[Resource Topic] 2025/610: Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice
|
|
0
|
0
|
April 8, 2025
|
[Resource Topic] 2025/597: SoK: Self-Generated Nudes over Private Chats: How Can Technology Contribute to a Safer Sexting?
|
|
0
|
2
|
April 4, 2025
|
[Resource Topic] 2025/590: $\mathsf{emGraph}$: Efficient Multiparty Secure Graph Computation
|
|
0
|
0
|
April 4, 2025
|
[Resource Topic] 2025/579: REGKYC: Supporting Privacy and Compliance Enforcement for KYC in Blockchains
|
|
0
|
2
|
April 1, 2025
|
[Resource Topic] 2025/572: Zinnia: An Expressive and Efficient Tensor-Oriented Zero-Knowledge Programming Framework
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/561: ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/558: Breaking and Fixing Content-Defined Chunking
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/556: Private SCT Auditing, Revisited
|
|
0
|
0
|
March 28, 2025
|
[Resource Topic] 2025/549: Public Key Accumulators for Revocation of Non-Anonymous Credentials
|
|
0
|
0
|
March 26, 2025
|
[Resource Topic] 2025/546: BugWhisperer: Fine-Tuning LLMs for SoC Hardware Vulnerability Detection
|
|
0
|
1
|
March 25, 2025
|
[Resource Topic] 2025/539: Aegis: Scalable Privacy-preserving CBDC Framework with Dynamic Proof of Liabilities
|
|
0
|
2
|
March 25, 2025
|
[Resource Topic] 2025/538: Efficient Proofs of Possession for Legacy Signatures
|
|
0
|
0
|
March 25, 2025
|
[Resource Topic] 2025/535: zkPyTorch: A Hierarchical Optimized Compiler for Zero-Knowledge Machine Learning
|
|
0
|
2
|
March 23, 2025
|
[Resource Topic] 2025/534: Plonkify: R1CS-to-Plonk transpiler
|
|
0
|
2
|
March 23, 2025
|
[Resource Topic] 2025/527: SoK: Fully-homomorphic encryption in smart contracts
|
|
0
|
1
|
March 23, 2025
|
[Resource Topic] 2025/526: AI Agents in Cryptoland: Practical Attacks and No Silver Bullet
|
|
0
|
3
|
March 21, 2025
|
[Resource Topic] 2025/511: VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials
|
|
0
|
1
|
March 20, 2025
|
[Resource Topic] 2025/492: Endorser Peer Anonymization in Hyperledger Fabric for Consortium of Organizations
|
|
0
|
0
|
March 17, 2025
|
[Resource Topic] 2025/491: Blind Brother: Attribute-Based Selective Video Encryption
|
|
0
|
1
|
March 17, 2025
|
[Resource Topic] 2025/465: zkAML: Zero-knowledge Anti Money Laundering in Smart Contracts with whitelist approach
|
|
0
|
0
|
March 13, 2025
|
[Resource Topic] 2025/460: Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training
|
|
0
|
0
|
March 12, 2025
|
[Resource Topic] 2025/413: Garblet: Multi-party Computation for Protecting Chiplet-based Systems
|
|
0
|
1
|
March 4, 2025
|
[Resource Topic] 2025/392: Blockchain-based Secure D2D localisation with adaptive precision
|
|
0
|
1
|
March 4, 2025
|
[Resource Topic] 2025/388: Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures
|
|
0
|
4
|
March 4, 2025
|
[Resource Topic] 2025/357: Random Number Generation from Pulsars
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/350: Bootstrapping with RMFE for Fully Homomorphic Encryption
|
|
0
|
0
|
February 25, 2025
|
[Resource Topic] 2025/331: Private Multi-Party Neural Network Training over $\mathbb{Z}_{2^k}$ via Galois Rings
|
|
0
|
1
|
February 25, 2025
|
[Resource Topic] 2025/322: Partial and Fully Homomorphic Matching of IP Addresses Against Blacklists for Threat Analysis
|
|
0
|
0
|
February 24, 2025
|
[Resource Topic] 2025/267: Authentication and sole control at a high level of assurance on widespread smartphones with threshold signatures
|
|
0
|
0
|
February 18, 2025
|
[Resource Topic] 2025/241: IBE-IBE: Intent-Based Execution through Identity-Based Encryption and Auctions
|
|
0
|
1
|
February 17, 2025
|