[Resource Topic] 2025/1193: Non-Homomorphic Key Blinding from Symmetric Primitives
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1191: A Polynomial Public-Key Cryptosystem Based on Jacobian-Preserving Composition
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1174: Efficient Constant-Size Linkable Ring Signatures for Ad-Hoc Rings via Pairing-Based Set Membership Arguments
|
|
0
|
0
|
June 23, 2025
|
[Resource Topic] 2025/1151: Faster signature verification with 3-dimensional decomposition
|
|
0
|
0
|
June 20, 2025
|
[Resource Topic] 2025/1149: An Efficient Encryption Scheme Based on $(U+V, U+W)$ Codes
|
|
0
|
0
|
June 20, 2025
|
[Resource Topic] 2025/1132: Foundations of Multi-Designated Verifier Signature: Comprehensive Formalization and New Constructions in Subset Simulation
|
|
0
|
0
|
June 17, 2025
|
[Resource Topic] 2025/1129: Lattice-based Obfuscation from NTRU and Equivocal LWE
|
|
0
|
3
|
June 17, 2025
|
[Resource Topic] 2025/1104: Better GBFV Bootstrapping and Faster Encrypted Edit Distance Computation
|
|
0
|
2
|
June 13, 2025
|
[Resource Topic] 2025/1099: Lattice-Based Accumulator and Application to Anonymous Credential Revocation
|
|
0
|
5
|
June 13, 2025
|
[Resource Topic] 2025/1098: Isogeny-based key exchange from orientations of large discriminant
|
|
0
|
4
|
June 12, 2025
|
[Resource Topic] 2025/1094: Key Updatable Identity-Based-Signature Schemes
|
|
0
|
6
|
June 12, 2025
|
[Resource Topic] 2025/1083: The complexity of the SupportMinors Modeling for the MinRank Problem
|
|
0
|
0
|
June 10, 2025
|
[Resource Topic] 2025/1061: On the Adaptive Security of FROST
|
|
0
|
10
|
June 9, 2025
|
[Resource Topic] 2025/1058: Adaptive TDF from PKE with Randomness Recoverability and Pseudorandom Ciphertext Property
|
|
0
|
5
|
June 9, 2025
|
[Resource Topic] 2025/1047: Orient Express: Using Frobenius to Express Oriented Isogenies
|
|
0
|
8
|
June 5, 2025
|
[Resource Topic] 2025/1045: Constrained Verifiable Random Functions Without Obfuscation and Friends
|
|
0
|
5
|
June 5, 2025
|
[Resource Topic] 2025/1044: When Threshold Meets Anamorphic Signatures: What is Possible and What is Not!
|
|
0
|
7
|
June 5, 2025
|
[Resource Topic] 2025/1043: Designing QC-MDPC Public Key Encryption Schemes with Niederreiter's Construction and a Bit Flipping Decoder with Bounded DFR
|
|
0
|
6
|
June 5, 2025
|
[Resource Topic] 2025/1039: Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWE
|
|
0
|
4
|
June 5, 2025
|
[Resource Topic] 2025/1036: A Critique on Average-Case Noise Analysis in RLWE-Based Homomorphic Encryption
|
|
0
|
6
|
June 5, 2025
|
[Resource Topic] 2025/1010: UPKE and UKEM Schemes from Supersingular Isogenies
|
|
0
|
4
|
June 2, 2025
|
[Resource Topic] 2025/1001: A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures
|
|
0
|
1
|
June 2, 2025
|
[Resource Topic] 2025/1000: Post-Quantum Multi-Message Public Key Encryption from Extended Reproducible PKE
|
|
0
|
5
|
June 2, 2025
|
[Resource Topic] 2025/994: A Fast Multiplication Algorithm and RLWE-PLWE Equivalence for the Maximal Real Subfield of the $2^r p^s$-th Cyclotomic Field
|
|
0
|
7
|
June 2, 2025
|
[Resource Topic] 2025/985: Tighter Quantum Security for Fiat-Shamir-with-Aborts and Hash-and-Sign-with-Retry Signatures
|
|
0
|
1
|
June 2, 2025
|
[Resource Topic] 2025/982: Simulatability SOA Does Not Imply Indistinguishability SOA in the CCA Setting
|
|
0
|
4
|
June 2, 2025
|
[Resource Topic] 2025/973: On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions
|
|
0
|
4
|
May 30, 2025
|
[Resource Topic] 2025/967: Registered Functional Encryption for Pseudorandom Functionalities from Lattices: Registered ABE for Unbounded Depth Circuits and Turing Machines, and More
|
|
0
|
5
|
May 28, 2025
|
[Resource Topic] 2025/960: A Framework for Advanced Signature Notions
|
|
0
|
5
|
May 27, 2025
|
[Resource Topic] 2025/952: A Provably Secure W-OTS$^+$ based on MQ Problem
|
|
0
|
3
|
May 26, 2025
|