[Resource Topic] 2025/944: Succinct Witness Encryption for Batch Languages and Applications
|
|
0
|
3
|
May 23, 2025
|
[Resource Topic] 2025/943: On the Adaptive Security of Key-Unique Threshold Signatures
|
|
0
|
4
|
May 23, 2025
|
[Resource Topic] 2025/942: On the (in)security of Proofs-of-Space based Longest-Chain Blockchains
|
|
0
|
1
|
May 23, 2025
|
[Resource Topic] 2025/941: Proof of Exponentiation: Enhanced Prover Efficiency for Algebraic Statements
|
|
0
|
1
|
May 23, 2025
|
[Resource Topic] 2025/940: Special Genera of Hermitian Lattices and Applications to HAWK
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/939: On the security of one certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/938: PSYLOCKE: Provably Secure Logic Locking with Practical Efficiency
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/937: Attacking Poseidon via Graeffe-Based Root-Finding over NTT-Friendly Fields
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/936: Justvengers: Batched VOLE ZK Disjunctions in $\mathcal{O}(R{+}B{+}C)$ Communication
|
|
0
|
2
|
May 23, 2025
|
[Resource Topic] 2025/935: Side-channel safe conditional moves and swaps
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/934: Diving Deep Into UC: Uncovering and Resolving Issues in Universal Composability
|
|
0
|
1
|
May 23, 2025
|
[Resource Topic] 2025/933: Fast elliptic curve scalar multiplications in SN(T)ARK circuits
|
|
0
|
3
|
May 23, 2025
|
[Resource Topic] 2025/932: Integral cryptanalysis in characteristic $p$
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/931: Multivalued Broadcast with Optimal Length
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/930: SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/929: The DROP Protocol: Dispute Resolution via Observation in Public for Verifiable, In-Person Voting
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/928: HAWK: Having Automorphisms Weakens Key
|
|
0
|
1
|
May 23, 2025
|
[Resource Topic] 2025/927: Enhancing Meme Token Market Transparency: A Multi-Dimensional Entity-Linked Address Analysis for Liquidity Risk Evaluation
|
|
0
|
1
|
May 23, 2025
|
[Resource Topic] 2025/926: Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues (Full Version)
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/925: SCMAC and LOL2.0: An AEAD Design Framework and A New Version of LOL Stream Cipher Design Framework
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/924: Card-Based Protocol Counting Connected Components of Graphs
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/923: SPECK: Signatures from Permutation Equivalence of Codes and Kernels
|
|
0
|
4
|
May 23, 2025
|
[Resource Topic] 2025/922: $\mathsf{HyperWolf}$: Efficient Polynomial Commitment Schemes from Lattices
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/921: Zero-knowledge Authenticator for Blockchain: Policy-private and Obliviously Updateable
|
|
0
|
2
|
May 23, 2025
|
[Resource Topic] 2025/920: SQIsign2D$^2$: New SQIsign2D Variant by Leveraging Power Smooth Isogenies in Dimension One
|
|
0
|
1
|
May 23, 2025
|
[Resource Topic] 2025/919: Rep3 Reloaded: On the Cost of Function-Dependent Preprocessing in Semi-Honest 3PC with Honest Majority
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/918: The Accidental Computer: Polynomial Commitments from Data Availability
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/917: Jagged Polynomial Commitments (or: How to Stack Multilinears)
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/916: Automated Verification of Consistency in Zero-Knowledge Proof Circuits
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/915: Improved differential cryptanalysis of SPEEDY
|
|
0
|
0
|
May 23, 2025
|