|
[Resource Topic] 2025/1877: Binary Codes for Computationally Bounded Errors Under Standard Crypto Assumptions
|
|
0
|
3
|
October 11, 2025
|
|
[Resource Topic] 2025/1871: A Unified Approach to Quantum Key Leasing with a Classical Lessor
|
|
0
|
9
|
October 9, 2025
|
|
[Resource Topic] 2025/1870: Lookup-Table Evaluation over Key-Homomorphic Encodings and KP-ABE for Nonlinear Operations
|
|
0
|
4
|
October 9, 2025
|
|
[Resource Topic] 2025/1864: Black-Box Separation Between Pseudorandom Unitaries, Pseudorandom Isometries, and Pseudorandom Function-Like States
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1863: On Limits on the Provable Consequences of Quantum Pseudorandomness
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1860: On the generalized Schönhage-type bound
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1857: On the Quantum Equivalence between S|LWE⟩ and ISIS
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1855: Less is More: On Copy Complexity in Quantum Cryptography
|
|
0
|
5
|
October 8, 2025
|
|
[Resource Topic] 2025/1852: A Gaussian Leftover Hash Lemma for Modules over Number Fields
|
|
0
|
6
|
October 8, 2025
|
|
[Resource Topic] 2025/1851: Locally Recoverable Data Availability Sampling
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1840: Quantum Cryptography and Hardness of Non-Collapsing Measurements
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1837: Proofs of quantum memory
|
|
0
|
5
|
October 8, 2025
|
|
[Resource Topic] 2025/1826: Proofs of No Intrusion
|
|
0
|
2
|
October 8, 2025
|
|
[Resource Topic] 2025/1825: Quantumly Computing S-unit Groups in Quantified Polynomial Time and Space
|
|
0
|
7
|
October 8, 2025
|
|
[Resource Topic] 2025/1823: A unified theoretical framework for steganography: balancing reliability, security and robustness
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1817: Improved Search-to-Decision Reduction for Random Local Functions
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1809: On the Security of Linear Secret Sharing with General Noisy Side-Channel Leakage
|
|
0
|
8
|
October 8, 2025
|
|
[Resource Topic] 2025/1787: Four-round Statistical Non-malleable Zero-knowledge
|
|
0
|
10
|
October 3, 2025
|
|
[Resource Topic] 2025/1785: On the Limitations of Pseudorandom Unitaries
|
|
0
|
2
|
October 3, 2025
|
|
[Resource Topic] 2025/1784: Pseudorandom Unitaries in the Haar Random Oracle Model
|
|
0
|
1
|
October 3, 2025
|
|
[Resource Topic] 2025/1783: Seedless Condensers for Efficiently Samplable Sources
|
|
0
|
1
|
October 3, 2025
|
|
[Resource Topic] 2025/1782: On Verifiable Delay Functions from Time-Lock Puzzles
|
|
0
|
5
|
October 3, 2025
|
|
[Resource Topic] 2025/1780: There are siblings of $\chi$ which are permutations for $n$ even
|
|
0
|
6
|
October 3, 2025
|
|
[Resource Topic] 2025/1775: Homomorphic Encryption Methods Applied to Cloud Computing: A Practical Architecture for Elastic, Verifiable Confidential Compute
|
|
0
|
7
|
October 3, 2025
|
|
[Resource Topic] 2025/1769: Average-Case Complexity of Quantum Stabilizer Decoding
|
|
0
|
2
|
October 3, 2025
|
|
[Resource Topic] 2025/1765: Untelegraphable Encryption and its Applications
|
|
0
|
0
|
September 30, 2025
|
|
[Resource Topic] 2025/1762: Threshold Signatures from One-Way Functions
|
|
0
|
3
|
September 29, 2025
|
|
[Resource Topic] 2025/1760: Vive Galois! Part 1: Optimal SIMD Packing and Packed Bootstrapping for FHE
|
|
0
|
3
|
September 29, 2025
|
|
[Resource Topic] 2025/1756: Are Neural Networks Collision Resistant?
|
|
0
|
8
|
September 26, 2025
|
|
[Resource Topic] 2025/1743: NISQ Security and Complexity via Simple Classical Reasoning
|
|
0
|
5
|
September 25, 2025
|