[Resource Topic] 2025/078: Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol
|
|
0
|
1
|
January 18, 2025
|
[Resource Topic] 2025/072: PSMT: Private Segmented Membership Test for Distributed Record Linkage
|
|
0
|
0
|
January 17, 2025
|
[Resource Topic] 2025/069: On Composing Generic Voting Schemes for Improved Privacy
|
|
0
|
1
|
January 17, 2025
|
[Resource Topic] 2025/067: Constant latency and finality for dynamically available DAG
|
|
0
|
1
|
January 17, 2025
|
[Resource Topic] 2025/065: Morgana: a laconic circuit builder
|
|
0
|
0
|
January 17, 2025
|
[Resource Topic] 2025/061: CAPSS: A Framework for SNARK-Friendly Post-Quantum Signatures
|
|
0
|
0
|
January 16, 2025
|
[Resource Topic] 2025/060: SoK: Multiparty Computation in Preprocessing Model
|
|
0
|
2
|
January 16, 2025
|
[Resource Topic] 2025/059: Fair Signature Exchange
|
|
0
|
1
|
January 16, 2025
|
[Resource Topic] 2025/057: Trustless Bridges via Random Sampling Light Clients
|
|
0
|
2
|
January 14, 2025
|
[Resource Topic] 2025/054: Doubly Efficient Fuzzy Private Set Intersection for High-dimensional Data with Cosine Similarity
|
|
0
|
1
|
January 14, 2025
|
[Resource Topic] 2025/052: Separating Broadcast from Cheater Identification
|
|
0
|
0
|
January 14, 2025
|
[Resource Topic] 2025/046: The Meta-Complexity of Secret Sharing
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/041: Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/040: Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/039: VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness
|
|
0
|
3
|
January 13, 2025
|
[Resource Topic] 2025/038: Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains
|
|
0
|
2
|
January 13, 2025
|
[Resource Topic] 2025/036: Scalable Post-Quantum Oblivious Transfers for Resource-Constrained Receivers
|
|
0
|
1
|
January 9, 2025
|
[Resource Topic] 2025/035: Long Paper: All-You-Can-Compute: Packed Secret Sharing for Combined Resilience
|
|
0
|
2
|
January 9, 2025
|
[Resource Topic] 2025/030: Delegated Multi-party Private Set Intersection from Secret Sharing
|
|
0
|
1
|
January 9, 2025
|
[Resource Topic] 2025/029: Highly Efficient Server-Aided Multiparty Subfield VOLE Distribution Protocol
|
|
0
|
0
|
January 9, 2025
|
[Resource Topic] 2025/028: Extending Groth16 for Disjunctive Statements
|
|
0
|
0
|
January 8, 2025
|
[Resource Topic] 2025/026: How to use your brain for cryptography without trustworthy machines
|
|
0
|
2
|
January 8, 2025
|
[Resource Topic] 2025/025: Chosen-Ciphertext Security for Inner Product FE: Mutli-Client and Multi-Input, Generically
|
|
0
|
0
|
January 8, 2025
|
[Resource Topic] 2025/024: Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited
|
|
0
|
1
|
January 7, 2025
|
[Resource Topic] 2025/023: Cryptography is Rocket Science: Analysis of BPSec
|
|
0
|
2
|
January 7, 2025
|
[Resource Topic] 2025/021: Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
|
|
0
|
1
|
January 7, 2025
|
[Resource Topic] 2025/016: Dynamically Available Common Subset
|
|
0
|
0
|
January 6, 2025
|
[Resource Topic] 2025/013: Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms
|
|
0
|
1
|
January 4, 2025
|
[Resource Topic] 2025/010: A Combinatorial Approach to IoT Data Security
|
|
0
|
0
|
January 3, 2025
|
[Resource Topic] 2025/006: Nearly Quadratic Asynchronous Distributed Key Generation
|
|
0
|
1
|
January 1, 2025
|