[Resource Topic] 2024/395: Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators
|
|
0
|
40
|
March 5, 2024
|
[Resource Topic] 2024/391: On Information-Theoretic Secure Multiparty Computation with Local Repairability
|
|
0
|
33
|
March 4, 2024
|
[Resource Topic] 2024/390: STIR: Reed–Solomon Proximity Testing with Fewer Queries
|
|
0
|
46
|
March 4, 2024
|
[Resource Topic] 2024/387: Parallel Zero-knowledge Virtual Machine
|
|
0
|
48
|
March 4, 2024
|
[Resource Topic] 2024/386: High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings
|
|
0
|
34
|
March 4, 2024
|
[Resource Topic] 2024/383: Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers
|
|
0
|
33
|
March 4, 2024
|
[Resource Topic] 2024/382: Decentralized Access Control Infrastructure for Enterprise Digital Asset Management
|
|
0
|
28
|
March 4, 2024
|
[Resource Topic] 2024/379: SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity
|
|
0
|
29
|
March 1, 2024
|
[Resource Topic] 2024/376: Õptimal Parallel Broadcast
|
|
0
|
36
|
March 1, 2024
|
[Resource Topic] 2024/375: Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
|
|
0
|
31
|
March 1, 2024
|
[Resource Topic] 2024/374: Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
|
|
0
|
32
|
March 1, 2024
|
[Resource Topic] 2024/372: Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
|
|
0
|
33
|
March 1, 2024
|
[Resource Topic] 2024/370: Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus
|
|
0
|
29
|
March 1, 2024
|
[Resource Topic] 2024/369: Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts
|
|
0
|
28
|
March 1, 2024
|
[Resource Topic] 2024/362: Integrating Causality in Messaging Channels
|
|
0
|
54
|
March 1, 2024
|
[Resource Topic] 2024/358: Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication
|
|
0
|
26
|
March 1, 2024
|
[Resource Topic] 2024/357: Security analysis of the iMessage PQ3 protocol
|
|
0
|
27
|
March 1, 2024
|
[Resource Topic] 2024/355: Adaptively Secure Streaming Functional Encryption
|
|
0
|
29
|
March 1, 2024
|
[Resource Topic] 2024/354: WARPfold : Wrongfield ARithmetic for Protostar folding
|
|
0
|
25
|
March 1, 2024
|
[Resource Topic] 2024/346: A data aggregation protocol based on TFHE
|
|
0
|
29
|
February 27, 2024
|
[Resource Topic] 2024/341: VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
|
|
0
|
34
|
February 27, 2024
|
[Resource Topic] 2024/336: RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs
|
|
0
|
25
|
February 27, 2024
|
[Resource Topic] 2024/330: Fuzzy Private Set Intersection with Large Hyperballs
|
|
0
|
82
|
February 27, 2024
|
[Resource Topic] 2024/326: Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications
|
|
0
|
29
|
February 27, 2024
|
[Resource Topic] 2024/325: Proofs for Deep Thought: Accumulation for large memories and deterministic computations
|
|
0
|
27
|
February 26, 2024
|
[Resource Topic] 2024/324: Under What Conditions Is Encrypted Key Exchange Actually Secure?
|
|
0
|
29
|
February 26, 2024
|
[Resource Topic] 2024/320: POPSTAR: Lightweight Threshold Reporting with Reduced Leakage
|
|
0
|
25
|
February 26, 2024
|
[Resource Topic] 2024/319: On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings $Z_{2^s}, s>1$
|
|
0
|
21
|
February 26, 2024
|
[Resource Topic] 2024/318: Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs
|
|
0
|
24
|
February 26, 2024
|
[Resource Topic] 2024/317: Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus
|
|
0
|
25
|
February 26, 2024
|