[Resource Topic] 2023/005: Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud
|
|
0
|
77
|
January 4, 2023
|
[Resource Topic] 2022/1777: Weightwise perfectly balanced functions and nonlinearity
|
|
0
|
103
|
December 31, 2022
|
[Resource Topic] 2022/1677: Quagmire ciphers and group theory: What is a Porta cipher?
|
|
0
|
110
|
December 2, 2022
|
[Resource Topic] 2022/1575: On lineariazation attack of entropic quasigroups cryptography
|
|
0
|
117
|
November 14, 2022
|
[Resource Topic] 2022/1547: A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm
|
|
0
|
154
|
November 8, 2022
|
[Resource Topic] 2022/1433: BG: A Modular Treatment of BFT Consensus
|
|
0
|
139
|
October 24, 2022
|
[Resource Topic] 2022/1228: SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization
|
|
0
|
165
|
September 16, 2022
|
[Resource Topic] 2022/1204: The Pseudorandom Oracle Model and Ideal Obfuscation
|
|
0
|
197
|
September 12, 2022
|
[Resource Topic] 2022/1201: Consistent, Efficient and Leakage-Model Free Mutual Information Estimation
|
|
0
|
132
|
September 12, 2022
|
[Resource Topic] 2022/1129: Breaking KASLR on Mobile Devices without Any Use of Cache Memory
|
|
0
|
138
|
August 31, 2022
|
[Resource Topic] 2022/132: On Defeating Graph Analysis of Anonymous Transactions
|
|
1
|
192
|
August 31, 2022
|
[Resource Topic] 2019/599: New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
|
|
1
|
251
|
August 24, 2022
|
[Resource Topic] 2021/844: A note on IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3
|
|
0
|
250
|
July 31, 2022
|
[Resource Topic] 2022/939: Multi-party Private Function Evaluation for RAM
|
|
0
|
140
|
July 31, 2022
|
[Resource Topic] 2022/927: Fit The Joint Moments
|
|
0
|
119
|
July 31, 2022
|
[Resource Topic] 2022/894: Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases
|
|
0
|
140
|
July 31, 2022
|
[Resource Topic] 2022/875: Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations
|
|
0
|
80
|
July 31, 2022
|
[Resource Topic] 2022/837: Differential Cryptanalysis in the Fixed-Key Model
|
|
0
|
169
|
July 31, 2022
|
[Resource Topic] 2022/801: Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic
|
|
0
|
124
|
July 31, 2022
|
[Resource Topic] 2022/767: A New Approach to Efficient Non-Malleable Zero-Knowledge
|
|
0
|
79
|
July 31, 2022
|
[Resource Topic] 2022/763: SoK: Assumptions Underlying Cryptocurrency Deanonymizations -- A Taxonomy for Scientific Experts and Legal Practitioners
|
|
0
|
109
|
July 31, 2022
|
[Resource Topic] 2022/755: Low-latency Hardware Architecture for VDF Evaluation in Class Groups
|
|
0
|
126
|
July 31, 2022
|
[Resource Topic] 2022/735: Multiparty Private Set Intersection Cardinality and Its Applications
|
|
0
|
107
|
July 31, 2022
|
[Resource Topic] 2022/709: Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem
|
|
0
|
126
|
July 31, 2022
|
[Resource Topic] 2022/708: An Estimator for the Hardness of the MQ Problem
|
|
0
|
124
|
July 31, 2022
|
[Resource Topic] 2022/632: Recovering Rainbow's Secret Key with a First-Order Fault Attack
|
|
0
|
142
|
July 31, 2022
|
[Resource Topic] 2022/630: Enforcing fine-grained constant-time policies
|
|
0
|
100
|
July 31, 2022
|
[Resource Topic] 2022/625: Byzantine Fault Tolerance from Weak Certificates
|
|
0
|
144
|
July 31, 2022
|
[Resource Topic] 2022/619: Asynchronous Dynamic Proactive Secret Sharing under Honest Majority: Refreshing Without a Consistent View on Shares
|
|
0
|
108
|
July 31, 2022
|
[Resource Topic] 2022/610: On the Differential Spectrum of a Differentially $3$-Uniform Power Function
|
|
0
|
139
|
July 31, 2022
|