About the Resource category
|
|
0
|
2038
|
July 30, 2022
|
[Resource Topic] 2024/1437: HierNet: A Hierarchical Deep Learning Model for SCA on Long Traces
|
|
0
|
8
|
September 14, 2024
|
[Resource Topic] 2024/1436: Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos
|
|
0
|
8
|
September 14, 2024
|
[Resource Topic] 2024/1435: Actively Secure Polynomial Evaluation from Shared Polynomial Encodings
|
|
0
|
8
|
September 14, 2024
|
[Resource Topic] 2024/1434: Untangling the Security of Kilian's Protocol: Upper and Lower Bounds
|
|
0
|
10
|
September 14, 2024
|
[Resource Topic] 2024/1433: $Shortcut$: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases
|
|
0
|
8
|
September 14, 2024
|
[Resource Topic] 2024/1432: On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages
|
|
0
|
10
|
September 14, 2024
|
[Resource Topic] 2024/1431: Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation
|
|
0
|
8
|
September 14, 2024
|
[Resource Topic] 2024/1430: MYao: Multiparty ``Yao'' Garbled Circuits with Row Reduction, Half Gates, and Efficient Online Computation
|
|
0
|
9
|
September 14, 2024
|
[Resource Topic] 2024/1429: Powerformer: Efficient Privacy-Preserving Transformer with Batch Rectifier-Power Max Function and Optimized Homomorphic Attention
|
|
0
|
10
|
September 14, 2024
|
[Resource Topic] 2024/1428: Mario: Multi-round Multiple-Aggregator Secure Aggregation with Robustness against Malicious Actors
|
|
0
|
10
|
September 14, 2024
|
[Resource Topic] 2024/1427: LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK
|
|
0
|
10
|
September 14, 2024
|
[Resource Topic] 2024/1426: Agile Asymmetric Cryptography and the Case for Finite Fields
|
|
0
|
12
|
September 14, 2024
|
[Resource Topic] 2024/1425: New constructions of pseudorandom codes
|
|
0
|
10
|
September 14, 2024
|
[Resource Topic] 2024/1424: A Waterlog for Detecting and Tracing Synthetic Text from Large Language Models
|
|
0
|
11
|
September 14, 2024
|
[Resource Topic] 2024/1423: Towards package opening detection at power-up by monitoring thermal dissipation
|
|
0
|
27
|
September 11, 2024
|
[Resource Topic] 2024/1422: ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes
|
|
0
|
23
|
September 11, 2024
|
[Resource Topic] 2024/1421: Provable Security of Linux-DRBG in the Seedless Robustness Model
|
|
0
|
26
|
September 11, 2024
|
[Resource Topic] 2024/1420: Privacy-Preserving Breadth-First-Search and Maximal-Flow
|
|
0
|
28
|
September 11, 2024
|
[Resource Topic] 2024/1419: On the Relationship between Public Key Primitives via Indifferentiability
|
|
0
|
27
|
September 11, 2024
|
[Resource Topic] 2024/1418: Public-key encryption from a trapdoor one-way embedding of $SL_2(\mathbb{N})$
|
|
0
|
26
|
September 11, 2024
|
[Resource Topic] 2024/1417: Distributed Broadcast Encryption from Lattices
|
|
0
|
27
|
September 11, 2024
|
[Resource Topic] 2024/1416: Circuit ABE with poly(depth, λ)-sized Ciphertexts and Keys from Lattices
|
|
0
|
27
|
September 11, 2024
|
[Resource Topic] 2024/1415: Privacy Comparison for Bitcoin Light Client Implementations
|
|
0
|
32
|
September 11, 2024
|
[Resource Topic] 2024/1414: Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller
|
|
0
|
25
|
September 11, 2024
|
[Resource Topic] 2024/1413: The Black-Box Simulation Barrier Persists in a Fully Quantum World
|
|
0
|
31
|
September 11, 2024
|
[Resource Topic] 2024/1412: The Zeros of Zeta Function Revisited
|
|
0
|
31
|
September 11, 2024
|
[Resource Topic] 2024/1411: Design issues of ``an anonymous authentication and key agreement protocol in smart living''
|
|
0
|
20
|
September 11, 2024
|
[Resource Topic] 2024/1410: Cryptobazaar: Private Sealed-bid Auctions at Scale
|
|
0
|
24
|
September 11, 2024
|
[Resource Topic] 2024/1409: Oraqle: A Depth-Aware Secure Computation Compiler
|
|
0
|
23
|
September 11, 2024
|