|
[Resource Topic] 2025/1799: Unforgettable Fuzzy Extractor: Practical Construction and Security Model
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1744: Randomness beacons from financial data in the presence of an active attacker
|
|
0
|
1
|
September 25, 2025
|
|
[Resource Topic] 2025/1735: Edge Encryption using Iterative Management Framework
|
|
0
|
7
|
September 24, 2025
|
|
[Resource Topic] 2025/1731: ECCFROG522PP: An Enhanced 522-bit Weierstrass Elliptic Curve
|
|
0
|
6
|
September 23, 2025
|
|
[Resource Topic] 2025/1729: GuardianMPC: Backdoor-resilient Neural Network Computation
|
|
0
|
4
|
September 23, 2025
|
|
[Resource Topic] 2025/1725: Blockchain-based Economic Voting with Posterior Security from Lattices
|
|
0
|
3
|
September 23, 2025
|
|
[Resource Topic] 2025/1715: UltraMixer: A Compliant Zero-Knowledge Privacy Layer for Tokenized Real-World Assets
|
|
0
|
6
|
September 22, 2025
|
|
[Resource Topic] 2025/1709: The zkVot Protocol: A Distributed Computation Protocol for Censorship Resistant Anonymous Voting
|
|
0
|
6
|
September 21, 2025
|
|
[Resource Topic] 2025/1704: Data Anonymisation with the Density Matrix Classifier
|
|
0
|
2
|
September 20, 2025
|
|
[Resource Topic] 2025/1695: Mk-PIR: Multi-Keyword Private Information Retrieval
|
|
0
|
7
|
September 18, 2025
|
|
[Resource Topic] 2025/1689: IPCrypt: Optimal, Practical Encryption of IP Addresses for Privacy and Measurement
|
|
0
|
21
|
September 18, 2025
|
|
[Resource Topic] 2025/1688: SUMMER: Recursive Zero-Knowledge Proofs for Scalable RNN Training
|
|
0
|
6
|
September 18, 2025
|
|
[Resource Topic] 2025/1687: Web3 Recovery Mechanisms and User Preferences
|
|
0
|
0
|
September 18, 2025
|
|
[Resource Topic] 2025/1684: FHEMaLe: Framework for Homomorphic Encrypted Machine Learning
|
|
0
|
11
|
September 18, 2025
|
|
[Resource Topic] 2025/1669: Experience from UNITA Elections: Reconciling Revote, E2E Verifiability and Low Coercion
|
|
0
|
5
|
September 18, 2025
|
|
[Resource Topic] 2025/1659: Hurricane Mixer: The Eye in the Storm—Embedding Regulatory Oversight into Cryptocurrency Mixing Services
|
|
0
|
7
|
September 17, 2025
|
|
[Resource Topic] 2025/1657: ORQ: Complex Analytics on Private Data with Strong Security Guarantees
|
|
0
|
0
|
September 17, 2025
|
|
[Resource Topic] 2025/1634: BlockLens: Detecting Malicious Transactions in Ethereum Using LLM Techniques
|
|
0
|
14
|
September 12, 2025
|
|
[Resource Topic] 2025/1621: Page-efficient Encrypted Multi-Maps: New Techniques for Optimal Search Bandwidth
|
|
0
|
2
|
September 11, 2025
|
|
[Resource Topic] 2025/1611: Probabilistic Skipping-Based Data Structures with Robust Efficiency Guarantees
|
|
0
|
10
|
September 11, 2025
|
|
[Resource Topic] 2025/1587: Secure Agents
|
|
0
|
5
|
September 5, 2025
|
|
[Resource Topic] 2025/1580: IronDict: Transparent Dictionaries from Polynomial Commitments
|
|
0
|
1
|
September 5, 2025
|
|
[Resource Topic] 2025/1579: TACITA: Threshold Aggregation without Client Interaction
|
|
0
|
11
|
September 5, 2025
|
|
[Resource Topic] 2025/1576: Compressed verification for post-quantum signatures with long-term public keys
|
|
0
|
2
|
September 5, 2025
|
|
[Resource Topic] 2025/1575: BitPriv: A Privacy-Preserving Protocol for DeFi Applications on Bitcoin
|
|
0
|
8
|
September 5, 2025
|
|
[Resource Topic] 2025/1556: CryptoFace: End-to-End Encrypted Face Recognition
|
|
0
|
15
|
September 3, 2025
|
|
[Resource Topic] 2025/1554: UniCross: A Universal Cross-Chain Payment Protocol with On-demand Privacy and High Scalability
|
|
0
|
5
|
September 3, 2025
|
|
[Resource Topic] 2025/1551: M&M: Secure Two-Party Machine Learning through Efficient Modulus Conversion and Mixed-Mode Protocols
|
|
0
|
5
|
September 3, 2025
|
|
[Resource Topic] 2025/1549: Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection
|
|
0
|
15
|
September 3, 2025
|
|
[Resource Topic] 2025/1540: A Fine-Grained and Real-Time Functional Video Encryption and Sharing Scheme
|
|
0
|
4
|
August 30, 2025
|