[Resource Topic] 2025/526: AI Agents in Cryptoland: Practical Attacks and No Silver Bullet
|
|
0
|
3
|
March 21, 2025
|
[Resource Topic] 2025/511: VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials
|
|
0
|
1
|
March 20, 2025
|
[Resource Topic] 2025/492: Endorser Peer Anonymization in Hyperledger Fabric for Consortium of Organizations
|
|
0
|
0
|
March 17, 2025
|
[Resource Topic] 2025/491: Blind Brother: Attribute-Based Selective Video Encryption
|
|
0
|
0
|
March 17, 2025
|
[Resource Topic] 2025/465: zkAML: Zero-knowledge Anti Money Laundering in Smart Contracts with whitelist approach
|
|
0
|
0
|
March 13, 2025
|
[Resource Topic] 2025/460: Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training
|
|
0
|
0
|
March 12, 2025
|
[Resource Topic] 2025/413: Garblet: Multi-party Computation for Protecting Chiplet-based Systems
|
|
0
|
1
|
March 4, 2025
|
[Resource Topic] 2025/392: Blockchain-based Secure D2D localisation with adaptive precision
|
|
0
|
1
|
March 4, 2025
|
[Resource Topic] 2025/388: Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures
|
|
0
|
3
|
March 4, 2025
|
[Resource Topic] 2025/357: Random Number Generation from Pulsars
|
|
0
|
0
|
March 4, 2025
|
[Resource Topic] 2025/350: Bootstrapping with RMFE for Fully Homomorphic Encryption
|
|
0
|
0
|
February 25, 2025
|
[Resource Topic] 2025/331: Private Multi-Party Neural Network Training over $\mathbb{Z}_{2^k}$ via Galois Rings
|
|
0
|
1
|
February 25, 2025
|
[Resource Topic] 2025/322: Partial and Fully Homomorphic Matching of IP Addresses Against Blacklists for Threat Analysis
|
|
0
|
0
|
February 24, 2025
|
[Resource Topic] 2025/267: Authentication and sole control at a high level of assurance on widespread smartphones with threshold signatures
|
|
0
|
0
|
February 18, 2025
|
[Resource Topic] 2025/241: IBE-IBE: Intent-Based Execution through Identity-Based Encryption and Auctions
|
|
0
|
1
|
February 17, 2025
|
[Resource Topic] 2025/239: DART: Decentralized, Anonymous, and Regulation-friendly Tokenization
|
|
0
|
3
|
February 17, 2025
|
[Resource Topic] 2025/219: Slot a la carte: Centralization Issues in Ethereum's Proof-of-Stake Protocol
|
|
0
|
1
|
February 14, 2025
|
[Resource Topic] 2025/218: LSM Trees in Adversarial Environments
|
|
0
|
1
|
February 13, 2025
|
[Resource Topic] 2025/209: NovaTEE: Private Clearing and Settlement on Trusted Execution Hardware
|
|
0
|
3
|
February 12, 2025
|
[Resource Topic] 2025/205: Addressing Scalability Issues of Blockchains with Hypergraph Payment Networks
|
|
0
|
0
|
February 12, 2025
|
[Resource Topic] 2025/183: OBLIVIATOR: Oblivious Parallel Joins and other Operators in Shared Memory Environments
|
|
0
|
6
|
February 10, 2025
|
[Resource Topic] 2025/180: On the Atomicity and Efficiency of Blockchain Payment Channels
|
|
0
|
7
|
February 10, 2025
|
[Resource Topic] 2025/173: A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography
|
|
0
|
2
|
February 7, 2025
|
[Resource Topic] 2025/166: Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography
|
|
0
|
2
|
February 5, 2025
|
[Resource Topic] 2025/156: TallyGuard: Privacy Preserving Tallied-as-cast Guarantee
|
|
0
|
2
|
February 3, 2025
|
[Resource Topic] 2025/126: Always by Your Side: Constructing Traceable Anonymous Credentials with Hardware-Binding
|
|
0
|
3
|
January 28, 2025
|
[Resource Topic] 2025/125: A Privacy Model for Classical & Learned Bloom Filters
|
|
0
|
0
|
January 27, 2025
|
[Resource Topic] 2025/098: Fast, private and regulated payments in asynchronous networks
|
|
0
|
3
|
January 22, 2025
|
[Resource Topic] 2025/090: Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System
|
|
0
|
0
|
January 22, 2025
|
[Resource Topic] 2025/089: An Introduction to Protein Cryptography
|
|
0
|
0
|
January 22, 2025
|