[Resource Topic] 2025/1000: Post-Quantum Multi-Message Public Key Encryption from Extended Reproducible PKE
|
|
0
|
5
|
June 2, 2025
|
[Resource Topic] 2025/994: A Fast Multiplication Algorithm and RLWE-PLWE Equivalence for the Maximal Real Subfield of the $2^r p^s$-th Cyclotomic Field
|
|
0
|
7
|
June 2, 2025
|
[Resource Topic] 2025/985: Tighter Quantum Security for Fiat-Shamir-with-Aborts and Hash-and-Sign-with-Retry Signatures
|
|
0
|
1
|
June 2, 2025
|
[Resource Topic] 2025/982: Simulatability SOA Does Not Imply Indistinguishability SOA in the CCA Setting
|
|
0
|
4
|
June 2, 2025
|
[Resource Topic] 2025/973: On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions
|
|
0
|
4
|
May 30, 2025
|
[Resource Topic] 2025/967: Registered Functional Encryption for Pseudorandom Functionalities from Lattices: Registered ABE for Unbounded Depth Circuits and Turing Machines, and More
|
|
0
|
5
|
May 28, 2025
|
[Resource Topic] 2025/960: A Framework for Advanced Signature Notions
|
|
0
|
5
|
May 27, 2025
|
[Resource Topic] 2025/952: A Provably Secure W-OTS$^+$ based on MQ Problem
|
|
0
|
3
|
May 26, 2025
|
[Resource Topic] 2025/948: Resolving the Efficiency-Utility Dilemma of Threshold Linearly Homomorphic Encryption via Message-Space Adapter
|
|
0
|
6
|
May 26, 2025
|
[Resource Topic] 2025/923: SPECK: Signatures from Permutation Equivalence of Codes and Kernels
|
|
0
|
5
|
May 23, 2025
|
[Resource Topic] 2025/913: Hidden Number Problems in Fiat-Shamir based Post-Quantum Signatures
|
|
0
|
6
|
May 23, 2025
|
[Resource Topic] 2025/904: The Security of ML-DSA against Fault-Injection Attacks
|
|
0
|
4
|
May 21, 2025
|
[Resource Topic] 2025/900: Exclusive Ownership of Fiat-Shamir Signatures: ML-DSA, SQIsign, LESS, and More
|
|
0
|
4
|
May 21, 2025
|
[Resource Topic] 2025/897: SQIsign2DPush: Faster Signature Scheme Using 2-Dimensional Isogenies
|
|
0
|
4
|
May 21, 2025
|
[Resource Topic] 2025/895: Blinding Post-Quantum Hash-and-Sign Signatures
|
|
0
|
4
|
May 21, 2025
|
[Resource Topic] 2025/894: Achieving "beyond CCA1" security for linearly homomorphic encryption, without SNARKs?
|
|
0
|
5
|
May 19, 2025
|
[Resource Topic] 2025/889: At the Top of the Hypercube -- Better Size-Time Tradeoffs for Hash-Based Signatures
|
|
0
|
2
|
May 19, 2025
|
[Resource Topic] 2025/888: Bootstrapping GBFV with CKKS
|
|
0
|
2
|
May 19, 2025
|
[Resource Topic] 2025/882: Leveled Homomorphic Encryption over Composite Groups
|
|
0
|
4
|
May 19, 2025
|
[Resource Topic] 2025/881: One-Way Homomorphic Encryption: A Composite Group Approach
|
|
0
|
7
|
May 19, 2025
|
[Resource Topic] 2025/872: Finally! A Compact Lattice-Based Threshold Signature
|
|
0
|
4
|
May 19, 2025
|
[Resource Topic] 2025/855: Posterior Security: Anonymity and Message Hiding of Standard Signatures
|
|
0
|
2
|
May 17, 2025
|
[Resource Topic] 2025/853: Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay
|
|
0
|
3
|
May 17, 2025
|
[Resource Topic] 2025/849: Unmasking TRaccoon: A Lattice-Based Threshold Signature with An Efficient Identifiable Abort Protocol
|
|
0
|
4
|
May 17, 2025
|
[Resource Topic] 2025/847: Deterministic algorithms for class group actions
|
|
0
|
6
|
May 16, 2025
|
[Resource Topic] 2025/844: Post-Quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN
|
|
0
|
5
|
May 16, 2025
|
[Resource Topic] 2025/842: Improvements on the schemes VOX and QR UOV When minus is a plus
|
|
0
|
2
|
May 15, 2025
|
[Resource Topic] 2025/840: T-Spoon: Tightly Secure Two-Round Multi-Signatures with Key Aggregation
|
|
0
|
9
|
May 13, 2025
|
[Resource Topic] 2025/836: Registered Functional Encryption for Attribute-Weighted Sums with Access Control
|
|
0
|
3
|
May 12, 2025
|
[Resource Topic] 2025/808: Partially Registered Type of Multi-authority Attribute-based Encryption
|
|
0
|
4
|
May 9, 2025
|