[Resource Topic] 2023/360: Fast and Efficient Code-Based Digital Signature with Dual Inverse Matrix
|
|
0
|
185
|
March 16, 2023
|
[Resource Topic] 2023/354: Guessing Less and Better: Improved Attacks on GIFT-64
|
|
0
|
186
|
March 15, 2023
|
[Resource Topic] 2023/353: Searching for S-boxes with better Diffusion using Evolutionary Algorithm
|
|
0
|
218
|
March 15, 2023
|
[Resource Topic] 2023/106: Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic
|
|
1
|
225
|
March 2, 2023
|
[Resource Topic] 2023/302: Does the Dual-Sieve Attack on Learning with Errors even Work?
|
|
0
|
155
|
March 1, 2023
|
[Resource Topic] 2023/174: Improved Heuristics for Low-latency Implementations of Linear Layers
|
|
0
|
203
|
February 15, 2023
|
[Resource Topic] 2023/111: An Attack on the LILLE Stream Cipher
|
|
0
|
200
|
January 30, 2023
|
[Resource Topic] 2023/044: Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets
|
|
0
|
243
|
January 19, 2023
|
[Resource Topic] 2023/005: Secure Single-Server Fuzzy Deduplication without Interactive Proof-of-Ownership in Cloud
|
|
0
|
132
|
January 4, 2023
|
[Resource Topic] 2022/1777: Weightwise perfectly balanced functions and nonlinearity
|
|
0
|
159
|
December 31, 2022
|
[Resource Topic] 2022/1677: Quagmire ciphers and group theory: What is a Porta cipher?
|
|
0
|
179
|
December 2, 2022
|
[Resource Topic] 2022/1575: On lineariazation attack of entropic quasigroups cryptography
|
|
0
|
187
|
November 14, 2022
|
[Resource Topic] 2022/1547: A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm
|
|
0
|
253
|
November 8, 2022
|
[Resource Topic] 2022/1433: BG: A Modular Treatment of BFT Consensus
|
|
0
|
211
|
October 24, 2022
|
[Resource Topic] 2022/1228: SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization
|
|
0
|
227
|
September 16, 2022
|
[Resource Topic] 2022/1204: The Pseudorandom Oracle Model and Ideal Obfuscation
|
|
0
|
306
|
September 12, 2022
|
[Resource Topic] 2022/1201: Consistent, Efficient and Leakage-Model Free Mutual Information Estimation
|
|
0
|
205
|
September 12, 2022
|
[Resource Topic] 2022/1129: Breaking KASLR on Mobile Devices without Any Use of Cache Memory
|
|
0
|
191
|
August 31, 2022
|
[Resource Topic] 2022/132: On Defeating Graph Analysis of Anonymous Transactions
|
|
1
|
274
|
August 31, 2022
|
[Resource Topic] 2019/599: New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
|
|
1
|
399
|
August 24, 2022
|
[Resource Topic] 2021/844: A note on IND-qCCA security in the ROM and its applications: CPA security is sufficient for TLS 1.3
|
|
0
|
331
|
July 31, 2022
|
[Resource Topic] 2022/939: Multi-party Private Function Evaluation for RAM
|
|
0
|
212
|
July 31, 2022
|
[Resource Topic] 2022/927: Fit The Joint Moments
|
|
0
|
189
|
July 31, 2022
|
[Resource Topic] 2022/894: Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases
|
|
0
|
213
|
July 31, 2022
|
[Resource Topic] 2022/875: Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations
|
|
0
|
133
|
July 31, 2022
|
[Resource Topic] 2022/837: Differential Cryptanalysis in the Fixed-Key Model
|
|
0
|
253
|
July 31, 2022
|
[Resource Topic] 2022/801: Secure and Robust Key-Trapped Design-for-Security Architecture for Protecting Obfuscated Logic
|
|
0
|
187
|
July 31, 2022
|
[Resource Topic] 2022/767: A New Approach to Efficient Non-Malleable Zero-Knowledge
|
|
0
|
138
|
July 31, 2022
|
[Resource Topic] 2022/763: SoK: Assumptions Underlying Cryptocurrency Deanonymizations -- A Taxonomy for Scientific Experts and Legal Practitioners
|
|
0
|
175
|
July 31, 2022
|
[Resource Topic] 2022/755: Low-latency Hardware Architecture for VDF Evaluation in Class Groups
|
|
0
|
202
|
July 31, 2022
|