|
[Resource Topic] 2025/1859: qt-Pegasis: Simpler and Faster Effective Class Group Actions
|
|
0
|
2
|
October 8, 2025
|
|
[Resource Topic] 2025/1853: Compact, Efficient and CCA-Secure Updatable Encryption from Isogenies
|
|
0
|
5
|
October 8, 2025
|
|
[Resource Topic] 2025/1844: Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1843: Efficiency Improvements for Signal's Handshake Protocol
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1842: Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption
|
|
0
|
0
|
October 8, 2025
|
|
[Resource Topic] 2025/1833: Public-Key Encryption from the MinRank Problem
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1822: Solving one-sided linear systems over symmetrized and supertropical semirings
|
|
0
|
1
|
October 8, 2025
|
|
[Resource Topic] 2025/1819: New Straight-Line Extractable NIZKPs for Cryptographic Group Actions
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1807: Traceable Ring Signatures Revisited: Extended Definitions, $O(1)$ Tracing, and Efficient Log-Size Constructions
|
|
0
|
3
|
October 8, 2025
|
|
[Resource Topic] 2025/1798: Threshold Blind Signatures from CDH
|
|
0
|
4
|
October 8, 2025
|
|
[Resource Topic] 2025/1778: Unified Approach to UOV-like Multivariate Signature Schemes
|
|
0
|
2
|
October 3, 2025
|
|
[Resource Topic] 2025/1771: Batched & Non-interactive Blind Signatures from Lattices
|
|
0
|
5
|
October 3, 2025
|
|
[Resource Topic] 2025/1761: Automated Proof for Quadratic Functional Encryption: Finding Attacks and New Constructions
|
|
0
|
1
|
September 29, 2025
|
|
[Resource Topic] 2025/1758: Revisiting PQ WireGuard: A Comprehensive Security Analysis With a New Design Using Reinforced KEMs
|
|
0
|
7
|
September 26, 2025
|
|
[Resource Topic] 2025/1753: Bootstrapping over Free $\mathcal{R}$-Module
|
|
0
|
5
|
September 26, 2025
|
|
[Resource Topic] 2025/1751: On the Existence and Construction of Very Strong Elliptic Curves
|
|
0
|
4
|
September 25, 2025
|
|
[Resource Topic] 2025/1750: Modeling Emails: On the Deniability of BCCs
|
|
0
|
2
|
September 25, 2025
|
|
[Resource Topic] 2025/1749: Sandwich BUFF: Achieving Non-Resignability Using Iterative Hash Functions
|
|
0
|
4
|
September 25, 2025
|
|
[Resource Topic] 2025/1742: Broadcast Encryption with Size N^1/3 and More from k-Lin
|
|
0
|
1
|
September 25, 2025
|
|
[Resource Topic] 2025/1740: Improved Radix-based Approximate Homomorphic Encryption for Large Integers via Lightweight Bootstrapped Digit Carry
|
|
0
|
2
|
September 24, 2025
|
|
[Resource Topic] 2025/1739: Attacking an RSA-like Cryptosystem Using Continued Fractions and Lattices
|
|
0
|
4
|
September 24, 2025
|
|
[Resource Topic] 2025/1737: WaterSQI and PRISMO: Quaternion Signatures for Supersingular Isogeny Group Actions
|
|
0
|
5
|
September 24, 2025
|
|
[Resource Topic] 2025/1717: Large-Plaintext Functional Bootstrapping in FHE with Small Bootstrapping Keys
|
|
0
|
1
|
September 22, 2025
|
|
[Resource Topic] 2025/1711: Accelerating FHEW-like Bootstrapping via New Configurations of the Underlying Cryptosystems
|
|
0
|
2
|
September 21, 2025
|
|
[Resource Topic] 2025/1703: Updatable Signature from Lattices
|
|
0
|
4
|
September 20, 2025
|
|
[Resource Topic] 2025/1702: Lattice-Based Group Signatures in the Standard Model, Revisited
|
|
0
|
4
|
September 19, 2025
|
|
[Resource Topic] 2025/1691: Pilvi: Lattice Threshold PKE with Small Decryption Shares and Improved Security
|
|
0
|
5
|
September 18, 2025
|
|
[Resource Topic] 2025/1665: Threshold Public-Key Encryption: Definitions, Relations and Constructions
|
|
0
|
5
|
September 17, 2025
|
|
[Resource Topic] 2025/1661: A Note on the Goppa Code Distinguishing Problem
|
|
0
|
2
|
September 17, 2025
|
|
[Resource Topic] 2025/1656: Forgetful Encryption
|
|
0
|
5
|
September 17, 2025
|