[Resource Topic] 2024/610: Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation
|
|
0
|
26
|
April 22, 2024
|
[Resource Topic] 2024/609: New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes
|
|
0
|
24
|
April 22, 2024
|
[Resource Topic] 2024/608: The Practical Advantage of RSA over ECC and Pairings
|
|
0
|
29
|
April 22, 2024
|
[Resource Topic] 2024/607: Low-latency Secure Integrated Sensing and Communication with Transmitter Actions
|
|
0
|
24
|
April 22, 2024
|
[Resource Topic] 2024/606: Classical Commitments to Quantum States
|
|
0
|
28
|
April 22, 2024
|
[Resource Topic] 2024/605: Security Analysis of XHASH8/12
|
|
0
|
20
|
April 22, 2024
|
[Resource Topic] 2024/604: Generic MitM Attack Frameworks on Sponge Constructions
|
|
0
|
23
|
April 22, 2024
|
[Resource Topic] 2024/603: Worst-Case to Average-Case Hardness of LWE: A Simple and Practical Perspective
|
|
0
|
25
|
April 22, 2024
|
[Resource Topic] 2024/602: Secret-Sharing Schemes for High Slices
|
|
0
|
23
|
April 22, 2024
|
[Resource Topic] 2024/601: Improved Provable Reduction of NTRU and Hypercubic Lattices
|
|
0
|
23
|
April 22, 2024
|
[Resource Topic] 2024/600: A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-
|
|
0
|
20
|
April 22, 2024
|
[Resource Topic] 2024/599: Probabilistically Checkable Arguments for all NP
|
|
0
|
29
|
April 18, 2024
|
[Resource Topic] 2024/598: A Characterization of AE Robustness as Decryption Leakage Indistinguishability
|
|
0
|
28
|
April 18, 2024
|
[Resource Topic] 2024/597: Blockchain-based decentralized identity system: Design and security analysis
|
|
0
|
25
|
April 18, 2024
|
[Resource Topic] 2024/596: Cryptanalysis of signature schemes based on the root extraction problem over braid group
|
|
0
|
29
|
April 18, 2024
|
[Resource Topic] 2024/595: Analysis of Multivariate Encryption Schemes: Application to Dob and C*
|
|
0
|
23
|
April 18, 2024
|
[Resource Topic] 2024/555: Quantum Algorithms for Lattice Problems
|
|
1
|
290
|
April 16, 2024
|
[Resource Topic] 2024/594: Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation
|
|
0
|
34
|
April 16, 2024
|
[Resource Topic] 2024/593: The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem
|
|
0
|
31
|
April 16, 2024
|
[Resource Topic] 2024/592: Asymptotics for the standard block size in primal lattice attacks: second order, formally verified
|
|
0
|
30
|
April 16, 2024
|
[Resource Topic] 2024/591: Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures
|
|
0
|
27
|
April 16, 2024
|
[Resource Topic] 2024/590: Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks
|
|
0
|
30
|
April 16, 2024
|
[Resource Topic] 2024/589: Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
|
|
0
|
31
|
April 16, 2024
|
[Resource Topic] 2024/588: Digital Signatures for Authenticating Compressed JPEG Images
|
|
0
|
28
|
April 16, 2024
|
[Resource Topic] 2024/587: Hidden $\Delta$-fairness: A Novel Notion for Fair Secure Two-Party Computation
|
|
0
|
27
|
April 16, 2024
|
[Resource Topic] 2024/586: Encryption Based Covert Channel for Large Language Models
|
|
0
|
30
|
April 16, 2024
|
[Resource Topic] 2024/585: A Complete Beginner Guide to the Number Theoretic Transform (NTT)
|
|
0
|
29
|
April 16, 2024
|
[Resource Topic] 2024/584: Efficient Implementations of Square-root Vélu's Formulas
|
|
0
|
24
|
April 16, 2024
|
[Resource Topic] 2024/583: A Note on Quantum Algorithms for Lattice Problems
|
|
0
|
79
|
April 16, 2024
|
[Resource Topic] 2024/582: Improved Alternating Moduli PRFs and Post-Quantum Signatures
|
|
0
|
28
|
April 16, 2024
|