[Resource Topic] 2024/386: High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings
|
|
0
|
37
|
March 4, 2024
|
[Resource Topic] 2024/383: Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers
|
|
0
|
34
|
March 4, 2024
|
[Resource Topic] 2024/382: Decentralized Access Control Infrastructure for Enterprise Digital Asset Management
|
|
0
|
32
|
March 4, 2024
|
[Resource Topic] 2024/379: SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity
|
|
0
|
32
|
March 1, 2024
|
[Resource Topic] 2024/376: Õptimal Parallel Broadcast
|
|
0
|
41
|
March 1, 2024
|
[Resource Topic] 2024/375: Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
|
|
0
|
33
|
March 1, 2024
|
[Resource Topic] 2024/374: Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
|
|
0
|
33
|
March 1, 2024
|
[Resource Topic] 2024/372: Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
|
|
0
|
36
|
March 1, 2024
|
[Resource Topic] 2024/370: Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus
|
|
0
|
32
|
March 1, 2024
|
[Resource Topic] 2024/369: Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts
|
|
0
|
30
|
March 1, 2024
|
[Resource Topic] 2024/362: Integrating Causality in Messaging Channels
|
|
0
|
58
|
March 1, 2024
|
[Resource Topic] 2024/358: Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication
|
|
0
|
33
|
March 1, 2024
|
[Resource Topic] 2024/357: Security analysis of the iMessage PQ3 protocol
|
|
0
|
27
|
March 1, 2024
|
[Resource Topic] 2024/355: Adaptively Secure Streaming Functional Encryption
|
|
0
|
30
|
March 1, 2024
|
[Resource Topic] 2024/354: WARPfold : Wrongfield ARithmetic for Protostar folding
|
|
0
|
27
|
March 1, 2024
|
[Resource Topic] 2024/346: A data aggregation protocol based on TFHE
|
|
0
|
32
|
February 27, 2024
|
[Resource Topic] 2024/341: VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
|
|
0
|
35
|
February 27, 2024
|
[Resource Topic] 2024/336: RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs
|
|
0
|
28
|
February 27, 2024
|
[Resource Topic] 2024/330: Fuzzy Private Set Intersection with Large Hyperballs
|
|
0
|
102
|
February 27, 2024
|
[Resource Topic] 2024/326: Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications
|
|
0
|
33
|
February 27, 2024
|
[Resource Topic] 2024/325: Proofs for Deep Thought: Accumulation for large memories and deterministic computations
|
|
0
|
32
|
February 26, 2024
|
[Resource Topic] 2024/324: Under What Conditions Is Encrypted Key Exchange Actually Secure?
|
|
0
|
33
|
February 26, 2024
|
[Resource Topic] 2024/320: POPSTAR: Lightweight Threshold Reporting with Reduced Leakage
|
|
0
|
27
|
February 26, 2024
|
[Resource Topic] 2024/319: On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings $Z_{2^s}, s>1$
|
|
0
|
24
|
February 26, 2024
|
[Resource Topic] 2024/318: Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs
|
|
0
|
25
|
February 26, 2024
|
[Resource Topic] 2024/317: Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus
|
|
0
|
27
|
February 26, 2024
|
[Resource Topic] 2024/316: Threshold Garbled Circuits with Low Overhead
|
|
0
|
25
|
February 26, 2024
|
[Resource Topic] 2024/308: C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM
|
|
0
|
32
|
February 26, 2024
|
[Resource Topic] 2024/307: SweetPAKE: Key exchange with decoy passwords
|
|
0
|
28
|
February 26, 2024
|
[Resource Topic] 2024/306: Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions
|
|
0
|
26
|
February 26, 2024
|