|
[Resource Topic] 2025/2107: Quantum-safe Identity-binding Password Authenticated Key Exchange Protocols
|
|
0
|
5
|
November 17, 2025
|
|
[Resource Topic] 2025/2105: A Lattice-Based Puncturable Attribute-Based Proxy Re-Encryption with HRA Security and Switchable Tags for Cloud Data Sharing
|
|
0
|
5
|
November 17, 2025
|
|
[Resource Topic] 2025/2103: Threshold Batched Identity-Based Encryption from Pairings in the Plain Model
|
|
0
|
3
|
November 17, 2025
|
|
[Resource Topic] 2025/2093: Lore: An LWE-based Key Encapsulation Mechanism with Variable Modulus and CRT Compression
|
|
0
|
4
|
November 14, 2025
|
|
[Resource Topic] 2025/2076: Non-Interactive Blind Signatures from RSA Assumption and More
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2069: Shorter Hash-Based Signatures Using Forced Pruning
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2061: Multivariate Signatures with Polynomial Factorization
|
|
0
|
1
|
November 9, 2025
|
|
[Resource Topic] 2025/2059: Compact, Efficient and Non-Separable Hybrid Signatures
|
|
0
|
4
|
November 9, 2025
|
|
[Resource Topic] 2025/2052: SoK: Systematizing Hybrid Strategies for the Transition to Post-Quantum Cryptography
|
|
0
|
8
|
November 9, 2025
|
|
[Resource Topic] 2025/2036: On new variants of funcCPA security and related CCA-secure constructions
|
|
0
|
7
|
November 5, 2025
|
|
[Resource Topic] 2025/2032: TrX: Encrypted Mempools in High Performance BFT Protocols
|
|
0
|
10
|
November 5, 2025
|
|
[Resource Topic] 2025/2027: Accurate BGV Parameters Selection: Accounting for Secret and Public Key Dependencies in Average-Case Analysis
|
|
0
|
3
|
November 3, 2025
|
|
[Resource Topic] 2025/2014: Multi-Splitting Forking Based Modular Security of Signatures in Multivariate Quadratic Setting
|
|
0
|
2
|
November 1, 2025
|
|
[Resource Topic] 2025/2012: Head Start: Digit Extraction in TFHE from MSB to LSB
|
|
0
|
7
|
November 1, 2025
|
|
[Resource Topic] 2025/2005: Reactive Correctness, sINDCPA-D-Security and Deterministic Evaluation for TFHE
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/2004: Re-randomization Attack on the Certificateless Encryption Scheme proposed by Guo et al
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/1999: New Security Proofs of MPC-in-the-Head Signatures in the Quantum Random Oracle Model
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/1997: Provable decryption failure security for practical lattice-based PKE
|
|
0
|
7
|
October 30, 2025
|
|
[Resource Topic] 2025/1992: Towards Optimal Concurrent-Secure Blind Schnorr Signatures
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/1988: Almost NTRU: Revisiting Noncommutativity Against Lattice Attacks
|
|
0
|
6
|
October 29, 2025
|
|
[Resource Topic] 2025/1983: SCORE: A SlotToCoeff Optimization for Real-Vector Encryption in CKKS
|
|
0
|
1
|
October 29, 2025
|
|
[Resource Topic] 2025/1973: Tight Security for BBS Signatures
|
|
0
|
6
|
October 25, 2025
|
|
[Resource Topic] 2025/1972: Formalisation of the KZG polynomial commitment schemes in EasyCrypt
|
|
0
|
5
|
October 25, 2025
|
|
[Resource Topic] 2025/1958: A Lattice-Based IND-CCA Threshold KEM from the BCHK+ Transform
|
|
0
|
9
|
October 20, 2025
|
|
[Resource Topic] 2025/1955: Aggregate Signatures Tightly Secure under Adaptive Corruptions
|
|
0
|
4
|
October 20, 2025
|
|
[Resource Topic] 2025/1953: Adaptively Secure Partially Non-Interactive Threshold Schnorr Signatures in the AGM
|
|
0
|
8
|
October 20, 2025
|
|
[Resource Topic] 2025/1940: GPV Preimage Sampling with Weak Smoothness and Its Applications to Lattice Signatures
|
|
0
|
10
|
October 20, 2025
|
|
[Resource Topic] 2025/1935: Fully Homomorphic Encryption for Matrix Arithmetic
|
|
0
|
8
|
October 20, 2025
|
|
[Resource Topic] 2025/1933: Revisiting Multi-Key Blind Rotation: Optimized NTRU-based Bootstrapping for MKFHE
|
|
0
|
7
|
October 20, 2025
|
|
[Resource Topic] 2025/1908: MPCitH Signature from Restricted Syndrome Decoding
|
|
0
|
2
|
October 17, 2025
|