[Resource Topic] 2025/1471: NTWR Prime - redundant security based on NTRU Prime and LWR problems
|
|
0
|
0
|
August 14, 2025
|
[Resource Topic] 2025/1467: Optimized HPPK Cryptography for Post-Quantum Security
|
|
0
|
3
|
August 13, 2025
|
[Resource Topic] 2025/1466: Revisiting Adaptively Secure IBE from Lattices with Smaller Modulus: A Conceptually Simple Framework with Low Overhead
|
|
0
|
4
|
August 13, 2025
|
[Resource Topic] 2025/1458: INKE: Fast Isogeny-Based PKE using Intermediate Curves
|
|
0
|
3
|
August 13, 2025
|
[Resource Topic] 2025/1450: Single-round Lattice-based Multisignatures
|
|
0
|
4
|
August 12, 2025
|
[Resource Topic] 2025/1449: REFHE: Fully Homomorphic ALU
|
|
0
|
3
|
August 12, 2025
|
[Resource Topic] 2025/1440: Faster Homomorphic Integer Computer
|
|
0
|
1
|
August 8, 2025
|
[Resource Topic] 2025/1429: Public-Key Encryption and Injective Trapdoor Functions from LWE with Large Noise Rate
|
|
0
|
0
|
August 7, 2025
|
[Resource Topic] 2025/1424: LESS is Even More: Optimizing Digital Signatures from Code Equivalence
|
|
0
|
0
|
August 7, 2025
|
[Resource Topic] 2025/1423: Collusion-Safe Proxy Re-Encryption
|
|
0
|
2
|
August 7, 2025
|
[Resource Topic] 2025/1416: A Note on the Binding Properties of KEM Combiners
|
|
0
|
2
|
August 4, 2025
|
[Resource Topic] 2025/1403: Faster Bootstrapping for CKKS with Less Modulus Consumption
|
|
0
|
3
|
August 3, 2025
|
[Resource Topic] 2025/1398: General Review of Hash-Based Signatures
|
|
0
|
1
|
August 3, 2025
|
[Resource Topic] 2025/1396: A Generalized Wiener-type Attack Against a Family RSA-like Cryptosystem
|
|
0
|
2
|
August 1, 2025
|
[Resource Topic] 2025/1391: Inverse Discrete Logarithm - Post-Quantum take on a classical problem
|
|
0
|
2
|
August 1, 2025
|
[Resource Topic] 2025/1384: Silent Threshold Encryption with One-Shot Adaptive Security
|
|
0
|
9
|
July 31, 2025
|
[Resource Topic] 2025/1382: Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms
|
|
0
|
4
|
July 31, 2025
|
[Resource Topic] 2025/1376: On Hull Attacks on the Module Lattice Isomorphism Problem
|
|
0
|
1
|
July 30, 2025
|
[Resource Topic] 2025/1364: A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications
|
|
0
|
4
|
July 25, 2025
|
[Resource Topic] 2025/1356: Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption
|
|
0
|
2
|
July 25, 2025
|
[Resource Topic] 2025/1350: Rhyme: A Fiat-Shamir Lattice-based Signature with 3C Sampling
|
|
0
|
4
|
July 25, 2025
|
[Resource Topic] 2025/1336: Representations of Elementary Vectors in VOLE-in-the-head-based Schemes
|
|
0
|
1
|
July 22, 2025
|
[Resource Topic] 2025/1335: A Compact Post-quantum Strong Designated Verifier Signature Scheme from Isogenies
|
|
0
|
4
|
July 22, 2025
|
[Resource Topic] 2025/1334: On the use of ECDSA with hierarchical public key delegation in identity-based scenarios
|
|
0
|
1
|
July 22, 2025
|
[Resource Topic] 2025/1333: Policy-Based Redactable Set Signatures
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1304: Cascader: A Recurrence-Based Key Exchange Protocol
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1298: OverModRaise: Reducing Modulus Consumption of CKKS Bootstrapping
|
|
0
|
2
|
July 16, 2025
|
[Resource Topic] 2025/1295: The computational refined Humbert invariant problem is equivalent to the computational isogeny problem
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1288: New Proof for Plain OAEP: Post-Quantum Security without Parameter Restrictions or Collision-Resistance
|
|
0
|
3
|
July 16, 2025
|
[Resource Topic] 2025/1279: Multi-Authority Registered Attribute-Based Encryption
|
|
0
|
6
|
July 14, 2025
|