[Resource Topic] 2025/728: SNAIL: Verifiable Computation within 30% of Native Speed
|
|
0
|
5
|
April 24, 2025
|
[Resource Topic] 2025/727: Securing Nested Attestation of Confidential Serverless Computing without Intra-Enclave Isolation
|
|
0
|
0
|
April 23, 2025
|
[Resource Topic] 2025/722: One-Step Schnorr Threshold Identification
|
|
0
|
5
|
April 23, 2025
|
[Resource Topic] 2025/719: Packed Sumcheck over Fields of Small Characteristic with Application to Verifiable FHE
|
|
0
|
1
|
April 23, 2025
|
[Resource Topic] 2025/718: The Hardness of Learning Quantum Circuits and its Cryptographic Applications
|
|
0
|
0
|
April 23, 2025
|
[Resource Topic] 2025/717: GKR for Boolean Circuits with Sub-linear RAM Operations
|
|
0
|
1
|
April 21, 2025
|
[Resource Topic] 2025/716: Shark: Actively Secure Inference using Function Secret Sharing
|
|
0
|
4
|
April 21, 2025
|
[Resource Topic] 2025/712: Threshold FHE with Efficient Asynchronous Decryption
|
|
0
|
1
|
April 21, 2025
|
[Resource Topic] 2025/710: Arbigraph: Verifiable Turing-Complete Execution Delegation
|
|
0
|
0
|
April 19, 2025
|
[Resource Topic] 2025/709: Thunderbolt: A Formally Verified Protocol for Off-Chain Bitcoin Transfers
|
|
0
|
3
|
April 19, 2025
|
[Resource Topic] 2025/706: The Role of Quantum Computing in Enhancing Encryption Security: A Review
|
|
0
|
0
|
April 19, 2025
|
[Resource Topic] 2025/703: Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/702: Two Party Secret Shared Joins
|
|
0
|
2
|
April 18, 2025
|
[Resource Topic] 2025/701: Hermes: Efficient and Secure Multi-Writer Encrypted Database
|
|
0
|
6
|
April 18, 2025
|
[Resource Topic] 2025/699: Threshold (Fully) Homomorphic Encryption
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/694: A Formal Security Analysis of Hyperledger AnonCreds
|
|
0
|
0
|
April 17, 2025
|
[Resource Topic] 2025/692: DahLIAS: Discrete Logarithm-Based Interactive Aggregate Signatures
|
|
0
|
3
|
April 16, 2025
|
[Resource Topic] 2025/690: Zero-Knowledge Protocol for Knowledge of Known Discrete Logarithms: Applications to Ring Confidential Transactions and Anonymous Zether
|
|
0
|
1
|
April 16, 2025
|
[Resource Topic] 2025/685: Proofs of Useful Work from Arbitrary Matrix Multiplication
|
|
0
|
12
|
April 16, 2025
|
[Resource Topic] 2025/684: Post-quantum Cryptographic Analysis of SSH
|
|
0
|
1
|
April 16, 2025
|
[Resource Topic] 2025/683: On the Definition of Malicious Private Information Retrieval
|
|
0
|
2
|
April 16, 2025
|
[Resource Topic] 2025/682: SUMAC: an Efficient Administrated-CGKA Using Multicast Key Agreement
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/680: Pirouette: Query Efficient Single-Server PIR
|
|
0
|
3
|
April 16, 2025
|
[Resource Topic] 2025/676: Onion Encryption Revisited: Relations Among Security Notions
|
|
0
|
1
|
April 16, 2025
|
[Resource Topic] 2025/675: Trilithium: Efficient and Universally Composable Distributed ML-DSA Signing
|
|
0
|
4
|
April 15, 2025
|
[Resource Topic] 2025/671: A Dilithium-like Multisignature in Fully Split Ring and Quantum Random Oracle Model
|
|
0
|
0
|
April 15, 2025
|
[Resource Topic] 2025/667: Vector Commitment Design, Analysis, and Applications: A Survey
|
|
0
|
0
|
April 13, 2025
|
[Resource Topic] 2025/665: MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero
|
|
0
|
1
|
April 13, 2025
|
[Resource Topic] 2025/664: Publicly Verifiable Generalized Secret Sharing Schemes and Their Applications
|
|
0
|
0
|
April 13, 2025
|
[Resource Topic] 2025/662: Attribute-Based Publicly Verifiable Secret Sharing
|
|
0
|
4
|
April 13, 2025
|