[Resource Topic] 2024/639: Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/635: Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption
|
|
0
|
6
|
April 26, 2024
|
[Resource Topic] 2024/619: BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison
|
|
0
|
6
|
April 26, 2024
|
[Resource Topic] 2024/612: FHERMA: Building the Open-Source FHE Components Library for Practical Use
|
|
0
|
28
|
April 22, 2024
|
[Resource Topic] 2024/597: Blockchain-based decentralized identity system: Design and security analysis
|
|
0
|
23
|
April 18, 2024
|
[Resource Topic] 2024/588: Digital Signatures for Authenticating Compressed JPEG Images
|
|
0
|
28
|
April 16, 2024
|
[Resource Topic] 2024/586: Encryption Based Covert Channel for Large Language Models
|
|
0
|
30
|
April 16, 2024
|
[Resource Topic] 2024/573: Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy
|
|
0
|
21
|
April 16, 2024
|
[Resource Topic] 2024/562: Practical Proofs of Parsing for Context-free Grammars
|
|
0
|
29
|
April 12, 2024
|
[Resource Topic] 2024/559: Convolution-Friendly Image Compression in FHE
|
|
0
|
36
|
April 12, 2024
|
[Resource Topic] 2024/556: Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage
|
|
0
|
25
|
April 10, 2024
|
[Resource Topic] 2024/552: Insights from building a blockchain-based metaverse
|
|
0
|
18
|
April 10, 2024
|
[Resource Topic] 2024/536: Highly-Effective Backdoors for Hash Functions and Beyond
|
|
0
|
31
|
April 6, 2024
|
[Resource Topic] 2024/532: Analysing Cryptography in the Wild -- A Retrospective
|
|
0
|
33
|
April 6, 2024
|
[Resource Topic] 2024/516: Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages
|
|
0
|
24
|
April 6, 2024
|
[Resource Topic] 2024/515: Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE
|
|
0
|
21
|
April 6, 2024
|
[Resource Topic] 2024/506: A Decentralized Federated Learning using Reputation
|
|
0
|
30
|
April 1, 2024
|
[Resource Topic] 2024/502: Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain
|
|
0
|
26
|
April 1, 2024
|
[Resource Topic] 2024/494: HW-token-based Common Random String Setup
|
|
0
|
26
|
April 1, 2024
|
[Resource Topic] 2024/492: Statistical testing of random number generators and their improvement using randomness extraction
|
|
0
|
35
|
March 27, 2024
|
[Resource Topic] 2024/477: Large Language Models for Blockchain Security: A Systematic Literature Review
|
|
0
|
36
|
March 22, 2024
|
[Resource Topic] 2024/476: OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning
|
|
0
|
32
|
March 22, 2024
|
[Resource Topic] 2024/475: CheckOut: User-Controlled Anonymization for Customer Loyalty Programs
|
|
0
|
34
|
March 22, 2024
|
[Resource Topic] 2024/461: Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy
|
|
0
|
32
|
March 22, 2024
|
[Resource Topic] 2024/460: Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption
|
|
0
|
27
|
March 22, 2024
|
[Resource Topic] 2024/455: Anonymous Complaint Aggregation for Secure Messaging
|
|
0
|
39
|
March 18, 2024
|
[Resource Topic] 2024/447: ORIGO: Proving Provenance of Sensitive Data with Constant Communication
|
|
0
|
40
|
March 15, 2024
|
[Resource Topic] 2024/423: Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores
|
|
0
|
32
|
March 15, 2024
|
[Resource Topic] 2024/412: Quasi-Optimal Permutation Ranking and Applications to PERK
|
|
0
|
37
|
March 8, 2024
|
[Resource Topic] 2024/409: Nebula: A Privacy-First Platform for Data Backhaul
|
|
0
|
39
|
March 8, 2024
|