[Resource Topic] 2024/967: Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost
|
|
0
|
39
|
June 17, 2024
|
[Resource Topic] 2024/788: A Fault-Resistant NTT by Polynomial Evaluation and Interpolation
|
|
0
|
42
|
May 24, 2024
|
[Resource Topic] 2024/775: Spec-o-Scope: Cache Probing at Cache Speed
|
|
0
|
44
|
May 24, 2024
|
[Resource Topic] 2024/733: Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability
|
|
0
|
38
|
May 16, 2024
|
[Resource Topic] 2024/604: Generic MitM Attack Frameworks on Sponge Constructions
|
|
0
|
61
|
April 22, 2024
|
[Resource Topic] 2024/555: Quantum Algorithms for Lattice Problems
|
|
1
|
364
|
April 16, 2024
|
[Resource Topic] 2024/582: Improved Alternating Moduli PRFs and Post-Quantum Signatures
|
|
0
|
62
|
April 16, 2024
|
[Resource Topic] 2024/529: Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest
|
|
0
|
73
|
April 6, 2024
|
[Resource Topic] 2024/510: DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE
|
|
0
|
62
|
April 1, 2024
|
[Resource Topic] 2022/621: Caulk: Lookup Arguments in Sublinear Time
|
|
2
|
373
|
March 24, 2024
|
[Resource Topic] 2024/436: Re-Randomized FROST
|
|
0
|
59
|
March 15, 2024
|
[Resource Topic] 2024/427: A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes
|
|
0
|
68
|
March 15, 2024
|
[Resource Topic] 2024/348: A Computational Tsirelson's Theorem for the Value of Compiled XOR Games
|
|
0
|
57
|
February 27, 2024
|
[Resource Topic] 2024/344: Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
|
|
0
|
79
|
February 27, 2024
|
[Resource Topic] 2024/297: Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography
|
|
0
|
64
|
February 23, 2024
|
[Resource Topic] 2024/266: WhisPIR: Stateless Private Information Retrieval with Low Communication
|
|
0
|
76
|
February 19, 2024
|
[Resource Topic] 2024/260: Kleptographic Attacks against Implicit Rejection
|
|
0
|
69
|
February 19, 2024
|
[Resource Topic] 2024/227: Adaptively Sound Zero-Knowledge SNARKs for UP
|
|
0
|
59
|
February 16, 2024
|
[Resource Topic] 2024/062: Double Difficulties, Defense in Depth A succinct authenticated key agreement protocol
|
|
0
|
69
|
January 17, 2024
|
[Resource Topic] 2024/033: Security analysis on an electronic voting scheme based on a quantum ring signature
|
|
0
|
84
|
January 10, 2024
|
[Resource Topic] 2024/022: Fully Dynamic Attribute-Based Signatures for Circuits from Codes
|
|
0
|
76
|
January 8, 2024
|
[Resource Topic] 2023/1958: Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14
|
|
0
|
93
|
December 25, 2023
|
[Resource Topic] 2023/1921: Automated Issuance of Post-Quantum Certificates: a New Challenge
|
|
0
|
63
|
December 18, 2023
|
[Resource Topic] 2023/1865: Projective Space Stern Decoding and Application to SDitH
|
|
0
|
82
|
December 6, 2023
|
[Resource Topic] 2023/1832: A Note On the Universality of Black-box MKtP Solvers
|
|
0
|
75
|
December 1, 2023
|
[Resource Topic] 2023/1816: ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain
|
|
0
|
81
|
November 27, 2023
|
[Resource Topic] 2023/1752: Secure Encryption and Key Exchange using Arbiter PUF
|
|
0
|
84
|
November 14, 2023
|
[Resource Topic] 2023/1709: Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol
|
|
0
|
98
|
November 6, 2023
|
[Resource Topic] 2023/1581: CryptoZoo: A Viewer for Reduction Proofs
|
|
0
|
166
|
October 13, 2023
|
[Resource Topic] 2023/1564: Fast Blind Rotation for Bootstrapping FHEs
|
|
0
|
119
|
October 13, 2023
|