[Resource Topic] 2025/1392: FLEX — Capital-Efficient Optimistic Bridges with On-Demand Security Bonds for Bitcoin
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1390: Optimizing Backend Verification in zk-Rollup Architectures
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1389: Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1388: Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1386: How to Tolerate Typos in Strong Asymmetric PAKE
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1380: Quantum Composable and Contextual Security Infrastructure (Q2CSI) : A Modular Architecture for Legally Explainable Cryptographic Signatures
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1377: More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1374: An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and how to Avoid it
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1373: A Zero-Knowledge Proof for the Syndrome Decoding Problem in the Lee Metric
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1371: Securing Credential Sequence Verification
|
|
0
|
1
|
July 30, 2025
|
[Resource Topic] 2025/1368: Post-Quantum Readiness in EdDSA Chains
|
|
0
|
2
|
July 28, 2025
|
[Resource Topic] 2025/1360: Towards more secure constructions of private set operation schemes
|
|
0
|
1
|
July 25, 2025
|
[Resource Topic] 2025/1354: Shred-to-Shine Metamorphosis in Polynomial Commitment Evolution
|
|
0
|
0
|
July 25, 2025
|
[Resource Topic] 2025/1352: InsPIRe: Communication-Efficient PIR with Silent Preprocessing
|
|
0
|
2
|
July 25, 2025
|
[Resource Topic] 2025/1349: $\mathsf{HyperFond}$: A Transparent and Post-Quantum Distributed SNARK with Polylogarithmic Communication
|
|
0
|
0
|
July 25, 2025
|
[Resource Topic] 2025/1347: Public Traceability in Threshold Decryption
|
|
0
|
3
|
July 25, 2025
|
[Resource Topic] 2025/1345: SLVer Bullet: Straight-Line Verification for Bulletproofs
|
|
0
|
0
|
July 25, 2025
|
[Resource Topic] 2025/1343: A Hybrid Asymmetric Password-Authenticated Key Exchange in the Random Oracle Model
|
|
0
|
0
|
July 23, 2025
|
[Resource Topic] 2025/1340: Zelda: Efficient Multi-server Preprocessing PIR with Unconditional Security
|
|
0
|
1
|
July 23, 2025
|
[Resource Topic] 2025/1337: $\textsf{Electrum}$: UC Fail-Stop Server-Supported Signatures
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1328: Private Set Intersection and other Set Operations in the Third Party Setting
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1327: Randomized Agreement, Verifiable Secret Sharing and Multi-Party Computation in Granular Synchrony
|
|
0
|
1
|
July 22, 2025
|
[Resource Topic] 2025/1325: Revisiting the IPA-sumcheck connection
|
|
0
|
3
|
July 22, 2025
|
[Resource Topic] 2025/1323: Pairing-Based Batch Arguments for NP with a Linear-Size CRS
|
|
0
|
1
|
July 22, 2025
|
[Resource Topic] 2025/1321: Threshold Receipt-Free Voting with Server-Side Vote Validation
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1318: Lifeline: Optimal Byzantine Agreement Under Minimal Synchrony
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1313: Two-Server Sublinear PIR with Symmetric Privacy and Statistical Security
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1297: On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1294: Interstellar: GKR Protocol based Low Prover Cost Folding Scheme for Circuit Satisfiability
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1289: AlphaFL: Secure Aggregation with Malicious$^2$ Security for Federated Learning against Dishonest Majority
|
|
0
|
1
|
July 16, 2025
|