[Resource Topic] 2022/763: SoK: Assumptions Underlying Cryptocurrency Deanonymizations -- A Taxonomy for Scientific Experts and Legal Practitioners
|
|
0
|
175
|
July 31, 2022
|
[Resource Topic] 2022/755: Low-latency Hardware Architecture for VDF Evaluation in Class Groups
|
|
0
|
202
|
July 31, 2022
|
[Resource Topic] 2022/735: Multiparty Private Set Intersection Cardinality and Its Applications
|
|
0
|
162
|
July 31, 2022
|
[Resource Topic] 2022/709: Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem
|
|
0
|
191
|
July 31, 2022
|
[Resource Topic] 2022/708: An Estimator for the Hardness of the MQ Problem
|
|
0
|
190
|
July 31, 2022
|
[Resource Topic] 2022/632: Recovering Rainbow's Secret Key with a First-Order Fault Attack
|
|
0
|
229
|
July 31, 2022
|
[Resource Topic] 2022/630: Enforcing fine-grained constant-time policies
|
|
0
|
159
|
July 31, 2022
|
[Resource Topic] 2022/625: Byzantine Fault Tolerance from Weak Certificates
|
|
0
|
239
|
July 31, 2022
|
[Resource Topic] 2022/619: Asynchronous Dynamic Proactive Secret Sharing under Honest Majority: Refreshing Without a Consistent View on Shares
|
|
0
|
152
|
July 31, 2022
|
[Resource Topic] 2022/610: On the Differential Spectrum of a Differentially $3$-Uniform Power Function
|
|
0
|
207
|
July 31, 2022
|
[Resource Topic] 2022/602: Real-Time Frequency Detection to Synchronize Fault Injection on System-on-Chip
|
|
0
|
131
|
July 31, 2022
|
[Resource Topic] 2022/600: A Nearly Tight Proof of Duc et al.'s Conjectured Security Bound for Masked Implementations
|
|
0
|
180
|
July 31, 2022
|
[Resource Topic] 2022/594: A CONCRETE approach to torus fully homomorphic encryption
|
|
0
|
197
|
July 31, 2022
|
[Resource Topic] 2022/589: Unnecessary Input Heuristics & PayJoin Transactions
|
|
0
|
182
|
July 31, 2022
|
[Resource Topic] 2022/584: Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups
|
|
0
|
203
|
July 31, 2022
|
[Resource Topic] 2022/554: Byzantine Reliable Broadcast with $O(nL+kn+n^2 log n)$ Communication
|
|
0
|
166
|
July 31, 2022
|
[Resource Topic] 2022/551: Marlin: Two-Phase BFT with Linearity
|
|
0
|
183
|
July 31, 2022
|
[Resource Topic] 2022/547: Fast signing method in RSA with high speed verification
|
|
0
|
182
|
July 31, 2022
|
[Resource Topic] 2022/545: Logic Locking - Connecting Theory and Practice
|
|
0
|
172
|
July 31, 2022
|
[Resource Topic] 2022/540: On the revision of NIST 800-22 Test Suites
|
|
0
|
200
|
July 31, 2022
|
[Resource Topic] 2022/520: Efficient Verification of the Wesolowski Verifiable Delay Function for Distributed Environments
|
|
0
|
115
|
July 31, 2022
|
[Resource Topic] 2022/491: Multi-Party Computation in the GDPR
|
|
0
|
187
|
July 31, 2022
|
[Resource Topic] 2022/485: Two new classes of permutation trinomials over $\mathbb{F}_{q^3}$ with odd characteristic
|
|
0
|
153
|
July 31, 2022
|
[Resource Topic] 2022/474: Side-Channel Analysis of Lattice-Based Post-Quantum Cryptography: Exploiting Polynomial Multiplication
|
|
0
|
172
|
July 31, 2022
|
[Resource Topic] 2022/457: Improving Differential-Neural Distinguisher Model For DES, Chaskey and PRESENT
|
|
0
|
129
|
July 31, 2022
|
[Resource Topic] 2022/427: Constant Size Secret Sharing: with General Thresholds, Towards Standard Assumptions, and Applications
|
|
0
|
155
|
July 31, 2022
|
[Resource Topic] 2022/426: Spectre Declassified: Reading from the Right Place at the Wrong Time
|
|
0
|
180
|
July 31, 2022
|
[Resource Topic] 2022/409: Proof-of-Stake Is a Defective Mechanism
|
|
0
|
184
|
July 31, 2022
|
[Resource Topic] 2022/402: Improved Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
|
|
0
|
127
|
July 31, 2022
|
[Resource Topic] 2022/400: Quantum Advantage from Any Non-Local Game
|
|
0
|
139
|
July 31, 2022
|