|
[Resource Topic] 2025/2023: Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE
|
|
0
|
6
|
November 1, 2025
|
|
[Resource Topic] 2025/2022: Formal Verification of Privacy Pass
|
|
0
|
1
|
November 1, 2025
|
|
[Resource Topic] 2025/2021: TreeCast: Multi-Party Key Establishment Protocol for IoT Devices
|
|
0
|
5
|
November 1, 2025
|
|
[Resource Topic] 2025/2020: VerfCNN, Optimal Complexity zkSNARK for Convolutional Neural Networks
|
|
0
|
4
|
November 1, 2025
|
|
[Resource Topic] 2025/2019: Practical Multi-party Private Set Intersection with Reducible Zero-sharing
|
|
0
|
3
|
November 1, 2025
|
|
[Resource Topic] 2025/2018: Batched and Packed (Publicly) Verifiable Secret Sharing: A Unified Framework and Applications
|
|
0
|
3
|
November 1, 2025
|
|
[Resource Topic] 2025/2017: Secure Onion Encryption and the Case of Counter Galois Onion
|
|
0
|
4
|
November 1, 2025
|
|
[Resource Topic] 2025/2015: Proving Authenticated Key Exchange via Memory-Efficient Reductions
|
|
0
|
5
|
November 1, 2025
|
|
[Resource Topic] 2025/2008: Two-Server Private Information Retrieval in Sublinear Time and Quasilinear Space
|
|
0
|
1
|
November 1, 2025
|
|
[Resource Topic] 2025/2007: k-Anonymous Group Signatures: Addressing Strict Content Moderation in End-to-End Secure Messaging Platforms
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/2006: OmniBA: Round-Efficient BA with Quadratic Communication under Mixed Faults
|
|
0
|
6
|
October 30, 2025
|
|
[Resource Topic] 2025/2002: Pseudorandom Correlation Functions for Multiparty Beaver Triples from Sparse LPN
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/2001: On Computational VSS for General Access Structures
|
|
0
|
3
|
October 30, 2025
|
|
[Resource Topic] 2025/1995: Device-Bound Anonymous Credentials With(out) Trusted Hardware
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/1993: A Simplified Round-by-round Soundness Proof of FRI
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/1989: HardCODE: Hardware-based Circuit Obfuscation using Data Encryption
|
|
0
|
3
|
October 30, 2025
|
|
[Resource Topic] 2025/1986: Anonymous Authentication and Key Agreement, Revisited
|
|
0
|
3
|
October 29, 2025
|
|
[Resource Topic] 2025/1985: OUF: Oblivious Universal Function with domain specific optimizations
|
|
0
|
1
|
October 29, 2025
|
|
[Resource Topic] 2025/1981: Vision: A Modular Framework for Anonymous Credential Systems
|
|
0
|
2
|
October 29, 2025
|
|
[Resource Topic] 2025/1978: Cryptography with Weak Privacy
|
|
0
|
2
|
October 25, 2025
|
|
[Resource Topic] 2025/1975: Rethinking Consensus with Time as a Primitive
|
|
0
|
3
|
October 25, 2025
|
|
[Resource Topic] 2025/1974: Taming Iterative Grinding Attacks on Blockchain Beacons
|
|
0
|
2
|
October 25, 2025
|
|
[Resource Topic] 2025/1967: Linear-time and Logarithmically-sound Permutation and Multiset SNARKs
|
|
0
|
6
|
October 22, 2025
|
|
[Resource Topic] 2025/1964: Generic PVSS Framework with $O(1)$ Complexity Using CCA2-Secure Threshold Encryption
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1959: On the Communication Complexity of PSM and CDS for Symmetric Functions
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1950: Fully Adaptive FROST in the Algebraic Group Model From Falsifiable Assumptions
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1946: Robust and Scalable Lattice-Based Distributed Key Generation for Asynchronous Networks
|
|
0
|
4
|
October 20, 2025
|
|
[Resource Topic] 2025/1941: Adaptively-Secure Three-Round Threshold Signatures from DL
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1937: Noisy Function Secret Sharing and its applications to Differentially Private computations
|
|
0
|
4
|
October 20, 2025
|
|
[Resource Topic] 2025/1924: Golden: Lightweight Non-Interactive Distributed Key Generation
|
|
0
|
4
|
October 20, 2025
|