[Resource Topic] 2023/377: FuLeeca: A Lee-based Signature Scheme
|
|
0
|
12
|
March 16, 2023
|
[Resource Topic] 2023/376: Efficient computation of $(3^n,3^n)$-isogenies
|
|
0
|
9
|
March 16, 2023
|
[Resource Topic] 2023/370: Publicly-Verifiable Deletion via Target-Collapsing Functions
|
|
0
|
11
|
March 16, 2023
|
[Resource Topic] 2023/366: Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications
|
|
0
|
11
|
March 16, 2023
|
[Resource Topic] 2023/358: Efficient Code Based Cryptosystem with Dual Inverse Matrix
|
|
0
|
9
|
March 16, 2023
|
[Resource Topic] 2023/349: AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios
|
|
0
|
7
|
March 15, 2023
|
[Resource Topic] 2023/343: A Map of Witness Maps: New Definitions and Connections
|
|
0
|
15
|
March 8, 2023
|
[Resource Topic] 2023/336: A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption
|
|
0
|
16
|
March 8, 2023
|
[Resource Topic] 2023/332: Asymmetric Group Message Franking: Definitions & Constructions
|
|
0
|
22
|
March 8, 2023
|
[Resource Topic] 2023/325: Revocable Cryptography from Learning with Errors
|
|
0
|
20
|
March 6, 2023
|
[Resource Topic] 2023/318: A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography
|
|
0
|
18
|
March 3, 2023
|
[Resource Topic] 2023/314: Memory-Tight Multi-Challenge Security of Public-Key Encryption
|
|
0
|
15
|
March 3, 2023
|
[Resource Topic] 2023/301: On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption
|
|
0
|
15
|
March 1, 2023
|
[Resource Topic] 2023/298: Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA
|
|
0
|
21
|
February 28, 2023
|
[Resource Topic] 2023/292: A Formal Treatment of Distributed Key Generation, and New Constructions
|
|
0
|
18
|
February 27, 2023
|
[Resource Topic] 2023/276: Threshold and Multi-Signature Schemes from Linear Hash Functions
|
|
0
|
17
|
February 27, 2023
|
[Resource Topic] 2023/275: Revisiting BBS Signatures
|
|
0
|
14
|
February 27, 2023
|
[Resource Topic] 2023/272: A study of KEM generalizations
|
|
0
|
15
|
February 27, 2023
|
[Resource Topic] 2023/271: Swoosh: Practical Lattice-Based Non-Interactive Key Exchange
|
|
0
|
17
|
February 27, 2023
|
[Resource Topic] 2023/269: Simple Two-Round OT in the Explicit Isogeny Model
|
|
0
|
21
|
February 23, 2023
|
[Resource Topic] 2023/268: Verifiable Multi-Client Functional Encryption for Inner Product
|
|
0
|
17
|
February 23, 2023
|
[Resource Topic] 2023/264: Public Key Encryption with Secure Key Leasing
|
|
0
|
25
|
February 23, 2023
|
[Resource Topic] 2023/263: DualMS: Efficient Lattice-Based Two-Round Multi-Signature with Trapdoor-Free Simulation
|
|
0
|
17
|
February 23, 2023
|
[Resource Topic] 2023/256: Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin
|
|
0
|
19
|
February 22, 2023
|
[Resource Topic] 2023/249: Anamorphic Encryption, Revisited
|
|
0
|
19
|
February 22, 2023
|
[Resource Topic] 2023/248: Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging
|
|
0
|
18
|
February 21, 2023
|
[Resource Topic] 2023/246: Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium
|
|
0
|
20
|
February 21, 2023
|
[Resource Topic] 2023/245: A Detailed Analysis of Fiat-Shamir with Aborts
|
|
0
|
22
|
February 21, 2023
|
[Resource Topic] 2023/243: Memory-Efficient Attacks on Small LWE Keys
|
|
0
|
20
|
February 21, 2023
|
[Resource Topic] 2023/239: Improved Preimage Sampling for Lattices
|
|
0
|
13
|
February 21, 2023
|