[Resource Topic] 2024/1128: Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE
|
|
0
|
29
|
July 15, 2024
|
[Resource Topic] 2024/1111: Collision Attacks on Galois/Counter Mode (GCM)
|
|
0
|
28
|
July 15, 2024
|
[Resource Topic] 2024/967: Consolidated Linear Masking (CLM): Generalized Randomized Isomorphic Representations, Powerful Degrees of Freedom and Low(er)-cost
|
|
0
|
94
|
June 17, 2024
|
[Resource Topic] 2024/788: A Fault-Resistant NTT by Polynomial Evaluation and Interpolation
|
|
0
|
50
|
May 24, 2024
|
[Resource Topic] 2024/775: Spec-o-Scope: Cache Probing at Cache Speed
|
|
0
|
61
|
May 24, 2024
|
[Resource Topic] 2024/733: Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability
|
|
0
|
53
|
May 16, 2024
|
[Resource Topic] 2024/604: Generic MitM Attack Frameworks on Sponge Constructions
|
|
0
|
76
|
April 22, 2024
|
[Resource Topic] 2024/555: Quantum Algorithms for Lattice Problems
|
|
1
|
396
|
April 16, 2024
|
[Resource Topic] 2024/582: Improved Alternating Moduli PRFs and Post-Quantum Signatures
|
|
0
|
72
|
April 16, 2024
|
[Resource Topic] 2024/529: Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest
|
|
0
|
89
|
April 6, 2024
|
[Resource Topic] 2024/510: DoS-resistant Oblivious Message Retrieval from Snake-eye Resistant PKE
|
|
0
|
73
|
April 1, 2024
|
[Resource Topic] 2022/621: Caulk: Lookup Arguments in Sublinear Time
|
|
2
|
388
|
March 24, 2024
|
[Resource Topic] 2024/436: Re-Randomized FROST
|
|
0
|
75
|
March 15, 2024
|
[Resource Topic] 2024/427: A Cautionary Note: Side-Channel Leakage Implications of Deterministic Signature Schemes
|
|
0
|
77
|
March 15, 2024
|
[Resource Topic] 2024/348: A Computational Tsirelson's Theorem for the Value of Compiled XOR Games
|
|
0
|
65
|
February 27, 2024
|
[Resource Topic] 2024/344: Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
|
|
0
|
94
|
February 27, 2024
|
[Resource Topic] 2024/297: Accelerating Training and Enhancing Security Through Message Size Optimization in Symmetric Cryptography
|
|
0
|
78
|
February 23, 2024
|
[Resource Topic] 2024/266: WhisPIR: Stateless Private Information Retrieval with Low Communication
|
|
0
|
100
|
February 19, 2024
|
[Resource Topic] 2024/260: Kleptographic Attacks against Implicit Rejection
|
|
0
|
86
|
February 19, 2024
|
[Resource Topic] 2024/227: Adaptively Sound Zero-Knowledge SNARKs for UP
|
|
0
|
75
|
February 16, 2024
|
[Resource Topic] 2024/062: Double Difficulties, Defense in Depth A succinct authenticated key agreement protocol
|
|
0
|
81
|
January 17, 2024
|
[Resource Topic] 2024/033: Security analysis on an electronic voting scheme based on a quantum ring signature
|
|
0
|
101
|
January 10, 2024
|
[Resource Topic] 2024/022: Fully Dynamic Attribute-Based Signatures for Circuits from Codes
|
|
0
|
95
|
January 8, 2024
|
[Resource Topic] 2023/1958: Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14
|
|
0
|
109
|
December 25, 2023
|
[Resource Topic] 2023/1921: Automated Issuance of Post-Quantum Certificates: a New Challenge
|
|
0
|
77
|
December 18, 2023
|
[Resource Topic] 2023/1865: Projective Space Stern Decoding and Application to SDitH
|
|
0
|
100
|
December 6, 2023
|
[Resource Topic] 2023/1832: A Note On the Universality of Black-box MKtP Solvers
|
|
0
|
95
|
December 1, 2023
|
[Resource Topic] 2023/1816: ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain
|
|
0
|
97
|
November 27, 2023
|
[Resource Topic] 2023/1752: Secure Encryption and Key Exchange using Arbiter PUF
|
|
0
|
96
|
November 14, 2023
|
[Resource Topic] 2023/1709: Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol
|
|
0
|
119
|
November 6, 2023
|