[Resource Topic] 2024/1188: Lightweight Dynamic Linear Components for Symmetric Cryptography
|
|
0
|
17
|
July 25, 2024
|
[Resource Topic] 2024/1179: Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem
|
|
0
|
13
|
July 25, 2024
|
[Resource Topic] 2024/1171: Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem
|
|
0
|
22
|
July 22, 2024
|
[Resource Topic] 2024/1157: Shift-invariant functions and almost liftings
|
|
0
|
33
|
July 19, 2024
|
[Resource Topic] 2024/1156: On affine forestry over integral domains and families of deep Jordan-Gauss graphs
|
|
0
|
26
|
July 19, 2024
|
[Resource Topic] 2024/1140: Permutation Superposition Oracles for Quantum Query Lower Bounds
|
|
0
|
33
|
July 15, 2024
|
[Resource Topic] 2024/1138: Dot-Product Proofs and Their Applications
|
|
0
|
33
|
July 15, 2024
|
[Resource Topic] 2024/1133: Parameters of Algebraic Representation vs. Efficiency of Algebraic Cryptanalysis
|
|
0
|
33
|
July 15, 2024
|
[Resource Topic] 2024/1126: Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods
|
|
0
|
30
|
July 15, 2024
|
[Resource Topic] 2024/1119: Generic Anamorphic Encryption, Revisited: New Limitations and Constructions
|
|
0
|
24
|
July 15, 2024
|
[Resource Topic] 2024/1104: Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions
|
|
0
|
21
|
July 15, 2024
|
[Resource Topic] 2024/970: Cryptography at the Crossroads: Ethical Responsibility, the Cypherpunk Movement and Institutions
|
|
0
|
83
|
June 17, 2024
|
[Resource Topic] 2024/964: Malicious Security for PIR (almost) for Free
|
|
0
|
83
|
June 17, 2024
|
[Resource Topic] 2024/957: VRaaS: Verifiable Randomness as a Service on Blockchains
|
|
0
|
83
|
June 17, 2024
|
[Resource Topic] 2024/956: SNARGs under LWE via Propositional Proofs
|
|
0
|
89
|
June 14, 2024
|
[Resource Topic] 2024/954: Arithmetisation of computation via polynomial semantics for first-order logic
|
|
0
|
79
|
June 14, 2024
|
[Resource Topic] 2024/952: Communication Complexity vs Randomness Complexity in Interactive Proofs
|
|
0
|
76
|
June 14, 2024
|
[Resource Topic] 2024/934: An Explicit High-Moment Forking Lemma and its Applications to the Concrete Security of Multi-Signatures
|
|
0
|
42
|
June 12, 2024
|
[Resource Topic] 2024/933: A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP
|
|
0
|
71
|
June 12, 2024
|
[Resource Topic] 2024/927: MATHEMATICAL SPECULATIONS ON CRYPTOGRAPHY
|
|
0
|
52
|
June 12, 2024
|
[Resource Topic] 2024/912: Quantum Evolving Secret Sharing for General Access Structures
|
|
0
|
53
|
June 8, 2024
|
[Resource Topic] 2024/906: Are Your Keys Protected? Time will Tell
|
|
0
|
50
|
June 6, 2024
|
[Resource Topic] 2024/899: Monotone-Policy Aggregate Signatures
|
|
0
|
53
|
June 6, 2024
|
[Resource Topic] 2024/895: Fully-Succinct Multi-Key Homomorphic Signatures from Standard Assumptions
|
|
0
|
61
|
June 5, 2024
|
[Resource Topic] 2024/884: Security of Fixed-Weight Repetitions of Special-Sound Multi-Round Proofs
|
|
0
|
39
|
June 5, 2024
|
[Resource Topic] 2024/880: Extending class group action attacks via pairings
|
|
0
|
38
|
June 5, 2024
|
[Resource Topic] 2024/869: On cycles of pairing-friendly abelian varieties
|
|
0
|
38
|
June 5, 2024
|
[Resource Topic] 2024/867: Optimal Traitor Tracing from Pairings
|
|
0
|
39
|
June 5, 2024
|
[Resource Topic] 2024/856: Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
|
|
0
|
59
|
May 31, 2024
|
[Resource Topic] 2024/847: More Efficient $k$-wise Independent Permutations from Random Reversible Circuits via log-Sobolev Inequalities
|
|
0
|
54
|
May 31, 2024
|