[Resource Topic] 2025/1027: Parallel Repetition for Post-Quantum Arguments
|
|
0
|
2
|
June 3, 2025
|
[Resource Topic] 2025/1021: Black-Box Crypto is Useless for Pseudorandom Codes
|
|
0
|
0
|
June 2, 2025
|
[Resource Topic] 2025/1020: Separating Pseudorandom Codes from Local Oracles
|
|
0
|
1
|
June 2, 2025
|
[Resource Topic] 2025/1014: How to Make Any Computational Secret Sharing Scheme Adaptively Secure
|
|
0
|
2
|
June 2, 2025
|
[Resource Topic] 2025/1011: Adaptive TDFs from Injective TDFs
|
|
0
|
0
|
June 2, 2025
|
[Resource Topic] 2025/1007: Scalable Multiparty Computation from Non-linear Secret Sharing
|
|
0
|
3
|
June 2, 2025
|
[Resource Topic] 2025/988: Dynamic Security: A Realistic Approach to Adaptive Security With Applications to Strong FaF Security
|
|
0
|
2
|
June 2, 2025
|
[Resource Topic] 2025/987: Security of Linear Secret Sharing Schemes with Noisy Side-Channel Leakage
|
|
0
|
2
|
June 2, 2025
|
[Resource Topic] 2025/986: The Rényi Smoothing Parameter and Its Applications in Lattice-Based Cryptography
|
|
0
|
0
|
June 2, 2025
|
[Resource Topic] 2025/975: Incompressible Encryption with Everlasting Security
|
|
0
|
0
|
June 2, 2025
|
[Resource Topic] 2025/972: Generalized BGV, BFV, and CKKS for Homomorphic Encryption over Matrix Rings
|
|
0
|
1
|
May 28, 2025
|
[Resource Topic] 2025/968: Learning with Alternating Moduli, Arora-Ge over Composite Moduli, and Weak PRFs
|
|
0
|
0
|
May 28, 2025
|
[Resource Topic] 2025/962: An almost key-homomorphic post-quantum block cipher with key rotation and security update for long-term secret storage
|
|
0
|
4
|
May 27, 2025
|
[Resource Topic] 2025/949: Almost-Total Puzzles and Their Applications
|
|
0
|
5
|
May 26, 2025
|
[Resource Topic] 2025/947: Quantum Rewinding for IOP-Based Succinct Arguments
|
|
0
|
4
|
May 26, 2025
|
[Resource Topic] 2025/944: Succinct Witness Encryption for Batch Languages and Applications
|
|
0
|
5
|
May 23, 2025
|
[Resource Topic] 2025/942: On the (in)security of Proofs-of-Space based Longest-Chain Blockchains
|
|
0
|
4
|
May 23, 2025
|
[Resource Topic] 2025/938: PSYLOCKE: Provably Secure Logic Locking with Practical Efficiency
|
|
0
|
0
|
May 23, 2025
|
[Resource Topic] 2025/934: Diving Deep Into UC: Uncovering and Resolving Issues in Universal Composability
|
|
0
|
4
|
May 23, 2025
|
[Resource Topic] 2025/918: The Accidental Computer: Polynomial Commitments from Data Availability
|
|
0
|
3
|
May 23, 2025
|
[Resource Topic] 2025/899: Improved Noise Bound in BFV Homomorphic Encryption and Its Application to Multiplication
|
|
0
|
2
|
May 21, 2025
|
[Resource Topic] 2025/898: A New Approach for LPN-based Pseudorandom Functions: Low-Depth and Key-Homomorphic
|
|
0
|
3
|
May 21, 2025
|
[Resource Topic] 2025/877: Towards Improving Throughput and Scalability of DAG-based BFT SMR
|
|
0
|
1
|
May 19, 2025
|
[Resource Topic] 2025/870: From List-Decodability to Proximity Gaps
|
|
0
|
1
|
May 19, 2025
|
[Resource Topic] 2025/850: Succinct Computational Secret Sharing for Monotone Circuits
|
|
0
|
0
|
May 17, 2025
|
[Resource Topic] 2025/833: A note on closed addition chains and complete numbers
|
|
0
|
0
|
May 12, 2025
|
[Resource Topic] 2025/822: Generalization of semi-regular sequences: Maximal Gröbner basis degree, variants of genericness, and related conjectures
|
|
0
|
1
|
May 9, 2025
|
[Resource Topic] 2025/819: SoK: Dlog-based Distributed Key Generation
|
|
0
|
3
|
May 9, 2025
|
[Resource Topic] 2025/817: Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes
|
|
0
|
2
|
May 9, 2025
|
[Resource Topic] 2025/800: Comparing classical and quantum conditional disclosure of secrets
|
|
0
|
2
|
May 5, 2025
|