|
[Resource Topic] 2025/2131: Persistent BitTorrent Trackers
|
|
0
|
10
|
November 21, 2025
|
|
[Resource Topic] 2025/2126: DPaaS: Improving Decentralization by Removing Relays in Ethereum PBS
|
|
0
|
7
|
November 21, 2025
|
|
[Resource Topic] 2025/2120: Language-Agnostic Detection of Computation-Constraint Inconsistencies in ZKP Programs via Value Inference
|
|
0
|
3
|
November 21, 2025
|
|
[Resource Topic] 2025/2106: SoK: Blockchain Oracles Between Theory and Practice
|
|
0
|
7
|
November 17, 2025
|
|
[Resource Topic] 2025/2098: Optical computing of zero-knowledge proof with single-pixel imaging
|
|
0
|
5
|
November 17, 2025
|
|
[Resource Topic] 2025/2094: Vega: Low-Latency Zero-Knowledge Proofs over Existing Credentials
|
|
0
|
6
|
November 14, 2025
|
|
[Resource Topic] 2025/2092: CRA and Cryptography: The Story Thus Far
|
|
0
|
4
|
November 14, 2025
|
|
[Resource Topic] 2025/2058: Real-Time Encrypted Emotion Recognition Using Homomorphic Encryption
|
|
0
|
4
|
November 9, 2025
|
|
[Resource Topic] 2025/2047: Enabling Index-free Adjacency in Oblivious Graph Processing with Delayed Duplications
|
|
0
|
3
|
November 6, 2025
|
|
[Resource Topic] 2025/2034: MtDB: A Decentralized Multi-Tenant Database for Secure Data Sharing
|
|
0
|
4
|
November 5, 2025
|
|
[Resource Topic] 2025/2033: Vestigial Vulnerabilities in Deployed Verifiable E-Voting Systems
|
|
0
|
7
|
November 5, 2025
|
|
[Resource Topic] 2025/2031: A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
|
|
0
|
7
|
November 3, 2025
|
|
[Resource Topic] 2025/2026: Whom do you trust? PRISM: Lightweight Key Transparency for All
|
|
0
|
6
|
November 3, 2025
|
|
[Resource Topic] 2025/2013: MARS: Low-Leakage Multi Adversarial Owner and Reader Replication-free Searchable Encryption from Private Information Retrieval
|
|
0
|
7
|
November 1, 2025
|
|
[Resource Topic] 2025/1982: On Evaluating Anonymity of Onion Routing
|
|
0
|
6
|
October 29, 2025
|
|
[Resource Topic] 2025/1969: Cryptographic Personas: Responsible Pseudonyms Without De-Anonymization
|
|
0
|
3
|
October 22, 2025
|
|
[Resource Topic] 2025/1965: Unobservable Contracts from Zerocash and Trusted Execution Environments
|
|
0
|
5
|
October 22, 2025
|
|
[Resource Topic] 2025/1963: Germany Is Rolling Out Nation-Scale Key Escrow And Nobody Is Talking About It
|
|
0
|
8
|
October 20, 2025
|
|
[Resource Topic] 2025/1962: High Fidelity Security Mesh Monitoring using Low-Cost, Embedded Time Domain Reflectometry
|
|
0
|
4
|
October 20, 2025
|
|
[Resource Topic] 2025/1961: Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws
|
|
0
|
9
|
October 20, 2025
|
|
[Resource Topic] 2025/1957: Fast Batch Matrix Multiplication in Ciphertexts
|
|
0
|
6
|
October 20, 2025
|
|
[Resource Topic] 2025/1952: KPIR-C: Keyword PIR with Arbitrary Server-side Computation
|
|
0
|
9
|
October 20, 2025
|
|
[Resource Topic] 2025/1949: On the Credibility of Deniable Communication in Court
|
|
0
|
4
|
October 20, 2025
|
|
[Resource Topic] 2025/1942: Privacy-Preserving Shape Matching with Leveled Homomorphic Encryption
|
|
0
|
10
|
October 20, 2025
|
|
[Resource Topic] 2025/1938: zk-Cookies: Continuous Anonymous Authentication for the Web
|
|
0
|
13
|
October 20, 2025
|
|
[Resource Topic] 2025/1896: An Approach to Computable Contracts with Verifiable Computation Outsourcing and Blockchain Transactions
|
|
0
|
7
|
October 12, 2025
|
|
[Resource Topic] 2025/1891: Fraud Mitigation in Privacy-Preserving Attribution
|
|
0
|
4
|
October 12, 2025
|
|
[Resource Topic] 2025/1865: High-Throughput AES Transciphering using CKKS: Less than 1ms
|
|
0
|
7
|
October 8, 2025
|
|
[Resource Topic] 2025/1814: SoK: Is Proof-of-Useful-Work Really Useful?
|
|
0
|
2
|
October 8, 2025
|
|
[Resource Topic] 2025/1811: Anchored Merkle Range Proof for Pedersen Commitments
|
|
0
|
2
|
October 8, 2025
|