[Resource Topic] 2024/1409: Oraqle: A Depth-Aware Secure Computation Compiler
|
|
0
|
53
|
September 11, 2024
|
[Resource Topic] 2024/1407: Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing
|
|
0
|
55
|
September 11, 2024
|
[Resource Topic] 2024/1398: Coercion-resistant i-voting with short PIN and OAuth 2.0
|
|
0
|
54
|
September 11, 2024
|
[Resource Topic] 2024/1393: Survivable Payment Channel Networks
|
|
0
|
36
|
September 11, 2024
|
[Resource Topic] 2024/1386: Problems and New Approaches for Crypto-Agility in Operational Technology
|
|
0
|
64
|
September 4, 2024
|
[Resource Topic] 2024/1366: Adaptive Successive Over-Relaxation Method for a Faster Iterative Approximation of Homomorphic Operations
|
|
0
|
63
|
August 30, 2024
|
[Resource Topic] 2024/1357: Understanding the Blockchain Interoperability Graph based on Cryptocurrency Price Correlation
|
|
0
|
56
|
August 30, 2024
|
[Resource Topic] 2024/1348: Zero-Knowledge Validation for an Offline Electronic Document Wallet using Bulletproofs
|
|
0
|
50
|
August 30, 2024
|
[Resource Topic] 2024/1345: SoK: An Engineer’s Guide to Post-Quantum Cryptography for Embedded Devices
|
|
0
|
75
|
August 30, 2024
|
[Resource Topic] 2024/1315: PulpFHE: Complex Instruction Set Extensions for FHE Processors
|
|
0
|
67
|
August 23, 2024
|
[Resource Topic] 2024/1309: R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 with built-in Attack-on-Countermeasure Detection
|
|
0
|
71
|
August 23, 2024
|
[Resource Topic] 2024/1277: Robust but Relaxed Probing Model
|
|
0
|
55
|
August 16, 2024
|
[Resource Topic] 2024/1260: zk-Promises: Making Zero-Knowledge Objects Accept the Call for Banning and Reputation
|
|
0
|
70
|
August 9, 2024
|
[Resource Topic] 2024/1255: Compass: Encrypted Semantic Search with High Accuracy
|
|
0
|
93
|
August 9, 2024
|
[Resource Topic] 2024/1250: AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation
|
|
0
|
72
|
August 7, 2024
|
[Resource Topic] 2024/1241: PROF: Protected Order Flow in a Profit-Seeking World
|
|
0
|
69
|
August 7, 2024
|
[Resource Topic] 2024/1228: Automated Software Vulnerability Static Code Analysis Using Generative Pre-Trained Transformer Models
|
|
0
|
85
|
August 2, 2024
|
[Resource Topic] 2024/1203: Preservation of Speculative Constant-time by Compilation
|
|
0
|
76
|
July 29, 2024
|
[Resource Topic] 2024/1201: Designing a General-Purpose 8-bit (T)FHE Processor Abstraction
|
|
0
|
61
|
July 29, 2024
|
[Resource Topic] 2024/1199: On degrees of carry and Scholz's conjecture
|
|
0
|
58
|
July 29, 2024
|
[Resource Topic] 2024/1181: AQQUA: Augmenting Quisquis with Auditability
|
|
0
|
62
|
July 25, 2024
|
[Resource Topic] 2024/1178: Towards Quantum-Safe Blockchain: Exploration of PQC and Public-key Recovery on Embedded Systems
|
|
0
|
73
|
July 22, 2024
|
[Resource Topic] 2024/1175: AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities
|
|
0
|
68
|
July 22, 2024
|
[Resource Topic] 2024/1167: Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited
|
|
0
|
51
|
July 22, 2024
|
[Resource Topic] 2024/1155: Cross Ledger Transaction Consistency for Financial Auditing
|
|
0
|
76
|
July 19, 2024
|
[Resource Topic] 2024/1151: Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models
|
|
0
|
74
|
July 19, 2024
|
[Resource Topic] 2024/1115: Public vs Private Blockchains lineage storage
|
|
0
|
69
|
July 15, 2024
|
[Resource Topic] 2024/1109: QuickPool: Privacy-Preserving Ride-Sharing Service
|
|
0
|
62
|
July 15, 2024
|
[Resource Topic] 2024/1108: Faster Asynchronous Blockchain Consensus and MVBA
|
|
0
|
60
|
July 15, 2024
|
[Resource Topic] 2024/978: Distributed PIR: Scaling Private Messaging via the Users' Machines
|
|
0
|
149
|
June 18, 2024
|