[Resource Topic] 2024/1803: Siniel: Distributed Privacy-Preserving zkSNARK
|
|
0
|
15
|
November 8, 2024
|
[Resource Topic] 2024/1746: Secure and Privacy-preserving CBDC Offline Payments using a Secure Element
|
|
0
|
38
|
October 28, 2024
|
[Resource Topic] 2024/1724: Straight-Line Knowledge Extraction for Multi-Round Protocols
|
|
0
|
30
|
October 25, 2024
|
[Resource Topic] 2024/1681: Another L makes it better? Lagrange meets LLL and may improve BKZ pre-processing
|
|
0
|
33
|
October 18, 2024
|
[Resource Topic] 2024/1676: The Sting Framework: Proving the Existence of Superclass Adversaries
|
|
0
|
31
|
October 18, 2024
|
[Resource Topic] 2024/1646: Transaction Execution Mechanisms
|
|
0
|
35
|
October 14, 2024
|
[Resource Topic] 2024/1551: SNARKs for Virtual Machines are Non-Malleable
|
|
0
|
35
|
October 4, 2024
|
[Resource Topic] 2024/1509: DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group
|
|
0
|
45
|
September 30, 2024
|
[Resource Topic] 2024/1493: Rate-1 Zero-Knowledge Proofs from One-Way Functions
|
|
0
|
35
|
September 30, 2024
|
[Resource Topic] 2024/1281: Stackproofs: Private proofs of stack and contract execution using Protogalaxy
|
|
0
|
86
|
August 16, 2024
|
[Resource Topic] 2024/1273: HyperPianist: Pianist with Linear-Time Prover via Fully Distributed HyperPlonk
|
|
0
|
57
|
August 16, 2024
|
[Resource Topic] 2024/1128: Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE
|
|
0
|
67
|
July 15, 2024
|
[Resource Topic] 2024/1111: Collision Attacks on Galois/Counter Mode (GCM)
|
|
0
|
72
|
July 15, 2024
|
[Resource Topic] 2024/967: Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost
|
|
0
|
137
|
June 17, 2024
|
[Resource Topic] 2024/788: A Fault-Resistant NTT by Polynomial Evaluation and Interpolation
|
|
0
|
132
|
May 24, 2024
|
[Resource Topic] 2024/775: Spec-o-Scope: Cache Probing at Cache Speed
|
|
0
|
157
|
May 24, 2024
|
[Resource Topic] 2024/733: Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability
|
|
0
|
117
|
May 16, 2024
|
[Resource Topic] 2024/604: Generic MitM Attack Frameworks on Sponge Constructions
|
|
0
|
130
|
April 22, 2024
|
[Resource Topic] 2024/555: Quantum Algorithms for Lattice Problems
|
|
1
|
508
|
April 16, 2024
|
[Resource Topic] 2024/582: Improved Alternating Moduli PRFs and Post-Quantum Signatures
|
|
0
|
109
|
April 16, 2024
|
[Resource Topic] 2024/529: Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest
|
|
0
|
136
|
April 6, 2024
|
[Resource Topic] 2024/510: DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE
|
|
0
|
140
|
April 1, 2024
|
[Resource Topic] 2022/621: Caulk: Lookup Arguments in Sublinear Time
|
|
2
|
472
|
March 24, 2024
|
[Resource Topic] 2024/436: Re-Randomized FROST
|
|
0
|
127
|
March 15, 2024
|
[Resource Topic] 2024/427: A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes
|
|
0
|
135
|
March 15, 2024
|
[Resource Topic] 2024/348: A Computational Tsirelson's Theorem for the Value of Compiled XOR Games
|
|
0
|
107
|
February 27, 2024
|
[Resource Topic] 2024/344: Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
|
|
0
|
152
|
February 27, 2024
|
[Resource Topic] 2024/297: Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography
|
|
0
|
124
|
February 23, 2024
|
[Resource Topic] 2024/266: WhisPIR: Stateless Private Information Retrieval with Low Communication
|
|
0
|
154
|
February 19, 2024
|
[Resource Topic] 2024/260: Kleptographic Attacks against Implicit Rejection
|
|
0
|
153
|
February 19, 2024
|