|
[Resource Topic] 2025/2137: Linear Secret-shared Shuffle with Malicious Security
|
|
0
|
3
|
November 22, 2025
|
|
[Resource Topic] 2025/2136: The Latency Cost Of Censorship Resistance
|
|
0
|
5
|
November 22, 2025
|
|
[Resource Topic] 2025/2135: Robust Elections and More: Fast MPC in the Preprocessing Model
|
|
0
|
5
|
November 22, 2025
|
|
[Resource Topic] 2025/2133: Byzantine Broadcast with Unknown Participants
|
|
0
|
2
|
November 22, 2025
|
|
[Resource Topic] 2025/2132: Bandwidth Efficient Partial Authorized PSI
|
|
0
|
4
|
November 22, 2025
|
|
[Resource Topic] 2025/2127: Censorship-Resistant Sealed-Bid Auctions on Blockchains
|
|
0
|
3
|
November 21, 2025
|
|
[Resource Topic] 2025/2125: Are ideal functionalities really ideal?
|
|
0
|
8
|
November 21, 2025
|
|
[Resource Topic] 2025/2124: SALSAA – Sumcheck-Aided Lattice-based Succinct Arguments and Applications
|
|
0
|
6
|
November 21, 2025
|
|
[Resource Topic] 2025/2118: Revisiting Rational Broadcast Protocols
|
|
0
|
7
|
November 21, 2025
|
|
[Resource Topic] 2025/2116: Oblivious Batch Updates for Bloom-Filter-based Outsourced Cryptographic Protocols
|
|
0
|
8
|
November 19, 2025
|
|
[Resource Topic] 2025/2115: Weighted Batched Threshold Encryption with Applications to Mempool Privacy
|
|
0
|
3
|
November 19, 2025
|
|
[Resource Topic] 2025/2113: Single-Server Private Outsourcing of zk-SNARKs
|
|
0
|
3
|
November 19, 2025
|
|
[Resource Topic] 2025/2111: SoK: Secure Computation over Secret Shares
|
|
0
|
2
|
November 19, 2025
|
|
[Resource Topic] 2025/2109: Secure Lookup Tables: Faster, Leaner, and More General
|
|
0
|
3
|
November 18, 2025
|
|
[Resource Topic] 2025/2104: Quantum Voting Protocol from Classical Assumption
|
|
0
|
7
|
November 17, 2025
|
|
[Resource Topic] 2025/2099: A Lattice-based Designated Verifier zkSNARK from Standard Assumptions
|
|
0
|
1
|
November 17, 2025
|
|
[Resource Topic] 2025/2097: Hash-Based Blind Signatures: First Steps
|
|
0
|
2
|
November 17, 2025
|
|
[Resource Topic] 2025/2095: FPS: Flexible Payment System
|
|
0
|
1
|
November 17, 2025
|
|
[Resource Topic] 2025/2091: Efficient and Proof-of-Useful-Work Friendly Local-Search for Distributed Consensus
|
|
0
|
4
|
November 14, 2025
|
|
[Resource Topic] 2025/2089: Traceable Bottom-Up Secret Sharing and Law & Order on Community Social Key Recovery (Full Version)
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2087: Leakage-Free Enhanced Private Set Union for Balanced and Unbalanced Scenarios
|
|
0
|
6
|
November 13, 2025
|
|
[Resource Topic] 2025/2086: On Composing AGM-Secure Functionalities with Cryptographic Proofs: Applications to Unbounded-Depth IVC and More
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2081: Partial Fraction Techniques for Cryptography
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2080: Issuer Hiding for BBS-Based Anonymous Credentials
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2078: Broadcast for Dynamic Committees without Trusted Setup
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2077: Malicious Homomorphic Secret Sharing with Applications to DV-NIZK and More
|
|
0
|
7
|
November 13, 2025
|
|
[Resource Topic] 2025/2074: VIA: Communication-Efficient Single-Server Private Information Retrieval
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2072: Multi-server Fuzzy Message Detection
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2067: Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Channel Binding
|
|
0
|
1
|
November 13, 2025
|
|
[Resource Topic] 2025/2066: A Comprehensive Analysis of the AKMA+ Protocol
|
|
0
|
3
|
November 13, 2025
|