[Resource Topic] 2025/1040: Weave: Efficient and Expressive Oblivious Analytics at Scale
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1038: Security of Operations on Random Numbers: A Review
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1034: JANUS: Enhancing Asynchronous Common Subset with Trusted Hardware
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1033: Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus
|
|
0
|
0
|
June 5, 2025
|
[Resource Topic] 2025/1025: Secure Noise Sampling for Differentially Private Collaborative Learning
|
|
0
|
1
|
June 2, 2025
|
[Resource Topic] 2025/1024: Towards Trustless Provenance: A Privacy-Preserving Framework for On-chain Media Verification
|
|
0
|
0
|
June 2, 2025
|
[Resource Topic] 2025/1019: Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions
|
|
0
|
1
|
June 2, 2025
|
[Resource Topic] 2025/991: MOAI: Module-Optimizing Architecture for Non-Interactive Secure Transformer Inference
|
|
0
|
0
|
June 2, 2025
|
[Resource Topic] 2025/964: TOOP: A transfer of ownership protocol over Bitcoin
|
|
0
|
2
|
May 27, 2025
|
[Resource Topic] 2025/957: Laurent Polynomial-Based Linear Transformations for Improved Functional Bootstrapping
|
|
0
|
4
|
May 27, 2025
|
[Resource Topic] 2025/927: Enhancing Meme Token Market Transparency: A Multi-Dimensional Entity-Linked Address Analysis for Liquidity Risk Evaluation
|
|
0
|
4
|
May 23, 2025
|
[Resource Topic] 2025/909: Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices
|
|
0
|
4
|
May 22, 2025
|
[Resource Topic] 2025/906: Covert Attacks on Machine Learning Training in Passively Secure MPC
|
|
0
|
2
|
May 21, 2025
|
[Resource Topic] 2025/861: MOCHA: Mixnet Optimization Considering Honest Client Anonymity
|
|
0
|
2
|
May 17, 2025
|
[Resource Topic] 2025/856: Testing the Tests - Opportunities for Corrections and Improvements in NIST SP 800-22r1a and its Reference Code
|
|
0
|
4
|
May 17, 2025
|
[Resource Topic] 2025/854: ProbeNav - Fast, precise and repeatable positioning of electromagnetic probes for local Side-Channel Attacks
|
|
0
|
0
|
May 17, 2025
|
[Resource Topic] 2025/846: Full-Authority Data Sharing Systems: Ciphertext-Dependent Proxy Re-Encryption with Dynamic Key Generation
|
|
0
|
3
|
May 16, 2025
|
[Resource Topic] 2025/826: Repeated Agreement is Cheap! On Weak Accountability and Multishot Byzantine Agreement
|
|
0
|
5
|
May 9, 2025
|
[Resource Topic] 2025/806: BERMUDA: A BPSec-Compatible Key Management Scheme for DTNs
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/804: Putting Sybils on a Diet: Securing Distributed Hash Tables using Proofs of Space
|
|
0
|
3
|
May 5, 2025
|
[Resource Topic] 2025/797: WEBCAT: Web-based Code Assurance and Transparency
|
|
0
|
4
|
May 5, 2025
|
[Resource Topic] 2025/794: Formal Analysis of Multi-Device Group Messaging in WhatsApp
|
|
0
|
5
|
May 5, 2025
|
[Resource Topic] 2025/782: AES Is Not Enough: the Block Ciphers Zoo Goes Homormorphic (over TFHE)
|
|
0
|
4
|
May 4, 2025
|
[Resource Topic] 2025/767: ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs
|
|
0
|
3
|
April 30, 2025
|
[Resource Topic] 2025/756: PIRCOR: Communication-Optimal Hintless Single-Server PIR via Homomorphic Rotation
|
|
0
|
2
|
April 30, 2025
|
[Resource Topic] 2025/752: LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts
|
|
0
|
2
|
April 28, 2025
|
[Resource Topic] 2025/745: When is liquid democracy possible? On the manipulation of variance
|
|
0
|
2
|
April 27, 2025
|
[Resource Topic] 2025/724: Privacy and Security in Distributed Data Markets
|
|
0
|
4
|
April 23, 2025
|
[Resource Topic] 2025/715: Updatable Signature with Public Tokens
|
|
0
|
5
|
April 21, 2025
|
[Resource Topic] 2025/713: LOHEN: Layer-wise Optimizations for Neural Network Inferences over Encrypted Data with High Performance or Accuracy
|
|
0
|
1
|
April 21, 2025
|