[Resource Topic] 2025/071: The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption
|
|
0
|
0
|
January 17, 2025
|
[Resource Topic] 2025/066: Efficient Homomorphic Integer Computer from CKKS
|
|
0
|
0
|
January 17, 2025
|
[Resource Topic] 2025/063: PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems
|
|
0
|
0
|
January 17, 2025
|
[Resource Topic] 2025/062: Treating dishonest ciphertexts in post-quantum KEMs -- explicit vs. implicit rejection in the FO transform
|
|
0
|
0
|
January 16, 2025
|
[Resource Topic] 2025/055: Hash-Based Multi-Signatures for Post-Quantum Ethereum
|
|
0
|
3
|
January 14, 2025
|
[Resource Topic] 2025/051: Black-Box Registered ABE from Lattices
|
|
0
|
0
|
January 14, 2025
|
[Resource Topic] 2025/044: Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/022: Leveled Functional Bootstrapping via External Product Tree
|
|
0
|
0
|
January 7, 2025
|
[Resource Topic] 2025/017: New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version)
|
|
0
|
1
|
January 6, 2025
|
[Resource Topic] 2025/007: Non Linearizable Entropic Operator
|
|
0
|
0
|
January 3, 2025
|
[Resource Topic] 2025/001: Attribute Based Encryption for Turing Machines from Lattices
|
|
0
|
0
|
January 1, 2025
|
[Resource Topic] 2024/2087: Post-Quantum Privacy for Traceable Receipt-Free Encryption
|
|
0
|
1
|
December 30, 2024
|
[Resource Topic] 2024/2078: Strongly Secure Universal Thresholdizer
|
|
0
|
0
|
December 27, 2024
|
[Resource Topic] 2024/2077: Report on evaluation of KpqC Round-2 candidates
|
|
0
|
1
|
December 27, 2024
|
[Resource Topic] 2024/2076: Blind Signatures from Proofs of Inequality
|
|
0
|
1
|
December 26, 2024
|
[Resource Topic] 2024/2075: Tightly-Secure Blind Signatures in Pairing-Free Groups
|
|
0
|
2
|
December 26, 2024
|
[Resource Topic] 2024/2074: EQSIGN: Practical Digital Signatures from the Non-Abelian Hidden Subgroup Problem and Information Theoretic Equivocation
|
|
0
|
0
|
December 26, 2024
|
[Resource Topic] 2024/2065: Partial Exposure Attacks Against a Family of RSA-like Cryptosystems
|
|
0
|
0
|
December 24, 2024
|
[Resource Topic] 2024/2058: Learning with Errors from Nonassociative Algebras
|
|
0
|
2
|
December 22, 2024
|
[Resource Topic] 2024/2052: Improved Rejection Sampling for Compact Lattice Signatures
|
|
0
|
2
|
December 19, 2024
|
[Resource Topic] 2024/2032: Carousel: Fully Homomorphic Encryption from Slot Blind Rotation Technique
|
|
0
|
1
|
December 17, 2024
|
[Resource Topic] 2024/2026: Orbweaver: Succinct Linear Functional Commitments from Lattices
|
|
0
|
1
|
December 15, 2024
|
[Resource Topic] 2024/2018: On the BUFF Security of ECDSA with Key Recovery
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2014: On the Traceability of Group Signatures: Uncorrupted User Must Exist
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2004: Regev's attack on hyperelliptic cryptosystems
|
|
0
|
2
|
December 12, 2024
|
[Resource Topic] 2024/2000: Evasive LWE Assumptions: Definitions, Classes, and Counterexamples
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1999: Multivariate Encryptions with LL’ perturbations - Is it possible to repair HFE in encryption? -
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1993: BOIL: Proof-Carrying Data from Accumulation of Correlated Holographic IOPs
|
|
0
|
1
|
December 12, 2024
|
[Resource Topic] 2024/1983: UTRA: Universe Token Reusability Attack and Verifiable Delegatable Order-Revealing Encryption
|
|
0
|
2
|
December 12, 2024
|
[Resource Topic] 2024/1979: On the Security of LWE-based KEMs under Various Distributions: A Case Study of Kyber
|
|
0
|
0
|
December 12, 2024
|