|
[Resource Topic] 2025/1856: Optimal Good-Case Latency for Sleepy Consensus
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1829: On the Limits of Consensus under Dynamic Availability and Reconfiguration
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1804: HELIOS: Multi-Key Fully Homomorphic Encryption with Sublinear Bootstrapping
|
|
0
|
0
|
October 8, 2025
|
|
[Resource Topic] 2025/1786: Leveraging Discrete CKKS to Bootstrap in High Precision
|
|
0
|
3
|
October 3, 2025
|
|
[Resource Topic] 2025/1773: Impossibility of VDFs in the ROM: The Complete Picture
|
|
0
|
1
|
October 3, 2025
|
|
[Resource Topic] 2025/1772: Multiple Concurrent Proposers: Why and How
|
|
0
|
0
|
October 3, 2025
|
|
[Resource Topic] 2025/1752: Foundations of Dynamic Group Signatures: The Case of Malicious Openers and Issuers
|
|
0
|
7
|
September 26, 2025
|
|
[Resource Topic] 2025/1726: How (not) to Build Identity-Based Encryption from Isogenies
|
|
0
|
3
|
September 23, 2025
|
|
[Resource Topic] 2025/1721: Q-Stream: A Practical System for Operational Perfect Secrecy
|
|
0
|
4
|
September 23, 2025
|
|
[Resource Topic] 2025/1530: PolySys: an Algebraic Leakage Attack Engine
|
|
0
|
0
|
August 30, 2025
|
|
[Resource Topic] 2025/1499: A Construction of Evolving $k$-threshold Secret Sharing Scheme over A Polynomial Ring
|
|
0
|
0
|
August 28, 2025
|
|
[Resource Topic] 2025/1497: Hardness Along the Boundary: Towards One-Way Functions from the Worst-case Hardness of Time-Bounded Kolmogorov Complexity
|
|
0
|
3
|
August 28, 2025
|
|
[Resource Topic] 2025/1455: Fully-Fluctuating Participation in Sleepy Consensus
|
|
0
|
3
|
August 12, 2025
|
|
[Resource Topic] 2025/1393: Polynomial Lattices for the BIKE Cryptosystem
|
|
0
|
1
|
August 1, 2025
|
|
[Resource Topic] 2025/1332: Technical Note: LeanSig for Post-Quantum Ethereum
|
|
0
|
3
|
July 22, 2025
|
|
[Resource Topic] 2025/1302: FHERMA Cookbook: FHE Components for Privacy-Preserving Applications
|
|
0
|
4
|
July 19, 2025
|
|
[Resource Topic] 2025/1244: A New Bijective Pairing Alternative for Encoding Natural Numbers
|
|
0
|
3
|
July 11, 2025
|
|
[Resource Topic] 2025/1115: High-Throughput Permissionless Blockchain Consensus under Realistic Network Assumptions
|
|
0
|
2
|
June 16, 2025
|
|
[Resource Topic] 2025/1105: Low-cost anonymous reputation update for IoT applications
|
|
0
|
4
|
June 13, 2025
|
|
[Resource Topic] 2025/1077: Shorter VOLE-in-the-Head-based Signatures from Vector Semi-Commitment
|
|
0
|
4
|
June 10, 2025
|
|
[Resource Topic] 2025/958: Efficient Pairings Final Exponentiation Using Cyclotomic Cubing for Odd Embedding Degrees Curves
|
|
0
|
2
|
May 27, 2025
|
|
[Resource Topic] 2025/893: MacaKey: Full-State Keyed Sponge Meets the Summation-Truncation Hybrid
|
|
0
|
3
|
May 19, 2025
|
|
[Resource Topic] 2025/886: PaCo: Bootstrapping for CKKS via Partial CoeffToSlot
|
|
0
|
5
|
May 19, 2025
|
|
[Resource Topic] 2025/871: Simple and Efficient Lattice Threshold Signatures with Identifiable Aborts
|
|
0
|
5
|
May 19, 2025
|
|
[Resource Topic] 2025/835: Universally Composable Interactive and Ordered Multi-Signatures
|
|
0
|
6
|
May 12, 2025
|
|
[Resource Topic] 2025/784: SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm
|
|
0
|
4
|
May 4, 2025
|
|
[Resource Topic] 2025/762: $\textbf{MALARIA}$: $\textbf{Ma}$nagement of Low-$\textbf{La}$tency $\textbf{R}$outing $\textbf{I}$mpact on Mix Network $\textbf{A}$nonymity (Extended Version)
|
|
0
|
4
|
April 30, 2025
|
|
[Resource Topic] 2025/693: Accountable Liveness
|
|
0
|
6
|
April 17, 2025
|
|
[Resource Topic] 2025/458: CAKE requires programming - On the provable post-quantum security of (O)CAKE
|
|
0
|
3
|
March 12, 2025
|
|
[Resource Topic] 2025/397: Blind Signatures from Cryptographic Group Actions
|
|
0
|
13
|
March 4, 2025
|