|
[Resource Topic] 2025/1982: On Evaluating Anonymity of Onion Routing
|
|
0
|
1
|
October 29, 2025
|
|
[Resource Topic] 2025/1969: Cryptographic Personas: Responsible Pseudonyms Without De-Anonymization
|
|
0
|
2
|
October 22, 2025
|
|
[Resource Topic] 2025/1965: Unobservable Contracts from Zerocash and Trusted Execution Environments
|
|
0
|
4
|
October 22, 2025
|
|
[Resource Topic] 2025/1963: Germany Is Rolling Out Nation-Scale Key Escrow And Nobody Is Talking About It
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1962: High Fidelity Security Mesh Monitoring using Low-Cost, Embedded Time Domain Reflectometry
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1961: Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws
|
|
0
|
0
|
October 20, 2025
|
|
[Resource Topic] 2025/1957: Fast Batch Matrix Multiplication in Ciphertexts
|
|
0
|
4
|
October 20, 2025
|
|
[Resource Topic] 2025/1952: KPIR-C: Keyword PIR with Arbitrary Server-side Computation
|
|
0
|
1
|
October 20, 2025
|
|
[Resource Topic] 2025/1949: On the Credibility of Deniable Communication in Court
|
|
0
|
1
|
October 20, 2025
|
|
[Resource Topic] 2025/1942: Privacy-Preserving Shape Matching with Leveled Homomorphic Encryption
|
|
0
|
1
|
October 20, 2025
|
|
[Resource Topic] 2025/1938: zk-Cookies: Continuous Anonymous Authentication for the Web
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1896: An Approach to Computable Contracts with Verifiable Computation Outsourcing and Blockchain Transactions
|
|
0
|
2
|
October 12, 2025
|
|
[Resource Topic] 2025/1891: Fraud Mitigation in Privacy-Preserving Attribution
|
|
0
|
2
|
October 12, 2025
|
|
[Resource Topic] 2025/1865: High-Throughput AES Transciphering using CKKS: Less than 1ms
|
|
0
|
2
|
October 8, 2025
|
|
[Resource Topic] 2025/1814: SoK: Is Proof-of-Useful-Work Really Useful?
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1811: Anchored Merkle Range Proof for Pedersen Commitments
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1799: Unforgettable Fuzzy Extractor: Practical Construction and Security Model
|
|
0
|
0
|
October 8, 2025
|
|
[Resource Topic] 2025/1744: Randomness beacons from financial data in the presence of an active attacker
|
|
0
|
0
|
September 25, 2025
|
|
[Resource Topic] 2025/1735: Edge Encryption using Iterative Management Framework
|
|
0
|
2
|
September 24, 2025
|
|
[Resource Topic] 2025/1731: ECCFROG522PP: An Enhanced 522-bit Weierstrass Elliptic Curve
|
|
0
|
3
|
September 23, 2025
|
|
[Resource Topic] 2025/1729: GuardianMPC: Backdoor-resilient Neural Network Computation
|
|
0
|
4
|
September 23, 2025
|
|
[Resource Topic] 2025/1725: Blockchain-based Economic Voting with Posterior Security from Lattices
|
|
0
|
1
|
September 23, 2025
|
|
[Resource Topic] 2025/1715: UltraMixer: A Compliant Zero-Knowledge Privacy Layer for Tokenized Real-World Assets
|
|
0
|
4
|
September 22, 2025
|
|
[Resource Topic] 2025/1709: The zkVot Protocol: A Distributed Computation Protocol for Censorship Resistant Anonymous Voting
|
|
0
|
6
|
September 21, 2025
|
|
[Resource Topic] 2025/1704: Data Anonymisation with the Density Matrix Classifier
|
|
0
|
2
|
September 20, 2025
|
|
[Resource Topic] 2025/1695: Mk-PIR: Multi-Keyword Private Information Retrieval
|
|
0
|
1
|
September 18, 2025
|
|
[Resource Topic] 2025/1689: IPCrypt: Optimal, Practical Encryption of IP Addresses for Privacy and Measurement
|
|
0
|
5
|
September 18, 2025
|
|
[Resource Topic] 2025/1688: SUMMER: Recursive Zero-Knowledge Proofs for Scalable RNN Training
|
|
0
|
2
|
September 18, 2025
|
|
[Resource Topic] 2025/1687: Web3 Recovery Mechanisms and User Preferences
|
|
0
|
0
|
September 18, 2025
|
|
[Resource Topic] 2025/1684: FHEMaLe: Framework for Homomorphic Encrypted Machine Learning
|
|
0
|
2
|
September 18, 2025
|