, 2024
|
[Resource Topic] 2024/1197: Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
|
|
0
|
14
|
July 25, 2024
|
[Resource Topic] 2024/1196: Client-Aided Privacy-Preserving Machine Learning
|
|
0
|
18
|
July 25, 2024
|
[Resource Topic] 2024/1195: Efficient Implementation of Super-optimal Pairings on Curves with Small Prime Fields at the 192-bit Security Level
|
|
0
|
13
|
July 25, 2024
|
[Resource Topic] 2024/1194: Hardware Implementation and Security Analysis of Local-Masked NTT for CRYSTALS-Kyber
|
|
0
|
16
|
July 25, 2024
|
[Resource Topic] 2024/1193: The syzygy distinguisher
|
|
0
|
19
|
July 25, 2024
|
[Resource Topic] 2024/1192: Towards ML-KEM & ML-DSA on OpenTitan
|
|
0
|
18
|
July 25, 2024
|
[Resource Topic] 2024/1191: A note on ``a novel authentication protocol for IoT-enabled devices''
|
|
0
|
17
|
July 25, 2024
|
[Resource Topic] 2024/1190: Efficient Two-Party Secure Aggregation via Incremental Distributed Point Function
|
|
0
|
14
|
July 25, 2024
|
[Resource Topic] 2024/1189: The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange
|
|
0
|
24
|
July 25, 2024
|
[Resource Topic] 2024/1188: Lightweight Dynamic Linear Components for Symmetric Cryptography
|
|
0
|
17
|
July 25, 2024
|
[Resource Topic] 2024/1187: STORM — Small Table Oriented Redundancy-based SCA Mitigation for AES
|
|
0
|
12
|
July 25, 2024
|
[Resource Topic] 2024/1186: MATTER: A Wide-Block Tweakable Block Cipher
|
|
0
|
16
|
July 25, 2024
|
[Resource Topic] 2024/1185: Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies
|
|
0
|
18
|
July 25, 2024
|
[Resource Topic] 2024/1184: Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric
|
|
0
|
13
|
July 25, 2024
|
[Resource Topic] 2024/1183: Updatable Private Set Intersection from Structured Encryption
|
|
0
|
18
|
July 25, 2024
|
[Resource Topic] 2024/1182: Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation
|
|
0
|
12
|
July 25, 2024
|
[Resource Topic] 2024/1181: AQQUA: Augmenting Quisquis with Auditability
|
|
0
|
12
|
July 25, 2024
|
[Resource Topic] 2024/1180: Fast computation of 2-isogenies in dimension 4 and cryptographic applications
|
|
0
|
15
|
July 25, 2024
|
[Resource Topic] 2024/1179: Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem
|
|
0
|
13
|
July 25, 2024
|
[Resource Topic] 2024/1178: Towards Quantum-Safe Blockchain: Exploration of PQC and Public-key Recovery on Embedded Systems
|
|
0
|
32
|
July 22, 2024
|
[Resource Topic] 2024/1177: Cryptanalysis of two post-quantum authenticated key agreement protocols
|
|
0
|
28
|
July 22, 2024
|
[Resource Topic] 2024/1176: A zero-trust swarm security architecture and protocols
|
|
0
|
25
|
July 22, 2024
|
[Resource Topic] 2024/1175: AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities
|
|
0
|
29
|
July 22, 2024
|
[Resource Topic] 2024/1174: Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber
|
|
0
|
23
|
July 22, 2024
|
[Resource Topic] 2024/1173: Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms
|
|
0
|
28
|
July 22, 2024
|
[Resource Topic] 2024/1172: Generalized class group actions on oriented elliptic curves with level structure
|
|
0
|
29
|
July 22, 2024
|
[Resource Topic] 2024/1171: Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem
|
|
0
|
22
|
July 22, 2024
|
[Resource Topic] 2024/1170: Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
|
|
0
|
30
|
July 22, 2024
|