[Resource Topic] 2024/376: Õptimal Parallel Broadcast
|
|
0
|
50
|
March 1, 2024
|
[Resource Topic] 2024/375: Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
|
|
0
|
38
|
March 1, 2024
|
[Resource Topic] 2024/374: Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
|
|
0
|
40
|
March 1, 2024
|
[Resource Topic] 2024/372: Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
|
|
0
|
38
|
March 1, 2024
|
[Resource Topic] 2024/370: Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus
|
|
0
|
35
|
March 1, 2024
|
[Resource Topic] 2024/369: Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts
|
|
0
|
35
|
March 1, 2024
|
[Resource Topic] 2024/362: Integrating Causality in Messaging Channels
|
|
0
|
64
|
March 1, 2024
|
[Resource Topic] 2024/358: Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication
|
|
0
|
39
|
March 1, 2024
|
[Resource Topic] 2024/357: Security analysis of the iMessage PQ3 protocol
|
|
0
|
32
|
March 1, 2024
|
[Resource Topic] 2024/355: Adaptively Secure Streaming Functional Encryption
|
|
0
|
35
|
March 1, 2024
|
[Resource Topic] 2024/354: WARPfold : Wrongfield ARithmetic for Protostar folding
|
|
0
|
31
|
March 1, 2024
|
[Resource Topic] 2024/346: A data aggregation protocol based on TFHE
|
|
0
|
39
|
February 27, 2024
|
[Resource Topic] 2024/341: VeriSimplePIR: Verifiability in SimplePIR at No Online Cost for Honest Servers
|
|
0
|
40
|
February 27, 2024
|
[Resource Topic] 2024/336: RAMenPaSTA: Parallelizable Scalable Transparent Arguments of Knowledge for RAM Programs
|
|
0
|
32
|
February 27, 2024
|
[Resource Topic] 2024/330: Fuzzy Private Set Intersection with Large Hyperballs
|
|
0
|
125
|
February 27, 2024
|
[Resource Topic] 2024/326: Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications
|
|
0
|
40
|
February 27, 2024
|
[Resource Topic] 2024/325: Proofs for Deep Thought: Accumulation for large memories and deterministic computations
|
|
0
|
43
|
February 26, 2024
|
[Resource Topic] 2024/324: Under What Conditions Is Encrypted Key Exchange Actually Secure?
|
|
0
|
38
|
February 26, 2024
|
[Resource Topic] 2024/320: POPSTAR: Lightweight Threshold Reporting with Reduced Leakage
|
|
0
|
33
|
February 26, 2024
|
[Resource Topic] 2024/319: On the cryptosystems based on two Eulerian transfor-mations defined over the commutative rings $Z_{2^s}, s>1$
|
|
0
|
27
|
February 26, 2024
|
[Resource Topic] 2024/318: Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs
|
|
0
|
32
|
February 26, 2024
|
[Resource Topic] 2024/317: Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus
|
|
0
|
34
|
February 26, 2024
|
[Resource Topic] 2024/316: Threshold Garbled Circuits with Low Overhead
|
|
0
|
32
|
February 26, 2024
|
[Resource Topic] 2024/308: C'est très CHIC: A compact password-authenticated key exchange from lattice-based KEM
|
|
0
|
43
|
February 26, 2024
|
[Resource Topic] 2024/307: SweetPAKE: Key exchange with decoy passwords
|
|
0
|
33
|
February 26, 2024
|
[Resource Topic] 2024/306: Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions
|
|
0
|
35
|
February 26, 2024
|
[Resource Topic] 2024/305: Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal
|
|
0
|
41
|
February 26, 2024
|
[Resource Topic] 2024/304: A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance
|
|
0
|
39
|
February 23, 2024
|
[Resource Topic] 2024/303: Single Pass Client-Preprocessing Private Information Retrieval
|
|
0
|
39
|
February 23, 2024
|
[Resource Topic] 2024/286: Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
|
|
0
|
39
|
February 23, 2024
|