[Resource Topic] 2025/841: Verifiable E-Voting with a Trustless Bulletin Board
|
|
0
|
0
|
May 13, 2025
|
[Resource Topic] 2025/838: KeyJoin: Privacy-Focused CoinJoin Protocol for Bitcoin
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/831: Worst-Case Time Analysis of Key Agreement Protocols in 10BASE-T1S Automotive Networks
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/829: Row Reduction Techniques for n-Party Garbling
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/828: Bandwidth-Efficient Robust Threshold ECDSA in Three Rounds
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/827: Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios
|
|
0
|
1
|
May 9, 2025
|
[Resource Topic] 2025/824: A Specification of an Anonymous Credential System Using BBS+ Signatures with Privacy-Preserving Revocation and Device Binding
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/823: Sampling Arbitrary Discrete Distributions for RV Commitment Schemes Using the Trimmed-Tree Knuth-Yao Algorithm
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/821: Multi-Client Attribute-Based and Predicate Encryption, Revisited
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/816: Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/813: HydraProofs: Optimally Computing All Proofs in a Vector Commitment (with applications to efficient zkSNARKs over data from multiple users)
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/810: Actively Secure MPC in the Dishonest Majority Setting: Achieving Constant Complexity in Online Communication, Computation Per Gate, Rounds, and Private Input Size
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/805: Accelerating Multiparty Noise Generation Using Lookups
|
|
0
|
2
|
May 7, 2025
|
[Resource Topic] 2025/803: Universally Composable On-Chain Quadratic Voting for Liquid Democracy
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/801: POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/790: PULSE: Parallel Private Set Union for Large-Scale Entities
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/787: Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer
|
|
0
|
0
|
May 4, 2025
|
[Resource Topic] 2025/786: Robust and Verifiable MPC with Applications to Linear Machine Learning Inference
|
|
0
|
0
|
May 4, 2025
|
[Resource Topic] 2025/779: Improving the Round Complexity of MiniCast
|
|
0
|
0
|
May 2, 2025
|
[Resource Topic] 2025/776: Clementine: A Collateral-Efficient, Trust-Minimized, and Scalable Bitcoin Bridge
|
|
0
|
1
|
May 2, 2025
|
[Resource Topic] 2025/775: AuthOr: Lower Cost Authenticity-Oriented Garbling of Arbitrary Boolean Circuits
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/772: Publicly Auditable Garbled Circuit
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/770: ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/768: Incompleteness in Number-Theoretic Transforms: New Tradeoffs and Faster Lattice-Based Cryptographic Applications
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/764: Security of a secret sharing protocol on the Qline
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/761: Trojan-Resilient Reverse-Firewall for Cryptographic Applications
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/760: DGSP: An Efficient Scalable Fully Dynamic Group Signature Scheme Using $\rm{SPHINCS}^+$
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/754: On graph based pseudo quadratic multivariate maps of prescribed degree as instruments of key establishment
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/753: Linear-Time Accumulation Schemes
|
|
0
|
1
|
April 28, 2025
|
[Resource Topic] 2025/751: Improved Range Searching And Range Emptiness Under FHE Using Copy-And-Recurse
|
|
0
|
0
|
April 28, 2025
|