[Resource Topic] 2025/1867: Vectorized Falcon-Sign Implementations using SSE2, AVX2, AVX-512F, NEON, and RVV
|
|
0
|
2
|
October 8, 2025
|
[Resource Topic] 2025/1858: Testing Security Equivalence in the Random Probing Model
|
|
0
|
2
|
October 8, 2025
|
[Resource Topic] 2025/1801: Quantum Circuit Implementation and Resource Analysis of AIM2
|
|
0
|
1
|
October 8, 2025
|
[Resource Topic] 2025/1792: Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach
|
|
0
|
0
|
October 8, 2025
|
[Resource Topic] 2025/1791: High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers
|
|
0
|
1
|
October 3, 2025
|
[Resource Topic] 2025/1777: Optimizing NCC-Sign for ARMv8
|
|
0
|
0
|
October 3, 2025
|
[Resource Topic] 2025/1774: Adaptive-Controlled Mutual TLS for Large Language Model Systems
|
|
0
|
0
|
October 3, 2025
|
[Resource Topic] 2025/1763: A High Throughput Kyber NTT
|
|
0
|
0
|
September 29, 2025
|
[Resource Topic] 2025/1747: Masked Circuit Compiler in the Cardinal Random Probing Composability Framework
|
|
0
|
1
|
September 25, 2025
|
[Resource Topic] 2025/1741: Full L1 On-Chain ZK-STARK+PQC Verification on Solana: A Measurement Study
|
|
0
|
6
|
September 24, 2025
|
[Resource Topic] 2025/1727: Rhizomes and the Roots of Efficiency—Improving Prio
|
|
0
|
1
|
September 23, 2025
|
[Resource Topic] 2025/1701: BPSec-MLS: Asynchronous Key Agreement for Space Communications
|
|
0
|
1
|
September 19, 2025
|
[Resource Topic] 2025/1693: Quasi-perfect (de)compression of elliptic curve points in the highly $2$-adic scenario
|
|
0
|
5
|
September 18, 2025
|
[Resource Topic] 2025/1692: Combined Stability: Protecting against Combined Attacks
|
|
0
|
2
|
September 18, 2025
|
[Resource Topic] 2025/1658: High-Throughput EdDSA Verification on Intel Processors with Advanced Vector Extensions
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1652: Computing Pairings on Elliptic Curves with Embedding Degree Two via Biextensions
|
|
0
|
9
|
September 12, 2025
|
[Resource Topic] 2025/1645: Hardened CTIDH: Dummy-Free and Deterministic CTIDH
|
|
0
|
1
|
September 12, 2025
|
[Resource Topic] 2025/1635: Haystack ciphers: White-box countermeasures as Symmetric encryption
|
|
0
|
1
|
September 12, 2025
|
[Resource Topic] 2025/1629: Solving Concealed ILWE and its Application for Breaking Masked Dilithium
|
|
0
|
0
|
September 12, 2025
|
[Resource Topic] 2025/1607: Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt
|
|
0
|
0
|
September 11, 2025
|
[Resource Topic] 2025/1599: AVX2 Implementation of QR-UOV for Modern x86 Processors
|
|
0
|
1
|
September 11, 2025
|
[Resource Topic] 2025/1596: On GPU acceleration of PQC algorithms
|
|
0
|
0
|
September 11, 2025
|
[Resource Topic] 2025/1591: HE-SecureNet: An Efficient and Usable Framework for Model Training via Homomorphic Encryption
|
|
0
|
5
|
September 5, 2025
|
[Resource Topic] 2025/1572: Quantum Implementation of MD5
|
|
0
|
3
|
September 3, 2025
|
[Resource Topic] 2025/1545: Non-Trivial Ciphertexts
|
|
0
|
7
|
September 3, 2025
|
[Resource Topic] 2025/1505: A New Tool to Find Lightweight (AND, XOR) Implementations of Quadratic Vectorial Boolean Functions up to Dimension 9
|
|
0
|
1
|
August 28, 2025
|
[Resource Topic] 2025/1494: Quantum Circuit Synthesis for AES with Low DW-cost
|
|
0
|
2
|
August 28, 2025
|
[Resource Topic] 2025/1493: Improving the Circuit Implementation of the AES Linear Layer by Improving Boyar-Peralta’s Algorithm and Using Sub-graph Reconstruction
|
|
0
|
2
|
August 28, 2025
|
[Resource Topic] 2025/1490: Outrunning the Millennium FALCON: Speed Records for FALCON on FPGAs
|
|
0
|
0
|
August 20, 2025
|
[Resource Topic] 2025/1460: A Performance Comparison of the Homomorphic Encryption Schemes CKKS and TFHE
|
|
0
|
5
|
August 13, 2025
|