[Resource Topic] 2024/038: On Computing the Multidimensional Scalar Multiplication on Elliptic Curves
|
|
0
|
41
|
January 10, 2024
|
[Resource Topic] 2024/028: Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis
|
|
0
|
34
|
January 8, 2024
|
[Resource Topic] 2024/006: Towards general-purpose program obfuscation via local mixing
|
|
0
|
44
|
January 5, 2024
|
[Resource Topic] 2024/001: On short digital signatures with Eulerian transformations
|
|
0
|
33
|
January 5, 2024
|
[Resource Topic] 2023/1973: Combinatorially Homomorphic Encryption
|
|
0
|
35
|
January 5, 2024
|
[Resource Topic] 2023/1972: Hard Languages in $\mathsf{NP} \cap \mathsf{coNP}$ and NIZK Proofs from Unstructured Hardness
|
|
0
|
36
|
December 31, 2023
|
[Resource Topic] 2023/1971: The Planck Constant and Quantum Fourier Transformation
|
|
0
|
38
|
December 31, 2023
|
[Resource Topic] 2023/1967: Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption
|
|
0
|
33
|
December 31, 2023
|
[Resource Topic] 2023/1951: Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework
|
|
0
|
34
|
December 25, 2023
|
[Resource Topic] 2023/1941: Upgrading Fuzzy Extractors
|
|
0
|
36
|
December 22, 2023
|
[Resource Topic] 2023/1938: Batch Arguments to NIZKs from One-Way Functions
|
|
0
|
54
|
December 21, 2023
|
[Resource Topic] 2023/1935: The Splitting Field of $Y^n-2$, Two-Variable NTT and Lattice-Based Cryptography
|
|
0
|
52
|
December 21, 2023
|
[Resource Topic] 2023/1929: Cryptography from Planted Graphs: Security with Logarithmic-Size Messages
|
|
0
|
49
|
December 21, 2023
|
[Resource Topic] 2023/1894: Hardness of Range Avoidance and Remote Point for Restricted Circuits via Cryptography
|
|
0
|
40
|
December 11, 2023
|
[Resource Topic] 2023/1889: Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography
|
|
0
|
53
|
December 8, 2023
|
[Resource Topic] 2023/1888: Reverie: an end-to-end accumulation scheme from Cyclefold
|
|
0
|
50
|
December 8, 2023
|
[Resource Topic] 2023/1871: B2T: The Third Logical Value of a Bit
|
|
0
|
51
|
December 6, 2023
|
[Resource Topic] 2023/1869: Accountable Bulletin Boards: Definition and Provably Secure Implementation
|
|
0
|
39
|
December 6, 2023
|
[Resource Topic] 2023/1867: Different Flavours of HILL Pseudoentropy and Yao Incompressibility Entropy
|
|
0
|
35
|
December 6, 2023
|
[Resource Topic] 2023/1857: A Simple and Efficient Framework of Proof Systems for NP
|
|
0
|
49
|
December 6, 2023
|
[Resource Topic] 2023/1854: A note on quantum approximate optimization algorithm
|
|
0
|
43
|
December 4, 2023
|
[Resource Topic] 2023/1847: Cycle Structure and Observability of Two Types of Galois NFSRs
|
|
0
|
43
|
December 1, 2023
|
[Resource Topic] 2023/1844: Unconditionally Secure Commitments with Quantum Auxiliary Inputs
|
|
0
|
49
|
December 1, 2023
|
[Resource Topic] 2023/1841: Unclonable Cryptography with Unbounded Collusions
|
|
0
|
43
|
December 1, 2023
|
[Resource Topic] 2023/1839: Ring-LWE Hardness Based on Ideals of Hidden Orders of Number Fields
|
|
0
|
45
|
December 1, 2023
|
[Resource Topic] 2023/1825: Unclonable Cryptography in the Plain Model
|
|
0
|
48
|
November 28, 2023
|
[Resource Topic] 2023/1819: Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs
|
|
0
|
50
|
November 27, 2023
|
[Resource Topic] 2023/1818: On the Feasibility of Unleveled Fully-Homomorphic Signatures
|
|
0
|
53
|
November 27, 2023
|
[Resource Topic] 2023/1809: PURED: A unified framework for resource-hard functions
|
|
0
|
57
|
November 24, 2023
|
[Resource Topic] 2023/1802: Sublinear-Communication Secure Multiparty Computation does not require FHE
|
|
0
|
64
|
November 24, 2023
|