[Resource Topic] 2025/216: Practical Circuit Privacy/Sanitization for TFHE
|
|
0
|
0
|
February 13, 2025
|
[Resource Topic] 2025/215: A note on the genus of the HAWK lattice
|
|
0
|
1
|
February 13, 2025
|
[Resource Topic] 2025/203: Ciphertext-Simulatable HE from BFV with Randomized Evaluation
|
|
0
|
1
|
February 12, 2025
|
[Resource Topic] 2025/201: Search and Verify Isogeny-Based Quantum Money with Rational Points
|
|
0
|
1
|
February 12, 2025
|
[Resource Topic] 2025/189: Experimentally studying path-finding problem between conjugates in supersingular isogeny graphs: Optimizing primes and powers to speed-up cycle finding
|
|
0
|
2
|
February 10, 2025
|
[Resource Topic] 2025/186: Computing Quaternion Embeddings and Endomorphism rings of Supersingular Oriented Elliptic curves
|
|
0
|
2
|
February 10, 2025
|
[Resource Topic] 2025/182: Deny Whatever You Want: Dual-Deniable Public-Key Encryption
|
|
0
|
2
|
February 10, 2025
|
[Resource Topic] 2025/181: Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber
|
|
0
|
1
|
February 10, 2025
|
[Resource Topic] 2025/175: Updatable Public-Key Encryption, Revisited
|
|
0
|
4
|
February 7, 2025
|
[Resource Topic] 2025/164: Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions
|
|
0
|
1
|
February 5, 2025
|
[Resource Topic] 2025/161: Secure Showing of Partial Attributes
|
|
0
|
0
|
February 5, 2025
|
[Resource Topic] 2025/155: Cycles and Cuts in Supersingular L-Isogeny Graphs
|
|
0
|
3
|
February 1, 2025
|
[Resource Topic] 2025/153: Error floor prediction with Markov models for QC-MDPC codes
|
|
0
|
0
|
February 1, 2025
|
[Resource Topic] 2025/147: Efficient algorithms for the detection of $(N,N)$-splittings and endomorphisms
|
|
0
|
0
|
January 31, 2025
|
[Resource Topic] 2025/138: Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM
|
|
0
|
0
|
January 28, 2025
|
[Resource Topic] 2025/136: Isogeny-based Cryptography using Isomorphisms of Superspecial Abelian Surfaces
|
|
0
|
2
|
January 28, 2025
|
[Resource Topic] 2025/131: On the Anonymity of Linkable Ring Signatures
|
|
0
|
2
|
January 28, 2025
|
[Resource Topic] 2025/127: A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures
|
|
0
|
4
|
January 28, 2025
|
[Resource Topic] 2025/117: Post-Quantum Online/Offline Signatures
|
|
0
|
2
|
January 27, 2025
|
[Resource Topic] 2025/115: Signatures with Tight Adaptive Corruptions from Search Assumptions
|
|
0
|
0
|
January 25, 2025
|
[Resource Topic] 2025/114: Better Codes for the HQC Cryptosystem
|
|
0
|
0
|
January 24, 2025
|
[Resource Topic] 2025/113: Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head
|
|
0
|
1
|
January 24, 2025
|
[Resource Topic] 2025/107: dCTIDH: Fast & Deterministic CTIDH
|
|
0
|
3
|
January 23, 2025
|
[Resource Topic] 2025/106: NTRU+Sign: Compact NTRU-Based Signatures Using Bimodal Distributions
|
|
0
|
0
|
January 23, 2025
|
[Resource Topic] 2025/099: Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus
|
|
0
|
1
|
January 22, 2025
|
[Resource Topic] 2025/085: Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements
|
|
0
|
2
|
January 22, 2025
|
[Resource Topic] 2025/081: Integer Commitments, Old and New Tools
|
|
0
|
2
|
January 21, 2025
|
[Resource Topic] 2025/071: The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption
|
|
0
|
0
|
January 17, 2025
|
[Resource Topic] 2025/066: Efficient Homomorphic Integer Computer from CKKS
|
|
0
|
0
|
January 17, 2025
|
[Resource Topic] 2025/063: PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems
|
|
0
|
0
|
January 17, 2025
|