[Resource Topic] 2024/1538: Security Perceptions of Users in Stablecoins: Advantages and Risks within the Cryptocurrency Ecosystem
|
|
0
|
39
|
October 4, 2024
|
[Resource Topic] 2024/1501: Exploring User Perceptions of Security Auditing in the Web3 Ecosystem
|
|
0
|
45
|
September 30, 2024
|
[Resource Topic] 2024/1492: Multi-Designated Detector Watermarking for Language Models
|
|
0
|
40
|
September 30, 2024
|
[Resource Topic] 2024/1485: LARMix$\mathbf{++}$: Latency-Aware Routing in Mix Networks with Free Routes Topology
|
|
0
|
49
|
September 24, 2024
|
[Resource Topic] 2024/1472: Isogeny-Based Secure Voting Systems for Large-Scale Elections
|
|
0
|
55
|
September 21, 2024
|
[Resource Topic] 2024/1471: Communication Efficient Secure and Private Multi-Party Deep Learning
|
|
0
|
53
|
September 21, 2024
|
[Resource Topic] 2024/1464: SoK: Descriptive Statistics Under Local Differential Privacy
|
|
0
|
47
|
September 21, 2024
|
[Resource Topic] 2024/1451: Traffic-aware Merkle Trees for Shortening Blockchain Transaction Proofs
|
|
0
|
48
|
September 18, 2024
|
[Resource Topic] 2024/1440: Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
|
|
0
|
49
|
September 18, 2024
|
[Resource Topic] 2024/1436: Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos
|
|
0
|
49
|
September 14, 2024
|
[Resource Topic] 2024/1433: $Shortcut$: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases
|
|
0
|
57
|
September 14, 2024
|
[Resource Topic] 2024/1429: Powerformer: Efficient Privacy-Preserving Transformer with Batch Rectifier-Power Max Function and Optimized Homomorphic Attention
|
|
0
|
49
|
September 14, 2024
|
[Resource Topic] 2024/1424: A Waterlog for Detecting and Tracing Synthetic Text from Large Language Models
|
|
0
|
48
|
September 14, 2024
|
[Resource Topic] 2024/1415: Privacy Comparison for Bitcoin Light Client Implementations
|
|
0
|
56
|
September 11, 2024
|
[Resource Topic] 2024/1409: Oraqle: A Depth-Aware Secure Computation Compiler
|
|
0
|
50
|
September 11, 2024
|
[Resource Topic] 2024/1407: Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing
|
|
0
|
53
|
September 11, 2024
|
[Resource Topic] 2024/1398: Coercion-resistant i-voting with short PIN and OAuth 2.0
|
|
0
|
47
|
September 11, 2024
|
[Resource Topic] 2024/1393: Survivable Payment Channel Networks
|
|
0
|
32
|
September 11, 2024
|
[Resource Topic] 2024/1386: Problems and New Approaches for Crypto-Agility in Operational Technology
|
|
0
|
61
|
September 4, 2024
|
[Resource Topic] 2024/1366: Adaptive Successive Over-Relaxation Method for a Faster Iterative Approximation of Homomorphic Operations
|
|
0
|
60
|
August 30, 2024
|
[Resource Topic] 2024/1357: Understanding the Blockchain Interoperability Graph based on Cryptocurrency Price Correlation
|
|
0
|
53
|
August 30, 2024
|
[Resource Topic] 2024/1348: Zero-Knowledge Validation for an Offline Electronic Document Wallet using Bulletproofs
|
|
0
|
47
|
August 30, 2024
|
[Resource Topic] 2024/1345: SoK: An Engineer’s Guide to Post-Quantum Cryptography for Embedded Devices
|
|
0
|
72
|
August 30, 2024
|
[Resource Topic] 2024/1315: PulpFHE: Complex Instruction Set Extensions for FHE Processors
|
|
0
|
64
|
August 23, 2024
|
[Resource Topic] 2024/1309: R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 with built-in Attack-on-Countermeasure Detection
|
|
0
|
69
|
August 23, 2024
|
[Resource Topic] 2024/1277: Robust but Relaxed Probing Model
|
|
0
|
52
|
August 16, 2024
|
[Resource Topic] 2024/1260: zk-Promises: Making Zero-Knowledge Objects Accept the Call for Banning and Reputation
|
|
0
|
68
|
August 9, 2024
|
[Resource Topic] 2024/1255: Compass: Encrypted Semantic Search with High Accuracy
|
|
0
|
79
|
August 9, 2024
|
[Resource Topic] 2024/1250: AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation
|
|
0
|
67
|
August 7, 2024
|
[Resource Topic] 2024/1241: PROF: Protected Order Flow in a Profit-Seeking World
|
|
0
|
66
|
August 7, 2024
|