[Resource Topic] 2025/730: Tetris! Traceable Extendable Threshold Ring Signatures and More
|
|
0
|
0
|
April 24, 2025
|
[Resource Topic] 2025/720: Towards Lightweight CKKS: On Client Cost Efficiency
|
|
0
|
0
|
April 23, 2025
|
[Resource Topic] 2025/708: Strong keys for tensor isomorphism cryptography
|
|
0
|
1
|
April 19, 2025
|
[Resource Topic] 2025/704: Reducing Honest Re-Encryption Attack to Chosen Ciphertext Attack
|
|
0
|
2
|
April 18, 2025
|
[Resource Topic] 2025/700: Fherret: Proof of FHE Correct-and-Honest Evaluation with Circuit Privacy from MPCitH
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/696: Faster amortized bootstrapping using the incomplete NTT for free
|
|
0
|
1
|
April 17, 2025
|
[Resource Topic] 2025/691: Let us walk on the 3-isogeny graph: efficient, fast, and simple
|
|
0
|
2
|
April 16, 2025
|
[Resource Topic] 2025/686: Fast amortized bootstrapping with small keys and polynomial noise overhead
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/669: SoK: FHE-Friendly Symmetric Ciphers and Transciphering
|
|
0
|
3
|
April 15, 2025
|
[Resource Topic] 2025/663: Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters
|
|
0
|
1
|
April 13, 2025
|
[Resource Topic] 2025/659: Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions
|
|
0
|
0
|
April 13, 2025
|
[Resource Topic] 2025/656: Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWE-Based Optimization
|
|
0
|
1
|
April 13, 2025
|
[Resource Topic] 2025/651: Low-Latency Bootstrapping for CKKS using Roots of Unity
|
|
0
|
1
|
April 13, 2025
|
[Resource Topic] 2025/648: HQC Beyond the BSC: Towards Error Structure-Aware Decoding
|
|
0
|
0
|
April 13, 2025
|
[Resource Topic] 2025/638: Round-Efficient Adaptively Secure Threshold Signatures with Rewinding
|
|
0
|
0
|
April 12, 2025
|
[Resource Topic] 2025/627: Everlasting Fully Dynamic Group Signatures
|
|
0
|
1
|
April 11, 2025
|
[Resource Topic] 2025/624: Trapdoor one-way functions from tensors
|
|
0
|
0
|
April 11, 2025
|
[Resource Topic] 2025/612: More NTRU+Sign Signatures from Cyclotomic Trinomials
|
|
0
|
0
|
April 8, 2025
|
[Resource Topic] 2025/606: An attack on ML-DSA using an implicit hint
|
|
0
|
7
|
April 8, 2025
|
[Resource Topic] 2025/602: Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More
|
|
0
|
1
|
April 4, 2025
|
[Resource Topic] 2025/586: Heuristic Algorithm for Solving Restricted SVP and its Applications
|
|
0
|
3
|
April 2, 2025
|
[Resource Topic] 2025/585: Adaptively-Secure Big-Key Identity-Based Encryption
|
|
0
|
1
|
April 2, 2025
|
[Resource Topic] 2025/580: Efficient Revocable Identity-Based Encryption from Middle-Product LWE
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/530: Lattice-based extended withdrawable signatures
|
|
0
|
0
|
March 23, 2025
|
[Resource Topic] 2025/521: Division polynomials for arbitrary isogenies
|
|
0
|
1
|
March 21, 2025
|
[Resource Topic] 2025/509: Almost Optimal KP and CP-ABE for Circuits from Succinct LWE
|
|
0
|
0
|
March 20, 2025
|
[Resource Topic] 2025/502: Registration-Based Encryption in the Plain Model
|
|
0
|
3
|
March 19, 2025
|
[Resource Topic] 2025/493: Tighter Concrete Security for the Simplest OT
|
|
0
|
1
|
March 17, 2025
|
[Resource Topic] 2025/488: Exploring General Cyclotomic Rings in Torus-Based Fully Homomorphic Encryption: Part I - Prime Power Instances
|
|
0
|
1
|
March 17, 2025
|
[Resource Topic] 2025/485: Key reconstruction for QC-MDPC McEliece from imperfect distance spectrum
|
|
0
|
0
|
March 17, 2025
|