[Resource Topic] 2024/836: The Round Complexity of Proofs in the Bounded Quantum Storage Model
|
|
0
|
48
|
May 31, 2024
|
[Resource Topic] 2024/832: Hamming Weight Proofs of Proximity with One-Sided Error
|
|
0
|
49
|
May 31, 2024
|
[Resource Topic] 2024/831: Tight Characterizations for Preprocessing against Cryptographic Salting
|
|
0
|
44
|
May 31, 2024
|
[Resource Topic] 2024/830: How (not) to Build Quantum PKE in Minicrypt
|
|
0
|
51
|
May 31, 2024
|
[Resource Topic] 2024/816: Zero-knowledge IOPs Approaching Witness Length
|
|
0
|
81
|
May 27, 2024
|
[Resource Topic] 2024/806: Resettable Statistical Zero-Knowledge for NP
|
|
0
|
83
|
May 27, 2024
|
[Resource Topic] 2024/804: Analysis on Sliced Garbling via Algebraic Approach
|
|
0
|
90
|
May 27, 2024
|
[Resource Topic] 2024/803: Can We Beat Three Halves Lower Bound?: (Im)Possibility of Reducing Communication Cost for Garbled Circuits
|
|
0
|
88
|
May 24, 2024
|
[Resource Topic] 2024/801: Algebraic Structure of the Iterates of $\chi$
|
|
0
|
96
|
May 24, 2024
|
[Resource Topic] 2024/800: A Note on Zero-Knowledge for NP and One-Way Functions
|
|
0
|
92
|
May 24, 2024
|
[Resource Topic] 2024/797: Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming
|
|
0
|
92
|
May 24, 2024
|
[Resource Topic] 2024/795: New Limits of Provable Security and Applications to ElGamal Encryption
|
|
0
|
44
|
May 24, 2024
|
[Resource Topic] 2024/782: Relating Code Equivalence to Other Isomorphism Problems
|
|
0
|
52
|
May 24, 2024
|
[Resource Topic] 2024/776: Instance-Hiding Interactive Proofs
|
|
0
|
51
|
May 24, 2024
|
[Resource Topic] 2024/774: Byzantine Reliable Broadcast with One Trusted Monotonic Counter
|
|
0
|
46
|
May 24, 2024
|
[Resource Topic] 2024/772: Reducing the Share Size of Weighted Threshold Secret Sharing Schemes via Chow Parameters Approximation
|
|
0
|
46
|
May 22, 2024
|
[Resource Topic] 2024/769: Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More
|
|
0
|
44
|
May 22, 2024
|
[Resource Topic] 2024/766: Breaking Verifiable Delay Functions in the Random Oracle Model
|
|
0
|
50
|
May 20, 2024
|
[Resource Topic] 2024/751: Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography
|
|
0
|
48
|
May 20, 2024
|
[Resource Topic] 2024/738: Quantum Key-Revocable Dual-Regev Encryption, Revisited
|
|
0
|
57
|
May 16, 2024
|
[Resource Topic] 2024/737: Mutable Batch Arguments and Applications
|
|
0
|
49
|
May 16, 2024
|
[Resource Topic] 2024/736: Secret Sharing with Certified Deletion
|
|
0
|
51
|
May 16, 2024
|
[Resource Topic] 2024/730: New Solutions to Delsarte's Dual Linear Programs
|
|
0
|
45
|
May 16, 2024
|
[Resource Topic] 2024/728: Relativized Succinct Arguments in the ROM Do Not Exist
|
|
0
|
56
|
May 13, 2024
|
[Resource Topic] 2024/727: Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
|
|
0
|
48
|
May 13, 2024
|
[Resource Topic] 2024/716: Unclonable Secret Sharing
|
|
0
|
55
|
May 10, 2024
|
[Resource Topic] 2024/714: Learning with Quantization, Polar Quantizer, and Secure Source Coding
|
|
0
|
59
|
May 10, 2024
|
[Resource Topic] 2024/706: Linicrypt in the Ideal Cipher Model
|
|
0
|
61
|
May 10, 2024
|
[Resource Topic] 2024/701: Quantum Unpredictability
|
|
0
|
50
|
May 10, 2024
|
[Resource Topic] 2024/694: Lower-Bounds on Public-Key Operations in PIR
|
|
0
|
47
|
May 10, 2024
|