[Resource Topic] 2025/353: Stronger Security for Threshold Blind Signatures
|
|
0
|
0
|
February 25, 2025
|
[Resource Topic] 2025/345: Publicly Verifiable Threshold Proxy Re-encryption and Its Application in Data Rights Confirmation
|
|
0
|
0
|
February 25, 2025
|
[Resource Topic] 2025/340: Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE
|
|
0
|
0
|
February 25, 2025
|
[Resource Topic] 2025/316: $\mathsf{Zinc}$: Succinct Arguments with Small Arithmetization Overheads from IOPs of Proximity to the Integers
|
|
0
|
1
|
February 21, 2025
|
[Resource Topic] 2025/204: Simpler and Stronger Models for Deniable Authentication
|
|
0
|
0
|
February 12, 2025
|
[Resource Topic] 2025/092: Public-Key Quantum Money From Standard Assumptions (In The Generic Model)
|
|
0
|
1
|
January 22, 2025
|
[Resource Topic] 2025/034: ZODA: Zero-Overhead Data Availability
|
|
0
|
2
|
January 9, 2025
|
[Resource Topic] 2024/2091: Encrypted Multi-map that Hides Query, Access, and Volume Patterns
|
|
0
|
0
|
December 30, 2024
|
[Resource Topic] 2024/1991: CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction
|
|
0
|
2
|
December 12, 2024
|
[Resource Topic] 2024/1984: Low Communication Threshold Fully Homomorphic Encryption
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1898: NTRU-based Bootstrapping for MK-FHEs without using Overstretched Parameters
|
|
0
|
0
|
November 25, 2024
|
[Resource Topic] 2024/1889: IO-Optimized Design-Time Configurable Negacyclic Seven-Step NTT Architecture for FHE Applications
|
|
0
|
12
|
November 22, 2024
|
[Resource Topic] 2024/1803: Siniel: Distributed Privacy-Preserving zkSNARK
|
|
0
|
19
|
November 8, 2024
|
[Resource Topic] 2024/1746: Secure and Privacy-preserving CBDC Offline Payments using a Secure Element
|
|
0
|
40
|
October 28, 2024
|
[Resource Topic] 2024/1724: Straight-Line Knowledge Extraction for Multi-Round Protocols
|
|
0
|
31
|
October 25, 2024
|
[Resource Topic] 2024/1681: Another L makes it better? Lagrange meets LLL and may improve BKZ pre-processing
|
|
0
|
35
|
October 18, 2024
|
[Resource Topic] 2024/1676: The Sting Framework: Proving the Existence of Superclass Adversaries
|
|
0
|
34
|
October 18, 2024
|
[Resource Topic] 2024/1646: Transaction Execution Mechanisms
|
|
0
|
39
|
October 14, 2024
|
[Resource Topic] 2024/1551: SNARKs for Virtual Machines are Non-Malleable
|
|
0
|
38
|
October 4, 2024
|
[Resource Topic] 2024/1509: DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group
|
|
0
|
46
|
September 30, 2024
|
[Resource Topic] 2024/1493: Rate-1 Zero-Knowledge Proofs from One-Way Functions
|
|
0
|
37
|
September 30, 2024
|
[Resource Topic] 2024/1281: Stackproofs: Private proofs of stack and contract execution using Protogalaxy
|
|
0
|
90
|
August 16, 2024
|
[Resource Topic] 2024/1273: HyperPianist: Pianist with Linear-Time Prover via Fully Distributed HyperPlonk
|
|
0
|
60
|
August 16, 2024
|
[Resource Topic] 2024/1128: Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE
|
|
0
|
69
|
July 15, 2024
|
[Resource Topic] 2024/1111: Collision Attacks on Galois/Counter Mode (GCM)
|
|
0
|
74
|
July 15, 2024
|
[Resource Topic] 2024/967: Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost
|
|
0
|
138
|
June 17, 2024
|
[Resource Topic] 2024/788: A Fault-Resistant NTT by Polynomial Evaluation and Interpolation
|
|
0
|
133
|
May 24, 2024
|
[Resource Topic] 2024/775: Spec-o-Scope: Cache Probing at Cache Speed
|
|
0
|
160
|
May 24, 2024
|
[Resource Topic] 2024/733: Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability
|
|
0
|
118
|
May 16, 2024
|
[Resource Topic] 2024/604: Generic MitM Attack Frameworks on Sponge Constructions
|
|
0
|
132
|
April 22, 2024
|