[Resource Topic] 2025/944: Succinct Witness Encryption for Batch Languages and Applications
|
|
0
|
1
|
May 23, 2025
|
[Resource Topic] 2025/942: On the (in)security of Proofs-of-Space based Longest-Chain Blockchains
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/938: PSYLOCKE: Provably Secure Logic Locking with Practical Efficiency
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/934: Diving Deep Into UC: Uncovering and Resolving Issues in Universal Composability
|
|
0
|
1
|
May 23, 2025
|
[Resource Topic] 2025/918: The Accidental Computer: Polynomial Commitments from Data Availability
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/899: Improved Noise Bound in BFV Homomorphic Encryption and Its Application to Multiplication
|
|
0
|
0
|
May 21, 2025
|
[Resource Topic] 2025/898: A New Approach for LPN-based Pseudorandom Functions: Low-Depth and Key-Homomorphic
|
|
0
|
1
|
May 21, 2025
|
[Resource Topic] 2025/877: Towards Improving Throughput and Scalability of DAG-based BFT SMR
|
|
0
|
1
|
May 19, 2025
|
[Resource Topic] 2025/870: From List-Decodability to Proximity Gaps
|
|
0
|
1
|
May 19, 2025
|
[Resource Topic] 2025/850: Succinct Computational Secret Sharing for Monotone Circuits
|
|
0
|
0
|
May 17, 2025
|
[Resource Topic] 2025/833: A note on closed addition chains and complete numbers
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/822: Generalization of semi-regular sequences: Maximal Gröbner basis degree, variants of genericness, and related conjectures
|
|
0
|
0
|
May 9, 2025
|
[Resource Topic] 2025/819: SoK: Dlog-based Distributed Key Generation
|
|
0
|
3
|
May 9, 2025
|
[Resource Topic] 2025/817: Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes
|
|
0
|
2
|
May 9, 2025
|
[Resource Topic] 2025/800: Comparing classical and quantum conditional disclosure of secrets
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/793: Solving systems of polynomial equations via Macaulay matrices
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/783: Non-Adaptive Cryptanalytic Time-Space Lower Bounds via a Shearer-like Inequality for Permutations
|
|
0
|
1
|
May 4, 2025
|
[Resource Topic] 2025/780: The Planted Orthogonal Vectors Problem
|
|
0
|
1
|
May 2, 2025
|
[Resource Topic] 2025/778: Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond
|
|
0
|
0
|
May 2, 2025
|
[Resource Topic] 2025/769: Finding the Inverse of some Shift Invariant Transformations
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/758: Blockcipher-Based Key Commitment for Nonce-Derived Schemes
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/750: Secure Rate-Distortion-Perception Trade-off Over Channels: A Randomized Distributed Function Computation (RDFC) Application
|
|
0
|
0
|
April 28, 2025
|
[Resource Topic] 2025/738: Quantum Lifting for Invertible Permutations and Ideal Ciphers
|
|
0
|
0
|
April 27, 2025
|
[Resource Topic] 2025/732: Quantum pseudoresources imply cryptography
|
|
0
|
0
|
April 24, 2025
|
[Resource Topic] 2025/731: The Sponge is Quantum Indifferentiable
|
|
0
|
1
|
April 24, 2025
|
[Resource Topic] 2025/726: Public-Key Quantum Fire and Key-Fire From Classical Oracles
|
|
0
|
1
|
April 23, 2025
|
[Resource Topic] 2025/723: Time-Space Tradeoffs of Truncation with Preprocessing
|
|
0
|
2
|
April 23, 2025
|
[Resource Topic] 2025/668: (Interleaved) Extended Gabidulin Codes and Their Applications to RQC
|
|
0
|
4
|
April 15, 2025
|
[Resource Topic] 2025/666: Adaptive Robustness of Hypergrid Johnson-Lindenstrauss
|
|
0
|
6
|
April 13, 2025
|
[Resource Topic] 2025/642: A Meta-Complexity Characterization of Quantum Cryptography
|
|
0
|
0
|
April 12, 2025
|