About the Resource category
|
|
0
|
2354
|
July 30, 2022
|
[Resource Topic] 2025/841: Verifiable E-Voting with a Trustless Bulletin Board
|
|
0
|
0
|
May 13, 2025
|
[Resource Topic] 2025/840: T-Spoon: Tightly Secure Two-Round Multi-Signatures with Key Aggregation
|
|
0
|
0
|
May 13, 2025
|
[Resource Topic] 2025/839: Correlation power analysis of LESS and CROSS
|
|
0
|
2
|
May 12, 2025
|
[Resource Topic] 2025/838: KeyJoin: Privacy-Focused CoinJoin Protocol for Bitcoin
|
|
0
|
1
|
May 12, 2025
|
[Resource Topic] 2025/837: Towards Optimal Differential Attacks on FLY and PIPO
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/836: Registered Functional Encryption for Attribute-Weighted Sums with Access Control
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/835: Universally Composable Interactive and Ordered Multi-Signatures
|
|
0
|
1
|
May 12, 2025
|
[Resource Topic] 2025/834: A Note on ``CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT''
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/833: A note on closed addition chains and complete numbers
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/832: Constant-time Integer Arithmetic for SQIsign
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/831: Worst-Case Time Analysis of Key Agreement Protocols in 10BASE-T1S Automotive Networks
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/830: Simple Power Analysis Attack on SQIsign
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/829: Row Reduction Techniques for n-Party Garbling
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/828: Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/827: Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios
|
|
0
|
1
|
May 9, 2025
|
[Resource Topic] 2025/826: Repeated Agreement is Cheap! On Weak Accountability and Multishot Byzantine Agreement
|
|
0
|
1
|
May 9, 2025
|
[Resource Topic] 2025/825: High-Performance FPGA Implementations of Lightweight ASCON-128 and ASCON-128a with Enhanced Throughput-to-Area Efficiency
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/824: A Specification of an Anonymous Credential System Using BBS+ Signatures with Privacy-Preserving Revocation and Device Binding
|
|
0
|
1
|
May 9, 2025
|
[Resource Topic] 2025/823: Sampling Arbitrary Discrete Distributions for RV Commitment Schemes Using the Trimmed-Tree Knuth-Yao Algorithm
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/822: Generalization of semi-regular sequences: Maximal Gröbner basis degree, variants of genericness, and related conjectures
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/821: Multi-Client Attribute-Based and Predicate Encryption, Revisited
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/820: One Bit to Rule Them All – Imperfect Randomness Harms Lattice Signatures
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/819: SoK: Dlog-based Distributed Key Generation
|
|
0
|
1
|
May 9, 2025
|
[Resource Topic] 2025/818: An Attack on TON’s ADNL Secure Channel Protocol
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/817: Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes
|
|
0
|
2
|
May 9, 2025
|
[Resource Topic] 2025/816: Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/815: Security Analysis of NIST Key Derivation Using Pseudorandom Functions
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/814: Groebner Basis Cryptanalysis of Anemoi
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/813: HydraProofs: Optimally Computing All Proofs in a Vector Commitment (with applications to efficient zkSNARKs over data from multiple users)
|
|
0
|
0
|
May 9, 2025
|