[Resource Topic] 2025/1173: The Effectiveness of Differential Privacy in Real-world Settings: A Metrics-based Framework to help Practitioners Visualise and Evaluate $\varepsilon$
|
|
0
|
0
|
June 23, 2025
|
[Resource Topic] 2025/1170: Optimized Rank Sort for Encrypted Real Numbers
|
|
0
|
0
|
June 23, 2025
|
[Resource Topic] 2025/1168: On Frontrunning Risks in Batch-Order Fair Systems for Blockchains (Extended Version)
|
|
0
|
0
|
June 20, 2025
|
[Resource Topic] 2025/1162: SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models
|
|
0
|
5
|
June 20, 2025
|
[Resource Topic] 2025/1160: Black-box Approaches to Authenticated Dictionaries: New Constructions and Lower Bounds
|
|
0
|
0
|
June 20, 2025
|
[Resource Topic] 2025/1153: Privacy-aware White and Black List Searching for Fraud Analysis
|
|
0
|
1
|
June 20, 2025
|
[Resource Topic] 2025/1152: ZK-ProVer: Proving Programming Verification in Non-Interactive Zero-Knowledge Proofs
|
|
0
|
1
|
June 20, 2025
|
[Resource Topic] 2025/1150: Lightweight Sorting in Approximate Homomorphic Encryption
|
|
0
|
1
|
June 20, 2025
|
[Resource Topic] 2025/1147: Jigsaw: Doubly Private Smart Contracts
|
|
0
|
1
|
June 20, 2025
|
[Resource Topic] 2025/1144: Parasol Compiler: Pushing the Boundaries of FHE Program Efficiency
|
|
0
|
0
|
June 19, 2025
|
[Resource Topic] 2025/1131: Empowering Privacy: A Zero Cost Protocol for Concealing LGBTQ Search Queries
|
|
0
|
2
|
June 17, 2025
|
[Resource Topic] 2025/1124: Toxic Decoys: A Path to Scaling Privacy-Preserving Cryptocurrencies
|
|
0
|
0
|
June 16, 2025
|
[Resource Topic] 2025/1117: Speeding Up Sum-Check Proving
|
|
0
|
0
|
June 16, 2025
|
[Resource Topic] 2025/1113: Computational Attestations of Polynomial Integrity Towards Verifiable Back-Propagation
|
|
0
|
4
|
June 13, 2025
|
[Resource Topic] 2025/1102: TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System
|
|
0
|
8
|
June 13, 2025
|
[Resource Topic] 2025/1088: Homomorphic Field Trace Revisited : Breaking the Cubic Noise Barrier
|
|
0
|
3
|
June 12, 2025
|
[Resource Topic] 2025/1081: FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC
|
|
0
|
4
|
June 10, 2025
|
[Resource Topic] 2025/1063: MIZAR: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration
|
|
0
|
7
|
June 9, 2025
|
[Resource Topic] 2025/1062: TrafficProof: Privacy-Preserving Reliable Traffic Information Sharing in Social Internet of Vehicles
|
|
0
|
5
|
June 9, 2025
|
[Resource Topic] 2025/1040: Weave: Efficient and Expressive Oblivious Analytics at Scale
|
|
0
|
1
|
June 5, 2025
|
[Resource Topic] 2025/1038: Security of Operations on Random Numbers: A Review
|
|
0
|
6
|
June 5, 2025
|
[Resource Topic] 2025/1034: JANUS: Enhancing Asynchronous Common Subset with Trusted Hardware
|
|
0
|
2
|
June 5, 2025
|
[Resource Topic] 2025/1033: Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus
|
|
0
|
3
|
June 5, 2025
|
[Resource Topic] 2025/1025: Secure Noise Sampling for Differentially Private Collaborative Learning
|
|
0
|
1
|
June 2, 2025
|
[Resource Topic] 2025/1024: Towards Trustless Provenance: A Privacy-Preserving Framework for On-chain Media Verification
|
|
0
|
3
|
June 2, 2025
|
[Resource Topic] 2025/1019: Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions
|
|
0
|
1
|
June 2, 2025
|
[Resource Topic] 2025/991: MOAI: Module-Optimizing Architecture for Non-Interactive Secure Transformer Inference
|
|
0
|
4
|
June 2, 2025
|
[Resource Topic] 2025/964: TOOP: A transfer of ownership protocol over Bitcoin
|
|
0
|
5
|
May 27, 2025
|
[Resource Topic] 2025/957: Laurent Polynomial-Based Linear Transformations for Improved Functional Bootstrapping
|
|
0
|
5
|
May 27, 2025
|
[Resource Topic] 2025/927: Enhancing Meme Token Market Transparency: A Multi-Dimensional Entity-Linked Address Analysis for Liquidity Risk Evaluation
|
|
0
|
5
|
May 23, 2025
|