|
[Resource Topic] 2025/1951: What is Cryptography Hiding from Itself?
|
|
0
|
0
|
October 20, 2025
|
|
[Resource Topic] 2025/1948: Feedback Lunch: Deep Feedback Codes for Wiretap Channels
|
|
0
|
1
|
October 20, 2025
|
|
[Resource Topic] 2025/1947: Minicrypt PRFs Do Not Admit Black-Box Oblivious Evaluations
|
|
0
|
0
|
October 20, 2025
|
|
[Resource Topic] 2025/1943: Circuit-Succinct Algebraic Batch Arguments from Projective Functional Commitments
|
|
0
|
1
|
October 20, 2025
|
|
[Resource Topic] 2025/1932: Decoding Balanced Linear Codes With Preprocessing
|
|
0
|
2
|
October 20, 2025
|
|
[Resource Topic] 2025/1930: Attention is still what you need: Another Round of Exploring Shoup’s GGM
|
|
0
|
0
|
October 20, 2025
|
|
[Resource Topic] 2025/1921: Multi-Copy Security in Unclonable Cryptography
|
|
0
|
0
|
October 17, 2025
|
|
[Resource Topic] 2025/1913: Unambiguous SNARGs for P from LWE with Applications to PPAD Hardness
|
|
0
|
2
|
October 17, 2025
|
|
[Resource Topic] 2025/1906: A Simple and Efficient One-Shot Signature Scheme
|
|
0
|
0
|
October 17, 2025
|
|
[Resource Topic] 2025/1898: Unique NIZKs and Steganography Detection
|
|
0
|
1
|
October 12, 2025
|
|
[Resource Topic] 2025/1894: Bounded-Equivocable Pseudorandom Functions
|
|
0
|
3
|
October 12, 2025
|
|
[Resource Topic] 2025/1889: Gluing Random Unitaries with Inverses and Applications to Strong Pseudorandom Unitaries
|
|
0
|
2
|
October 11, 2025
|
|
[Resource Topic] 2025/1887: Parallel Spooky Pebbling Makes Regev Factoring More Practical
|
|
0
|
0
|
October 11, 2025
|
|
[Resource Topic] 2025/1880: Copy-Protection from Unclonable Puncturable Obfuscation, Revisited
|
|
0
|
2
|
October 11, 2025
|
|
[Resource Topic] 2025/1877: Binary Codes for Computationally Bounded Errors Under Standard Crypto Assumptions
|
|
0
|
1
|
October 11, 2025
|
|
[Resource Topic] 2025/1871: A Unified Approach to Quantum Key Leasing with a Classical Lessor
|
|
0
|
1
|
October 9, 2025
|
|
[Resource Topic] 2025/1870: Lookup-Table Evaluation over Key-Homomorphic Encodings and KP-ABE for Nonlinear Operations
|
|
0
|
2
|
October 9, 2025
|
|
[Resource Topic] 2025/1864: Black-Box Separation Between Pseudorandom Unitaries, Pseudorandom Isometries, and Pseudorandom Function-Like States
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1863: On Limits on the Provable Consequences of Quantum Pseudorandomness
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1860: On the generalized Schönhage-type bound
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1857: On the Quantum Equivalence between S|LWE⟩ and ISIS
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1855: Less is More: On Copy Complexity in Quantum Cryptography
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1852: A Gaussian Leftover Hash Lemma for Modules over Number Fields
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1851: Locally Recoverable Data Availability Sampling
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1840: Quantum Cryptography and Hardness of Non-Collapsing Measurements
|
|
0
|
2
|
October 8, 2025
|
|
[Resource Topic] 2025/1837: Proofs of quantum memory
|
|
0
|
2
|
October 8, 2025
|
|
[Resource Topic] 2025/1826: Proofs of No Intrusion
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1825: Quantumly Computing S-unit Groups in Quantified Polynomial Time and Space
|
|
0
|
2
|
October 8, 2025
|
|
[Resource Topic] 2025/1823: A unified theoretical framework for steganography: balancing reliability, security and robustness
|
|
0
|
0
|
October 8, 2025
|
|
[Resource Topic] 2025/1817: Improved Search-to-Decision Reduction for Random Local Functions
|
|
0
|
0
|
October 8, 2025
|