[Resource Topic] 2024/486: Anamorphic Encryption: New Constructions and Homomorphic Realizations
|
|
0
|
21
|
March 26, 2024
|
[Resource Topic] 2024/473: Extremely Simple Fail-Stop ECDSA Signatures
|
|
0
|
19
|
March 22, 2024
|
[Resource Topic] 2024/471: Knot-based Key Exchange protocol
|
|
0
|
19
|
March 22, 2024
|
[Resource Topic] 2024/466: Arctic: Lightweight and Stateless Threshold Schnorr Signatures
|
|
0
|
23
|
March 22, 2024
|
[Resource Topic] 2024/449: Practical Lattice-Based Distributed Signatures for a Small Number of Signers
|
|
0
|
29
|
March 18, 2024
|
[Resource Topic] 2024/445: Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions
|
|
0
|
23
|
March 15, 2024
|
[Resource Topic] 2024/437: Insecurity of MuSig and BN Multi-Signatures with Delayed Message Selection
|
|
0
|
20
|
March 15, 2024
|
[Resource Topic] 2024/435: Unbiasable Verifiable Random Functions
|
|
0
|
25
|
March 15, 2024
|
[Resource Topic] 2024/417: An improved exact CRR basis conversion algorithm for FHE without floating-point arithmetic
|
|
0
|
19
|
March 11, 2024
|
[Resource Topic] 2024/411: Polytopes in the Fiat-Shamir with Aborts Paradigm
|
|
0
|
26
|
March 8, 2024
|
[Resource Topic] 2024/401: Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
|
|
0
|
35
|
March 8, 2024
|
[Resource Topic] 2024/400: SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks
|
|
0
|
28
|
March 5, 2024
|
[Resource Topic] 2024/397: Exponent-VRFs and Their Applications
|
|
0
|
26
|
March 5, 2024
|
[Resource Topic] 2024/394: A Deniably Authenticated Searchable Public Key Encryption Scheme in Mobile Electronic Mail System
|
|
0
|
27
|
March 5, 2024
|
[Resource Topic] 2024/388: Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding
|
|
0
|
28
|
March 4, 2024
|
[Resource Topic] 2024/385: A New Public Key Cryptosystem Based on the Cubic Pell Curve
|
|
0
|
30
|
March 4, 2024
|
[Resource Topic] 2024/361: Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation
|
|
0
|
24
|
March 1, 2024
|
[Resource Topic] 2024/359: Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique
|
|
0
|
22
|
March 1, 2024
|
[Resource Topic] 2024/329: How to Validate a Verification?
|
|
0
|
28
|
February 27, 2024
|
[Resource Topic] 2024/328: Attribute-Based Signatures with Advanced Delegation, and Tracing
|
|
0
|
26
|
February 27, 2024
|
[Resource Topic] 2024/327: Registered Functional Encryptions from Pairings
|
|
0
|
22
|
February 27, 2024
|
[Resource Topic] 2024/313: The Complexity of Algebraic Algorithms for LWE
|
|
0
|
17
|
February 26, 2024
|
[Resource Topic] 2024/312: Trapdoor Memory-Hard Functions
|
|
0
|
21
|
February 26, 2024
|
[Resource Topic] 2024/311: Aggregating Falcon Signatures with LaBRADOR
|
|
0
|
25
|
February 26, 2024
|
[Resource Topic] 2024/293: Registered Attribute-Based Signature
|
|
0
|
27
|
February 23, 2024
|
[Resource Topic] 2024/263: Threshold Encryption with Silent Setup
|
|
0
|
30
|
February 19, 2024
|
[Resource Topic] 2024/241: Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings
|
|
0
|
22
|
February 16, 2024
|
[Resource Topic] 2024/239: Simulation-Secure Threshold PKE from Standard (Ring-)LWE
|
|
0
|
31
|
February 16, 2024
|
[Resource Topic] 2024/226: Attribute-based Keyed (Fully) Homomorphic Encryption
|
|
0
|
20
|
February 16, 2024
|
[Resource Topic] 2024/214: Distributed Fiat-Shamir Transform
|
|
0
|
20
|
February 16, 2024
|