[Resource Topic] 2024/1696: Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security
|
|
0
|
37
|
October 18, 2024
|
[Resource Topic] 2024/1695: Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians
|
|
0
|
33
|
October 18, 2024
|
[Resource Topic] 2024/1689: Homomorphic Encryption with Authority
|
|
0
|
34
|
October 18, 2024
|
[Resource Topic] 2024/1669: The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys
|
|
0
|
20
|
October 18, 2024
|
[Resource Topic] 2024/1668: Modelings for generic PoK and Applications: Shorter SD and PKP based Signatures
|
|
0
|
18
|
October 18, 2024
|
[Resource Topic] 2024/1644: A Tight Lower Bound on the TdScrypt Trapdoor Memory-Hard Function
|
|
0
|
38
|
October 14, 2024
|
[Resource Topic] 2024/1638: Modular Reduction in CKKS
|
|
0
|
41
|
October 14, 2024
|
[Resource Topic] 2024/1637: Bootstrapping Small Integers With CKKS
|
|
0
|
54
|
October 14, 2024
|
[Resource Topic] 2024/1619: Structure-Preserving Compressing Primitives: Vector Commitments, Accumulators and Applications
|
|
0
|
47
|
October 11, 2024
|
[Resource Topic] 2024/1617: Algebraic Equipage for Learning with Errors in Cyclic Division Algebras
|
|
0
|
40
|
October 11, 2024
|
[Resource Topic] 2024/1608: Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation
|
|
0
|
40
|
October 11, 2024
|
[Resource Topic] 2024/1607: Tighter Proofs for PKE-to-KEM Transformation in the Quantum Random Oracle Model
|
|
0
|
48
|
October 9, 2024
|
[Resource Topic] 2024/1587: Fully Homomorphic Encryption for Cyclotomic Prime Moduli
|
|
0
|
42
|
October 8, 2024
|
[Resource Topic] 2024/1585: Quantum Money from Class Group Actions on Elliptic Curves
|
|
0
|
36
|
October 8, 2024
|
[Resource Topic] 2024/1582: Halving differential additions on Kummer lines
|
|
0
|
40
|
October 8, 2024
|
[Resource Topic] 2024/1574: Scalable Two-Round $n$-out-of-$n$ and Multi-Signatures from Lattices in the Quantum Random Oracle Model
|
|
0
|
30
|
October 8, 2024
|
[Resource Topic] 2024/1572: Bounded Collusion-Resistant Registered Functional Encryption for Circuits
|
|
0
|
29
|
October 8, 2024
|
[Resource Topic] 2024/1564: A Simple Framework for Secure Key Leasing
|
|
0
|
40
|
October 5, 2024
|
[Resource Topic] 2024/1563: Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
|
|
0
|
47
|
October 5, 2024
|
[Resource Topic] 2024/1553: STARK-based Signatures from the RPO Permutation
|
|
0
|
37
|
October 4, 2024
|
[Resource Topic] 2024/1537: VOLE-in-the-head signatures from Subfield Bilinear Collisions
|
|
0
|
44
|
October 4, 2024
|
[Resource Topic] 2024/1535: Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs
|
|
0
|
36
|
October 4, 2024
|
[Resource Topic] 2024/1528: Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
|
|
0
|
44
|
September 30, 2024
|
[Resource Topic] 2024/1519: Efficient theta-based algorithms for computing $(\ell, \ell)$-isogenies on Kummer surfaces for arbitrary odd $\ell$
|
|
0
|
41
|
September 30, 2024
|
[Resource Topic] 2024/1510: Group Factorisation for Smaller Signatures from Cryptographic Group Actions
|
|
0
|
41
|
September 30, 2024
|
[Resource Topic] 2024/1507: Unbounded ABE for Circuits from LWE, Revisited
|
|
0
|
44
|
September 30, 2024
|
[Resource Topic] 2024/1495: Lattice-Based Vulnerabilities in Lee Metric Post-Quantum Cryptosystems
|
|
0
|
31
|
September 30, 2024
|
[Resource Topic] 2024/1486: Adaptively Secure Attribute-Based Encryption from Witness Encryption
|
|
0
|
52
|
September 24, 2024
|
[Resource Topic] 2024/1481: Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort
|
|
0
|
52
|
September 24, 2024
|
[Resource Topic] 2024/1480: On Schubert cells of Projective Geometry and quadratic public keys of Multivariate Cryptography
|
|
0
|
51
|
September 24, 2024
|