|
[Resource Topic] 2025/2036: On new variants of funcCPA security and related CCA-secure constructions
|
|
0
|
7
|
November 5, 2025
|
|
[Resource Topic] 2025/2032: TrX: Encrypted Mempools in High Performance BFT Protocols
|
|
0
|
9
|
November 5, 2025
|
|
[Resource Topic] 2025/2027: Accurate BGV Parameters Selection: Accounting for Secret and Public Key Dependencies in Average-Case Analysis
|
|
0
|
3
|
November 3, 2025
|
|
[Resource Topic] 2025/2014: Multi-Splitting Forking Based Modular Security of Signatures in Multivariate Quadratic Setting
|
|
0
|
2
|
November 1, 2025
|
|
[Resource Topic] 2025/2012: Head Start: Digit Extraction in TFHE from MSB to LSB
|
|
0
|
6
|
November 1, 2025
|
|
[Resource Topic] 2025/2005: Reactive Correctness, sINDCPA-D-Security and Deterministic Evaluation for TFHE
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/2004: Re-randomization Attack on the Certificateless Encryption Scheme proposed by Guo et al
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/1999: New Security Proofs of MPC-in-the-Head Signatures in the Quantum Random Oracle Model
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/1997: Provable decryption failure security for practical lattice-based PKE
|
|
0
|
7
|
October 30, 2025
|
|
[Resource Topic] 2025/1992: Towards Optimal Concurrent-Secure Blind Schnorr Signatures
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/1988: Almost NTRU: Revisiting Noncommutativity Against Lattice Attacks
|
|
0
|
6
|
October 29, 2025
|
|
[Resource Topic] 2025/1983: SCORE: A SlotToCoeff Optimization for Real-Vector Encryption in CKKS
|
|
0
|
1
|
October 29, 2025
|
|
[Resource Topic] 2025/1973: Tight Security for BBS Signatures
|
|
0
|
6
|
October 25, 2025
|
|
[Resource Topic] 2025/1972: Formalisation of the KZG polynomial commitment schemes in EasyCrypt
|
|
0
|
4
|
October 25, 2025
|
|
[Resource Topic] 2025/1958: A Lattice-Based IND-CCA Threshold KEM from the BCHK+ Transform
|
|
0
|
4
|
October 20, 2025
|
|
[Resource Topic] 2025/1955: Aggregate Signatures Tightly Secure under Adaptive Corruptions
|
|
0
|
3
|
October 20, 2025
|
|
[Resource Topic] 2025/1953: Adaptively Secure Partially Non-Interactive Threshold Schnorr Signatures in the AGM
|
|
0
|
5
|
October 20, 2025
|
|
[Resource Topic] 2025/1940: GPV Preimage Sampling with Weak Smoothness and Its Applications to Lattice Signatures
|
|
0
|
6
|
October 20, 2025
|
|
[Resource Topic] 2025/1935: Fully Homomorphic Encryption for Matrix Arithmetic
|
|
0
|
7
|
October 20, 2025
|
|
[Resource Topic] 2025/1933: Revisiting Multi-Key Blind Rotation: Optimized NTRU-based Bootstrapping for MKFHE
|
|
0
|
5
|
October 20, 2025
|
|
[Resource Topic] 2025/1908: MPCitH Signature from Restricted Syndrome Decoding
|
|
0
|
2
|
October 17, 2025
|
|
[Resource Topic] 2025/1907: Introducing GRAFHEN: GRoup-bAsed Fully Homomorphic Encryption without Noise
|
|
0
|
10
|
October 17, 2025
|
|
[Resource Topic] 2025/1900: Beholder Signatures
|
|
0
|
3
|
October 13, 2025
|
|
[Resource Topic] 2025/1892: Optimizing FHEW-Like Homomorphic Encryption Schemes with Smooth Performance-Failure Trade-Offs
|
|
0
|
5
|
October 12, 2025
|
|
[Resource Topic] 2025/1886: Blind Signatures from Arguments of Inequality
|
|
0
|
0
|
October 11, 2025
|
|
[Resource Topic] 2025/1883: On the security of two blind signatures from code equivalence problems
|
|
0
|
8
|
October 11, 2025
|
|
[Resource Topic] 2025/1879: A Minrank-based Encryption Scheme à la Alekhnovich-Regev
|
|
0
|
6
|
October 11, 2025
|
|
[Resource Topic] 2025/1878: MIRANDA: short signatures from a leakage-free full-domain-hash scheme
|
|
0
|
6
|
October 11, 2025
|
|
[Resource Topic] 2025/1862: CuKEM: A Concise and Unified Hybrid Key Encapsulation Mechanism
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1861: FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism
|
|
0
|
4
|
October 8, 2025
|