[Resource Topic] 2023/1887: GRandLine: First Adaptively Secure DKG and Randomness Beacon with (Almost) Quadratic Communication Complexity
|
|
0
|
12
|
December 8, 2023
|
[Resource Topic] 2023/1886: Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
|
|
0
|
10
|
December 8, 2023
|
[Resource Topic] 2023/1879: A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem
|
|
0
|
8
|
December 7, 2023
|
[Resource Topic] 2023/1875: The Blockwise Rank Syndrome Learning problem and its applications to cryptography
|
|
0
|
11
|
December 6, 2023
|
[Resource Topic] 2023/1873: SoK: Post-Quantum TLS Handshake
|
|
0
|
12
|
December 6, 2023
|
[Resource Topic] 2023/1868: COMMON: Order Book with Privacy
|
|
0
|
8
|
December 6, 2023
|
[Resource Topic] 2023/1863: Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification
|
|
0
|
8
|
December 6, 2023
|
[Resource Topic] 2023/1858: A Novel Power-Sum PRG with Applications to Lattice-Based zkSNARKs
|
|
0
|
8
|
December 6, 2023
|
[Resource Topic] 2023/1851: Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK
|
|
0
|
10
|
December 4, 2023
|
[Resource Topic] 2023/1845: Efficient Issuer-Hiding Authentication, Application to Anonymous Credential
|
|
0
|
15
|
December 1, 2023
|
[Resource Topic] 2023/1840: Unconditionally secure quantum commitments with preprocessing
|
|
0
|
13
|
December 1, 2023
|
[Resource Topic] 2023/1836: An Incremental PoSW for General Weight Distributions
|
|
0
|
14
|
December 1, 2023
|
[Resource Topic] 2023/1830: Vector Commitments with Efficient Updates
|
|
0
|
13
|
December 1, 2023
|
[Resource Topic] 2023/1829: End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness
|
|
0
|
13
|
December 1, 2023
|
[Resource Topic] 2023/1826: Load-Balanced Server-Aided MPC in Heterogeneous Computing
|
|
0
|
15
|
November 28, 2023
|
[Resource Topic] 2023/1820: Chipmunk: Better Synchronized Multi-Signatures from Lattices
|
|
0
|
12
|
November 27, 2023
|
[Resource Topic] 2023/1813: Early Stopping for Any Number of Corruptions
|
|
0
|
19
|
November 24, 2023
|
[Resource Topic] 2023/1807: Entrada to Secure Graph Convolutional Networks
|
|
0
|
17
|
November 24, 2023
|
[Resource Topic] 2023/1806: Fast and Designated-verifier Friendly zkSNARKs in the BPK Model
|
|
0
|
15
|
November 24, 2023
|
[Resource Topic] 2023/1805: On the Security of Rate-limited Privacy Pass
|
|
0
|
19
|
November 24, 2023
|
[Resource Topic] 2023/1804: Fully Malicious Authenticated PIR
|
|
0
|
17
|
November 24, 2023
|
[Resource Topic] 2023/1801: ForgedAttributes: An Existential Forgery Vulnerability of CMS and PKCS#7 Signatures
|
|
0
|
15
|
November 24, 2023
|
[Resource Topic] 2023/1798: Somewhat Homomorphic Encryption based on Random Codes
|
|
0
|
16
|
November 24, 2023
|
[Resource Topic] 2023/1794: Secret-Shared Shuffle with Malicious Security
|
|
0
|
17
|
November 24, 2023
|
[Resource Topic] 2023/1792: Sloth: Key Stretching and Deniable Encryption using Secure Elements on Smartphones
|
|
0
|
14
|
November 24, 2023
|
[Resource Topic] 2023/1791: Decentralized Compromise-Tolerant Public Key Management Ecosystem with Threshold Validation
|
|
0
|
13
|
November 24, 2023
|
[Resource Topic] 2023/1789: Fast and Secure Oblivious Stable Matching over Arithmetic Circuits
|
|
0
|
15
|
November 24, 2023
|
[Resource Topic] 2023/1787: Updatable Privacy-Preserving Blueprints
|
|
0
|
25
|
November 20, 2023
|
[Resource Topic] 2023/1785: There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation
|
|
0
|
26
|
November 20, 2023
|
[Resource Topic] 2023/1784: Succinct Arguments over Towers of Binary Fields
|
|
0
|
23
|
November 20, 2023
|