[Resource Topic] 2025/1396: A Generalized Wiener-type Attack Against a Family RSA-like Cryptosystem
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1391: Inverse Discrete Logarithm - Post-Quantum take on a classical problem
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1384: Silent Threshold Encryption with One-Shot Adaptive Security
|
|
0
|
1
|
July 31, 2025
|
[Resource Topic] 2025/1382: Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1376: On Hull Attacks on the Module Lattice Isomorphism Problem
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1364: A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications
|
|
0
|
1
|
July 25, 2025
|
[Resource Topic] 2025/1356: Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption
|
|
0
|
0
|
July 25, 2025
|
[Resource Topic] 2025/1350: Rhyme: A Fiat-Shamir Lattice-based Signature with 3C Sampling
|
|
0
|
0
|
July 25, 2025
|
[Resource Topic] 2025/1336: Representations of Elementary Vectors in VOLE-in-the-head-based Schemes
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1335: A Compact Post-quantum Strong Designated Verifier Signature Scheme from Isogenies
|
|
0
|
2
|
July 22, 2025
|
[Resource Topic] 2025/1334: On the use of ECDSA with hierarchical public key delegation in identity-based scenarios
|
|
0
|
1
|
July 22, 2025
|
[Resource Topic] 2025/1333: Policy-Based Redactable Set Signatures
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1304: Cascader: A Recurrence-Based Key Exchange Protocol
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1298: OverModRaise: Reducing Modulus Consumption of CKKS Bootstrapping
|
|
0
|
2
|
July 16, 2025
|
[Resource Topic] 2025/1295: The computational refined Humbert invariant problem is equivalent to the computational isogeny problem
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1288: New Proof for Plain OAEP: Post-Quantum Security without Parameter Restrictions or Collision-Resistance
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1279: Multi-Authority Registered Attribute-Based Encryption
|
|
0
|
2
|
July 14, 2025
|
[Resource Topic] 2025/1277: Scalable Accountable Byzantine Agreement and Beyond
|
|
0
|
5
|
July 12, 2025
|
[Resource Topic] 2025/1255: Efficient Full Domain Functional Bootstrapping from Recursive LUT Decomposition
|
|
0
|
2
|
July 11, 2025
|
[Resource Topic] 2025/1243: Improving special cases of the computational isogeny problem
|
|
0
|
0
|
July 11, 2025
|
[Resource Topic] 2025/1241: Public Key Linting for ML-KEM and ML-DSA
|
|
0
|
3
|
July 11, 2025
|
[Resource Topic] 2025/1225: Lattice EPID with Efficient Revocation
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1219: Foundations of Single-Decryptor Encryption
|
|
0
|
4
|
July 7, 2025
|
[Resource Topic] 2025/1213: Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1195: On symbolic computations and Post Quantum Cryptography with Lie Geometries
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1193: Non-Homomorphic Key Blinding from Symmetric Primitives
|
|
0
|
3
|
June 27, 2025
|
[Resource Topic] 2025/1191: A Polynomial Public-Key Cryptosystem Based on Jacobian-Preserving Composition
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1174: Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments
|
|
0
|
2
|
June 23, 2025
|
[Resource Topic] 2025/1151: Faster signature verification with 3-dimensional decomposition
|
|
0
|
0
|
June 20, 2025
|
[Resource Topic] 2025/1149: An Efficient Encryption Scheme Based on $(U+V, U+W)$ Codes
|
|
0
|
1
|
June 20, 2025
|