[Resource Topic] 2024/878: Radical Vélu Isogeny Formulae
|
|
0
|
46
|
June 5, 2024
|
[Resource Topic] 2024/861: A new multivariate primitive from CCZ equivalence
|
|
0
|
28
|
June 5, 2024
|
[Resource Topic] 2024/853: Practical q-IND-CPA-D-Secure Approximate Homomorphic Encryption
|
|
0
|
56
|
May 31, 2024
|
[Resource Topic] 2024/843: Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt
|
|
0
|
63
|
May 31, 2024
|
[Resource Topic] 2024/835: Provable security against decryption failure attacks from LWE
|
|
0
|
49
|
May 31, 2024
|
[Resource Topic] 2024/834: Fine-Grained Non-Interactive Key Exchange, Revisited
|
|
0
|
47
|
May 31, 2024
|
[Resource Topic] 2024/824: Improved Meet-LWE Attack via Ternary Trees
|
|
0
|
93
|
May 27, 2024
|
[Resource Topic] 2024/821: A General Framework for Lattice-Based ABE Using Evasive Inner-Product Functional Encryption
|
|
0
|
87
|
May 27, 2024
|
[Resource Topic] 2024/817: DVA: Dangerous Variations of ALTEQ
|
|
0
|
85
|
May 27, 2024
|
[Resource Topic] 2024/815: Faster verifications and smaller signatures: Trade-offs for ALTEQ using rejections
|
|
0
|
94
|
May 27, 2024
|
[Resource Topic] 2024/812: Relations among new CCA security notions for approximate FHE
|
|
0
|
84
|
May 27, 2024
|
[Resource Topic] 2024/805: DiTRU: A Resurrection of NTRU over Dihedral Group
|
|
0
|
88
|
May 27, 2024
|
[Resource Topic] 2024/798: Incompressible Functional Encryption
|
|
0
|
95
|
May 24, 2024
|
[Resource Topic] 2024/794: Detecting Rogue Decryption in (Threshold) Encryption via Self-Incriminating Proofs
|
|
0
|
61
|
May 24, 2024
|
[Resource Topic] 2024/793: Hide-and-Seek and the Non-Resignability of the BUFF Transform
|
|
0
|
59
|
May 24, 2024
|
[Resource Topic] 2024/792: Stickel's Key Agreement Algebraic Variation
|
|
0
|
45
|
May 24, 2024
|
[Resource Topic] 2024/778: Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign
|
|
0
|
80
|
May 24, 2024
|
[Resource Topic] 2024/777: Measure-Rewind-Extract: Tighter Proofs of One-Way to Hiding and CCA Security in the Quantum Random Oracle Model
|
|
0
|
49
|
May 24, 2024
|
[Resource Topic] 2024/773: SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies
|
|
0
|
51
|
May 22, 2024
|
[Resource Topic] 2024/771: SQIsign2D-East: A New Signature Scheme Using 2-dimensional Isogenies
|
|
0
|
42
|
May 22, 2024
|
[Resource Topic] 2024/767: Bootstrapping Bits with CKKS
|
|
0
|
43
|
May 20, 2024
|
[Resource Topic] 2024/764: Decentralized Multi-Client Functional Encryption with Strong Security
|
|
0
|
51
|
May 20, 2024
|
[Resource Topic] 2024/761: Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage
|
|
0
|
51
|
May 20, 2024
|
[Resource Topic] 2024/760: SQIsign2D-West: The Fast, the Small, and the Safer
|
|
0
|
47
|
May 20, 2024
|
[Resource Topic] 2024/752: More Embedded Curves for SNARK-Pairing-Friendly Curves
|
|
0
|
44
|
May 20, 2024
|
[Resource Topic] 2024/749: Reducing the CRS Size in Registered ABE Systems
|
|
0
|
44
|
May 20, 2024
|
[Resource Topic] 2024/748: PERK: Compact Signature Scheme Based on a New Variant of the Permuted Kernel Problem
|
|
0
|
43
|
May 20, 2024
|
[Resource Topic] 2024/740: Multi-Client Functional Encryption with Public Inputs and Strong Security
|
|
0
|
56
|
May 16, 2024
|
[Resource Topic] 2024/732: Compact Encryption based on Module-NTRU problems
|
|
0
|
59
|
May 16, 2024
|
[Resource Topic] 2022/1505: Efficient Registration-Based Encryption
|
|
1
|
126
|
May 13, 2024
|