[Resource Topic] 2023/1774: Decentralized Private Steam Aggregation from Lattices
|
|
0
|
15
|
November 17, 2023
|
[Resource Topic] 2023/1773: Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing
|
|
0
|
16
|
November 17, 2023
|
[Resource Topic] 2023/1768: Homomorphic Polynomial Public Key Cryptography for Quantum-secure Digital Signature
|
|
0
|
15
|
November 17, 2023
|
[Resource Topic] 2023/1762: ZKSMT: A VM for Proving SMT Theorems in Zero Knowledge
|
|
0
|
15
|
November 17, 2023
|
[Resource Topic] 2023/1761: Guardianship in Group Key Exchange for Limited Environments
|
|
0
|
14
|
November 17, 2023
|
[Resource Topic] 2023/1760: Biscuit: New MPCitH Signature Scheme from Structured Multivariate Polynomials
|
|
0
|
15
|
November 17, 2023
|
[Resource Topic] 2023/1759: Non-Interactive Zero-Knowledge Functional Proofs
|
|
0
|
21
|
November 14, 2023
|
[Resource Topic] 2023/1755: HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup
|
|
0
|
21
|
November 14, 2023
|
[Resource Topic] 2023/1753: Formal verification of the post-quantum security properties of IKEv2 PPK (RFC 8784) using the Tamarin Prover
|
|
0
|
20
|
November 14, 2023
|
[Resource Topic] 2023/1749: Dora: Processor Expressiveness is (Nearly) Free in Zero-Knowledge for RAM Programs
|
|
0
|
18
|
November 13, 2023
|
[Resource Topic] 2023/1746: A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost
|
|
0
|
15
|
November 13, 2023
|
[Resource Topic] 2023/1744: Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version)
|
|
0
|
19
|
November 13, 2023
|
[Resource Topic] 2023/1742: Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions
|
|
0
|
14
|
November 13, 2023
|
[Resource Topic] 2023/1740: Evaluation of Arithmetic Sum-of-Products Expressions in Linear Secret Sharing Schemes with a Non-Interactive Computation Phase
|
|
0
|
21
|
November 13, 2023
|
[Resource Topic] 2023/1729: CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks
|
|
0
|
14
|
November 13, 2023
|
[Resource Topic] 2023/1723: Deterministic Byzantine Agreement with Adaptive $O(n\cdot f)$ Communication
|
|
0
|
15
|
November 13, 2023
|
[Resource Topic] 2023/1712: Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
|
|
0
|
28
|
November 6, 2023
|
[Resource Topic] 2023/1710: Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies
|
|
0
|
34
|
November 6, 2023
|
[Resource Topic] 2023/1705: BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes
|
|
0
|
52
|
November 6, 2023
|
[Resource Topic] 2023/1703: Memory Checking for Parallel RAMs
|
|
0
|
35
|
November 3, 2023
|
[Resource Topic] 2023/1700: Scalable Mixed-Mode MPC
|
|
0
|
50
|
November 3, 2023
|
[Resource Topic] 2023/1699: Oblivious Homomorphic Encryption
|
|
0
|
53
|
November 3, 2023
|
[Resource Topic] 2023/1695: Implementing Arbitrary Maps over Small Finite Domains using Ring Addition and Scalar Multiplication
|
|
0
|
37
|
November 3, 2023
|
[Resource Topic] 2023/1690: Efficient VOLE based Multi-Party PSI with Lower Communication Cost
|
|
0
|
48
|
November 3, 2023
|
[Resource Topic] 2023/1684: Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication
|
|
0
|
38
|
November 3, 2023
|
[Resource Topic] 2023/1678: BumbleBee: Secure Two-party Inference Framework for Large Transformers
|
|
0
|
29
|
November 2, 2023
|
[Resource Topic] 2023/1677: Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions
|
|
0
|
28
|
November 2, 2023
|
[Resource Topic] 2023/1676: FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM
|
|
0
|
35
|
November 2, 2023
|
[Resource Topic] 2023/1672: Fine-grained Policy Constraints for Distributed Point Function
|
|
0
|
26
|
November 2, 2023
|
[Resource Topic] 2023/1670: Unbalanced Private Set Intersection from Homomorphic Encryption and Nested Cuckoo Hashing
|
|
0
|
26
|
November 2, 2023
|