[Resource Topic] 2024/556: Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage
|
|
0
|
91
|
April 10, 2024
|
[Resource Topic] 2024/552: Insights from building a blockchain-based metaverse
|
|
0
|
83
|
April 10, 2024
|
[Resource Topic] 2024/536: Highly-Effective Backdoors for Hash Functions and Beyond
|
|
0
|
129
|
April 6, 2024
|
[Resource Topic] 2024/532: Analysing Cryptography in the Wild -- A Retrospective
|
|
0
|
121
|
April 6, 2024
|
[Resource Topic] 2024/516: Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages
|
|
0
|
96
|
April 6, 2024
|
[Resource Topic] 2024/515: Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE
|
|
0
|
87
|
April 6, 2024
|
[Resource Topic] 2024/506: A Decentralized Federated Learning using Reputation
|
|
0
|
113
|
April 1, 2024
|
[Resource Topic] 2024/502: Best of Two Worlds: Efficient, Usable and Auditable Biometric ABC on the Blockchain
|
|
0
|
98
|
April 1, 2024
|
[Resource Topic] 2024/494: HW-token-based Common Random String Setup
|
|
0
|
93
|
April 1, 2024
|
[Resource Topic] 2024/492: Statistical testing of random number generators and their improvement using randomness extraction
|
|
0
|
111
|
March 27, 2024
|
[Resource Topic] 2024/477: Large Language Models for Blockchain Security: A Systematic Literature Review
|
|
0
|
107
|
March 22, 2024
|
[Resource Topic] 2024/476: OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning
|
|
0
|
100
|
March 22, 2024
|
[Resource Topic] 2024/475: CheckOut: User-Controlled Anonymization for Customer Loyalty Programs
|
|
0
|
109
|
March 22, 2024
|
[Resource Topic] 2024/461: Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy
|
|
0
|
97
|
March 22, 2024
|
[Resource Topic] 2024/460: Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption
|
|
0
|
89
|
March 22, 2024
|
[Resource Topic] 2024/455: Anonymous Complaint Aggregation for Secure Messaging
|
|
0
|
137
|
March 18, 2024
|
[Resource Topic] 2024/447: ORIGO: Proving Provenance of Sensitive Data with Constant Communication
|
|
0
|
103
|
March 15, 2024
|
[Resource Topic] 2024/423: Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores
|
|
0
|
134
|
March 15, 2024
|
[Resource Topic] 2024/412: Quasi-Optimal Permutation Ranking and Applications to PERK
|
|
0
|
109
|
March 8, 2024
|
[Resource Topic] 2024/409: Nebula: A Privacy-First Platform for Data Backhaul
|
|
0
|
122
|
March 8, 2024
|
[Resource Topic] 2024/408: Modular Indexer: Fully User-Verified Execution Layer for Meta-Protocols on Bitcoin
|
|
0
|
108
|
March 8, 2024
|
[Resource Topic] 2024/403: DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication
|
|
0
|
112
|
March 8, 2024
|
[Resource Topic] 2024/378: Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips
|
|
0
|
80
|
March 1, 2024
|
[Resource Topic] 2024/301: Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device
|
|
0
|
131
|
February 23, 2024
|
[Resource Topic] 2024/292: IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON
|
|
0
|
191
|
February 23, 2024
|
[Resource Topic] 2024/274: Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption
|
|
0
|
107
|
February 19, 2024
|
[Resource Topic] 2024/271: Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem
|
|
0
|
87
|
February 19, 2024
|
[Resource Topic] 2024/267: zkPi: Proving Lean Theorems in Zero-Knowledge
|
|
0
|
118
|
February 19, 2024
|
[Resource Topic] 2024/211: INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems
|
|
0
|
133
|
February 16, 2024
|
[Resource Topic] 2024/189: ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution
|
|
0
|
104
|
February 9, 2024
|