|
[Resource Topic] 2025/2048: Time-Lock Encrypted Storage for Blockchains
|
|
0
|
2
|
November 6, 2025
|
|
[Resource Topic] 2025/2042: Threshold Anonymous Credentials with Silent Setup
|
|
0
|
6
|
November 5, 2025
|
|
[Resource Topic] 2025/2041: Sum-check Is All You Need: An Opinionated Survey on Fast Provers in SNARK Design
|
|
0
|
6
|
November 5, 2025
|
|
[Resource Topic] 2025/2039: Non-Delegatable Commitments
|
|
0
|
6
|
November 5, 2025
|
|
[Resource Topic] 2025/2037: On the Simulation-Extractability of Proof-Carrying Data
|
|
0
|
4
|
November 5, 2025
|
|
[Resource Topic] 2025/2035: Multivariate Commitments and Signatures with Efficient Protocols
|
|
0
|
4
|
November 5, 2025
|
|
[Resource Topic] 2025/2030: Succinct Zero-knowledge Proofs from One-way Functions:The Blackbox Way
|
|
0
|
5
|
November 3, 2025
|
|
[Resource Topic] 2025/2024: A Note Comparing Three Incentive Designs Against Privacy-Targeted Collusion
|
|
0
|
4
|
November 3, 2025
|
|
[Resource Topic] 2025/2023: Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE
|
|
0
|
9
|
November 1, 2025
|
|
[Resource Topic] 2025/2022: Formal Verification of Privacy Pass
|
|
0
|
2
|
November 1, 2025
|
|
[Resource Topic] 2025/2021: TreeCast: Multi-Party Key Establishment Protocol for IoT Devices
|
|
0
|
6
|
November 1, 2025
|
|
[Resource Topic] 2025/2020: VerfCNN, Optimal Complexity zkSNARK for Convolutional Neural Networks
|
|
0
|
6
|
November 1, 2025
|
|
[Resource Topic] 2025/2019: Practical Multi-party Private Set Intersection with Reducible Zero-sharing
|
|
0
|
3
|
November 1, 2025
|
|
[Resource Topic] 2025/2018: Batched and Packed (Publicly) Verifiable Secret Sharing: A Unified Framework and Applications
|
|
0
|
3
|
November 1, 2025
|
|
[Resource Topic] 2025/2017: Secure Onion Encryption and the Case of Counter Galois Onion
|
|
0
|
5
|
November 1, 2025
|
|
[Resource Topic] 2025/2015: Proving Authenticated Key Exchange via Memory-Efficient Reductions
|
|
0
|
7
|
November 1, 2025
|
|
[Resource Topic] 2025/2008: Two-Server Private Information Retrieval in Sublinear Time and Quasilinear Space
|
|
0
|
2
|
November 1, 2025
|
|
[Resource Topic] 2025/2007: k-Anonymous Group Signatures: Addressing Strict Content Moderation in End-to-End Secure Messaging Platforms
|
|
0
|
6
|
October 30, 2025
|
|
[Resource Topic] 2025/2006: OmniBA: Round-Efficient BA with Quadratic Communication under Mixed Faults
|
|
0
|
7
|
October 30, 2025
|
|
[Resource Topic] 2025/2002: Pseudorandom Correlation Functions for Multiparty Beaver Triples from Sparse LPN
|
|
0
|
6
|
October 30, 2025
|
|
[Resource Topic] 2025/2001: On Computational VSS for General Access Structures
|
|
0
|
3
|
October 30, 2025
|
|
[Resource Topic] 2025/1995: Device-Bound Anonymous Credentials With(out) Trusted Hardware
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/1993: A Simplified Round-by-round Soundness Proof of FRI
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/1989: HardCODE: Hardware-based Circuit Obfuscation using Data Encryption
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/1986: Anonymous Authentication and Key Agreement, Revisited
|
|
0
|
4
|
October 29, 2025
|
|
[Resource Topic] 2025/1985: OUF: Oblivious Universal Function with domain specific optimizations
|
|
0
|
1
|
October 29, 2025
|
|
[Resource Topic] 2025/1981: Vision: A Modular Framework for Anonymous Credential Systems
|
|
0
|
3
|
October 29, 2025
|
|
[Resource Topic] 2025/1978: Cryptography with Weak Privacy
|
|
0
|
3
|
October 25, 2025
|
|
[Resource Topic] 2025/1975: Rethinking Consensus with Time as a Primitive
|
|
0
|
4
|
October 25, 2025
|
|
[Resource Topic] 2025/1974: Taming Iterative Grinding Attacks on Blockchain Beacons
|
|
0
|
3
|
October 25, 2025
|