[Resource Topic] 2025/1659: Hurricane Mixer: The Eye in the Storm—Embedding Regulatory Oversight into Cryptocurrency Mixing Services
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1657: ORQ: Complex Analytics on Private Data with Strong Security Guarantees
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1634: BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques
|
|
0
|
0
|
September 12, 2025
|
[Resource Topic] 2025/1621: Page-efficient Encrypted Multi-Maps: New Techniques for Optimal Search Bandwidth
|
|
0
|
0
|
September 11, 2025
|
[Resource Topic] 2025/1611: Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees
|
|
0
|
0
|
September 11, 2025
|
[Resource Topic] 2025/1587: Secure Agents
|
|
0
|
2
|
September 5, 2025
|
[Resource Topic] 2025/1580: IronDict: Transparent Dictionaries from Polynomial Commitments
|
|
0
|
1
|
September 5, 2025
|
[Resource Topic] 2025/1579: TACITA: Threshold Aggregation without Client Interaction
|
|
0
|
0
|
September 5, 2025
|
[Resource Topic] 2025/1576: Compressed verification for post-quantum signatures with long-term public keys
|
|
0
|
0
|
September 5, 2025
|
[Resource Topic] 2025/1575: BitPriv: A Privacy-Preserving Protocol for DeFi Applications on Bitcoin
|
|
0
|
3
|
September 5, 2025
|
[Resource Topic] 2025/1556: CryptoFace: End-to-End Encrypted Face Recognition
|
|
0
|
0
|
September 3, 2025
|
[Resource Topic] 2025/1554: UniCross: A Universal Cross-Chain Payment Protocol with On-demand Privacy and High Scalability
|
|
0
|
2
|
September 3, 2025
|
[Resource Topic] 2025/1551: M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols
|
|
0
|
0
|
September 3, 2025
|
[Resource Topic] 2025/1549: Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection
|
|
0
|
1
|
September 3, 2025
|
[Resource Topic] 2025/1540: A Fine-Grained and Real-Time Functional Video Encryption and Sharing Scheme
|
|
0
|
2
|
August 30, 2025
|
[Resource Topic] 2025/1538: Evaluating Ascon in Secure Multi-Party Computation using Reverse Multiplication-Friendly Embeddings
|
|
0
|
1
|
August 30, 2025
|
[Resource Topic] 2025/1534: RBOOT: Accelerating Homomorphic Neural Network Inference by Fusing ReLU within Bootstrapping
|
|
0
|
4
|
August 30, 2025
|
[Resource Topic] 2025/1533: PARSAN-Mix: Packet-Aware Routing and Shuffling with Additional Noise for Latency Optimization in Mix Networks (Extended Version)
|
|
0
|
0
|
August 30, 2025
|
[Resource Topic] 2025/1532: Breaking the Layer Barrier: Remodeling Private Transformer Inference with Hybrid CKKS and MPC
|
|
0
|
0
|
August 30, 2025
|
[Resource Topic] 2025/1524: AUPCH: Auditable Unlinkable Payment Channel Hubs
|
|
0
|
2
|
August 28, 2025
|
[Resource Topic] 2025/1515: Privacy-Preserving Federated Inference for Genomic Analysis with Homomorphic Encryption
|
|
0
|
0
|
August 28, 2025
|
[Resource Topic] 2025/1502: CARPOOL: Secure And Reliable Proof of Location
|
|
0
|
0
|
August 28, 2025
|
[Resource Topic] 2025/1485: Glock: Garbled Locks for Bitcoin
|
|
0
|
1
|
August 20, 2025
|
[Resource Topic] 2025/1484: Boosting Payment Channel Network Liquidity with Topology Optimization and Transaction Selection
|
|
0
|
0
|
August 20, 2025
|
[Resource Topic] 2025/1482: Complex Elections via Threshold (Fully) Homomorphic Encryption
|
|
0
|
1
|
August 20, 2025
|
[Resource Topic] 2025/1468: Privacy-Preserving Machine Learning on Web Browsing for Public Opinion
|
|
0
|
4
|
August 13, 2025
|
[Resource Topic] 2025/1465: CoRReCt: Compute, Record, Replay, Compare to Secure Computations on Untrusted Systems
|
|
0
|
1
|
August 13, 2025
|
[Resource Topic] 2025/1457: DOC★: Access Control for Information-Theoretically Secure Key-Document Stores
|
|
0
|
2
|
August 12, 2025
|
[Resource Topic] 2025/1447: A New Paradigm for Privacy-Preserving Decision Tree Evaluation
|
|
0
|
1
|
August 12, 2025
|
[Resource Topic] 2025/1444: The Best of Both KEMs: Securely Combining KEMs in Post-Quantum Hybrid Schemes
|
|
0
|
1
|
August 12, 2025
|