[Resource Topic] 2024/1376: FDFB$^2$: Functional Bootstrapping via Sparse Polynomial Multiplication
|
|
0
|
39
|
September 4, 2024
|
[Resource Topic] 2024/1375: ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme
|
|
0
|
37
|
September 4, 2024
|
[Resource Topic] 2024/1373: Uncompressing Dilithium's public key
|
|
0
|
49
|
September 4, 2024
|
[Resource Topic] 2024/1368: Tightly Secure Non-Interactive BLS Multi-Signatures
|
|
0
|
46
|
September 2, 2024
|
[Resource Topic] 2024/1362: A Documentation of Ethereum’s PeerDAS
|
|
0
|
51
|
August 30, 2024
|
[Resource Topic] 2024/1355: Direct Range Proofs for Paillier Cryptosystem and Their Applications
|
|
0
|
36
|
August 30, 2024
|
[Resource Topic] 2024/1353: On the overflow and $p$-adic theory applied to homomorphic encryption
|
|
0
|
38
|
August 30, 2024
|
[Resource Topic] 2024/1352: ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra
|
|
0
|
36
|
August 30, 2024
|
[Resource Topic] 2024/1327: Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond
|
|
0
|
62
|
August 26, 2024
|
[Resource Topic] 2024/1321: ECC’s Achilles’ Heel: Unveiling Weak Keys in Standardized Curves
|
|
0
|
47
|
August 26, 2024
|
[Resource Topic] 2024/1318: Patching and Extending the WWL+ Circuit Bootstrapping Method to FFT Domains
|
|
0
|
48
|
August 26, 2024
|
[Resource Topic] 2024/1313: A Lattice Attack Against a Family of RSA-like Cryptosystems
|
|
0
|
55
|
August 23, 2024
|
[Resource Topic] 2024/1311: Dynamic Threshold Key Encapsulation with a Transparent Setup
|
|
0
|
56
|
August 23, 2024
|
[Resource Topic] 2024/1306: Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure
|
|
0
|
60
|
August 23, 2024
|
[Resource Topic] 2024/1302: RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage
|
|
0
|
38
|
August 23, 2024
|
[Resource Topic] 2024/1301: Kalos: Hierarchical-auditable and Human-binding Authentication Scheme for Clinical Trial
|
|
0
|
45
|
August 23, 2024
|
[Resource Topic] 2024/1295: Identity-Based Encryption from Lattices with More Compactness in the Standard Model
|
|
0
|
52
|
August 20, 2024
|
[Resource Topic] 2024/1294: Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security
|
|
0
|
44
|
August 20, 2024
|
[Resource Topic] 2024/1292: Chosen Ciphertext Security for (Hierarchical) Identity-Based Matchmaking Encryption
|
|
0
|
47
|
August 20, 2024
|
[Resource Topic] 2024/1291: Raccoon: A Masking-Friendly Signature Proven in the Probing Model
|
|
0
|
50
|
August 20, 2024
|
[Resource Topic] 2024/1289: Improved Lattice Blind Signatures from Recycled Entropy
|
|
0
|
44
|
August 20, 2024
|
[Resource Topic] 2024/1287: Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA)
|
|
0
|
63
|
August 16, 2024
|
[Resource Topic] 2024/1285: Robust Multiparty Computation from Threshold Encryption Based on RLWE
|
|
0
|
42
|
August 16, 2024
|
[Resource Topic] 2024/1284: Plaintext-Ciphertext Matrix Multiplication and FHE Bootstrapping: Fast and Fused
|
|
0
|
41
|
August 16, 2024
|
[Resource Topic] 2024/1282: $\mathsf{NTRU}\mathsf{+}\mathsf{PKE}$: Efficient Public-Key Encryption Schemes from the NTRU Problem
|
|
0
|
51
|
August 16, 2024
|
[Resource Topic] 2024/1265: Safe curves for elliptic-curve cryptography
|
|
0
|
55
|
August 12, 2024
|
[Resource Topic] 2024/1264: Succinct Non-Subsequence Arguments
|
|
0
|
62
|
August 12, 2024
|
[Resource Topic] 2024/1263: A Security Analysis of Two Classes of RSA-like Cryptosystems
|
|
0
|
59
|
August 12, 2024
|
[Resource Topic] 2024/1258: Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange
|
|
0
|
53
|
August 9, 2024
|
[Resource Topic] 2024/1243: Tailoring two-dimensional codes for structured lattice-based KEMs and applications to Kyber
|
|
0
|
55
|
August 7, 2024
|