[Resource Topic] 2023/195: A simpler alternative to Lucas–Lehmer–Riesel primality test
|
|
0
|
18
|
February 15, 2023
|
[Resource Topic] 2023/187: Towards Modular Foundations for Protocol Security
|
|
0
|
18
|
February 15, 2023
|
[Resource Topic] 2023/186: Generic Models for Group Actions
|
|
0
|
25
|
February 15, 2023
|
[Resource Topic] 2023/177: The geometric interpretation of the Tate pairing and its applications
|
|
0
|
20
|
February 15, 2023
|
[Resource Topic] 2023/172: Impossibility of Efficient Information-Theoretic Fuzzy Extraction
|
|
0
|
18
|
February 15, 2023
|
[Resource Topic] 2023/171: On Differential Privacy and Adaptive Data Analysis with Bounded Space
|
|
0
|
18
|
February 15, 2023
|
[Resource Topic] 2023/161: Quantum Advantage from One-Way Functions
|
|
0
|
13
|
February 15, 2023
|
[Resource Topic] 2023/140: Improving Convergence and Practicality of Slide-type Reductions
|
|
0
|
9
|
February 15, 2023
|
[Resource Topic] 2023/131: Some Practical Applications of Fully Homomorphic Encryption
|
|
0
|
23
|
February 7, 2023
|
[Resource Topic] 2023/129: A Lower Bound on the Share Size in Evolving Secret Sharing
|
|
0
|
24
|
February 7, 2023
|
[Resource Topic] 2023/128: Cloning Games: A General Framework for Unclonable Primitives
|
|
0
|
25
|
February 7, 2023
|
[Resource Topic] 2023/110: VORSHA: A Variable-sized, One-way and Randomized Secure Hash Algorithm
|
|
0
|
32
|
January 30, 2023
|
[Resource Topic] 2023/088: Individual Cryptography
|
|
0
|
22
|
January 26, 2023
|
[Resource Topic] 2023/069: On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions
|
|
0
|
22
|
January 23, 2023
|
[Resource Topic] 2023/065: A Practical TFHE-Based Multi-Key Homomorphic Encryption with Linear Complexity and Low Noise Growth
|
|
0
|
29
|
January 20, 2023
|
[Resource Topic] 2023/056: Quantum Annealing for Subset Product and Noisy Subset Product
|
|
0
|
24
|
January 19, 2023
|
[Resource Topic] 2023/054: On the Incoercibility of Digital Signatures
|
|
0
|
32
|
January 19, 2023
|
[Resource Topic] 2023/045: A note on machine learning applied in ransomware detection
|
|
0
|
13
|
January 19, 2023
|
[Resource Topic] 2023/022: Recommendation for a holistic secure embedded ISA extension
|
|
0
|
32
|
January 9, 2023
|
[Resource Topic] 2023/020: The Scholz conjecture on addition chain is true for infinitely many integers with ℓ(2n) = ℓ(n)
|
|
0
|
22
|
January 9, 2023
|
[Resource Topic] 2023/015: Unconditionally Secure NIZK in the Fine-Grained Setting
|
|
0
|
27
|
January 4, 2023
|
[Resource Topic] 2022/1781: COA-Secure Obfuscation and Applications
|
|
0
|
23
|
December 31, 2022
|
[Resource Topic] 2022/1775: Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols
|
|
0
|
31
|
December 31, 2022
|
[Resource Topic] 2022/1770: Cryptographic Primitives with Hinting Property
|
|
0
|
26
|
December 27, 2022
|
[Resource Topic] 2022/1762: On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC
|
|
0
|
21
|
December 27, 2022
|
[Resource Topic] 2022/1758: SuperNova: Proving universal machine executions without universal circuits
|
|
0
|
23
|
December 27, 2022
|
[Resource Topic] 2022/1755: Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version)
|
|
0
|
26
|
December 27, 2022
|
[Resource Topic] 2022/1751: On The Pseudorandomness of the Decoding Problem via the Oracle Comparison Problem
|
|
0
|
24
|
December 27, 2022
|
[Resource Topic] 2022/1745: Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography
|
|
0
|
18
|
December 25, 2022
|
[Resource Topic] 2022/1744: Worst and Average Case Hardness of Decoding via Smoothing Bounds
|
|
0
|
20
|
December 25, 2022
|