About the Resource category
|
|
0
|
2363
|
July 30, 2022
|
[Resource Topic] 2025/1056: Private Signaling Secure Against Actively Corrupted Servers
|
|
0
|
0
|
June 6, 2025
|
[Resource Topic] 2025/1055: Single-server Stateful PIR with Verifiability and Balanced Efficiency
|
|
0
|
0
|
June 6, 2025
|
[Resource Topic] 2025/1054: Rewardable Naysayer Proofs
|
|
0
|
1
|
June 6, 2025
|
[Resource Topic] 2025/1053: Breaking the 1/λ-Rate Barrier for Arithmetic Garbling
|
|
0
|
0
|
June 6, 2025
|
[Resource Topic] 2025/1052: How to Trace Viral Content in End-to-End Encrypted Messaging
|
|
0
|
0
|
June 6, 2025
|
[Resource Topic] 2025/1051: Synergy: A Lightweight Block Cipher with Variable Bit Rotation Feistel Network
|
|
0
|
1
|
June 6, 2025
|
[Resource Topic] 2025/1050: Integral Resistance of Block Ciphers with Key Whitening by Modular Addition
|
|
0
|
1
|
June 6, 2025
|
[Resource Topic] 2025/1049: XHMQV: Better Efficiency and Stronger Security for Signal’s Initial Handshake based on HMQV
|
|
0
|
0
|
June 6, 2025
|
[Resource Topic] 2025/1048: One-way multilinear functions of the second order with linear shifts
|
|
0
|
0
|
June 6, 2025
|
[Resource Topic] 2025/1047: Orient Express: Using Frobenius to Express Oriented Isogenies
|
|
0
|
4
|
June 5, 2025
|
[Resource Topic] 2025/1046: A Quasi-polynomial Time Algorithm for the Extrapolated Dihedral Coset Problem over Power-of-Two Moduli
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1045: Constrained Verifiable Random Functions Without Obfuscation and Friends
|
|
0
|
1
|
June 5, 2025
|
[Resource Topic] 2025/1044: When Threshold Meets Anamorphic Signatures: What is Possible and What is Not!
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1043: Designing QC-MDPC Public Key Encryption Schemes with Niederreiter's Construction and a Bit Flipping Decoder with Bounded DFR
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1042: Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip
|
|
0
|
1
|
June 5, 2025
|
[Resource Topic] 2025/1041: Rubato: Provably Post-Quantum Secure and Batched Asynchronous Randomness Beacon
|
|
0
|
1
|
June 5, 2025
|
[Resource Topic] 2025/1040: Weave: Efficient and Expressive Oblivious Analytics at Scale
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1039: Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWE
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1038: Security of Operations on Random Numbers: A Review
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1037: Committed Vector Oblivious Linear Evaluation and Its Applications
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1036: A Critique on Average-Case Noise Analysis in RLWE-Based Homomorphic Encryption
|
|
0
|
1
|
June 5, 2025
|
[Resource Topic] 2025/1035: Continuous Group-Key Agreement: Concurrent Updates without Pruning
|
|
0
|
1
|
June 5, 2025
|
[Resource Topic] 2025/1034: JANUS: Enhancing Asynchronous Common Subset with Trusted Hardware
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1033: Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1032: Constant-Round Asynchronous MPC with Optimal Resilience and Linear Communication
|
|
0
|
1
|
June 4, 2025
|
[Resource Topic] 2025/1031: Quasidifferential Saves Infeasible Differential: Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT
|
|
0
|
0
|
June 4, 2025
|
[Resource Topic] 2025/1030: Everlasting Anonymous Rate-Limited Tokens
|
|
0
|
1
|
June 3, 2025
|
[Resource Topic] 2025/1029: Improved Key Recovery Attacks of Ascon
|
|
0
|
1
|
June 3, 2025
|
[Resource Topic] 2025/1028: Group Key Progression: Strong Security for Shared Persistent Data
|
|
0
|
1
|
June 3, 2025
|