[Resource Topic] 2024/361: Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation
|
|
0
|
32
|
March 1, 2024
|
[Resource Topic] 2024/359: Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique
|
|
0
|
30
|
March 1, 2024
|
[Resource Topic] 2024/329: How to Validate a Verification?
|
|
0
|
37
|
February 27, 2024
|
[Resource Topic] 2024/328: Attribute-Based Signatures with Advanced Delegation, and Tracing
|
|
0
|
34
|
February 27, 2024
|
[Resource Topic] 2024/327: Registered Functional Encryptions from Pairings
|
|
0
|
30
|
February 27, 2024
|
[Resource Topic] 2024/313: The Complexity of Algebraic Algorithms for LWE
|
|
0
|
25
|
February 26, 2024
|
[Resource Topic] 2024/312: Trapdoor Memory-Hard Functions
|
|
0
|
30
|
February 26, 2024
|
[Resource Topic] 2024/311: Aggregating Falcon Signatures with LaBRADOR
|
|
0
|
35
|
February 26, 2024
|
[Resource Topic] 2024/293: Registered Attribute-Based Signature
|
|
0
|
31
|
February 23, 2024
|
[Resource Topic] 2024/263: Threshold Encryption with Silent Setup
|
|
0
|
38
|
February 19, 2024
|
[Resource Topic] 2024/241: Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings
|
|
0
|
32
|
February 16, 2024
|
[Resource Topic] 2024/239: Simulation-Secure Threshold PKE from Standard (Ring-)LWE
|
|
0
|
37
|
February 16, 2024
|
[Resource Topic] 2024/226: Attribute-based Keyed (Fully) Homomorphic Encryption
|
|
0
|
27
|
February 16, 2024
|
[Resource Topic] 2024/214: Distributed Fiat-Shamir Transform
|
|
0
|
26
|
February 16, 2024
|
[Resource Topic] 2024/208: Asymmetric Cryptography from Number Theoretic Transformations
|
|
0
|
44
|
February 12, 2024
|
[Resource Topic] 2024/205: A Generalized Distributed RSA Key Generation
|
|
0
|
42
|
February 12, 2024
|
[Resource Topic] 2024/203: Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use
|
|
0
|
68
|
February 12, 2024
|
[Resource Topic] 2024/202: Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability
|
|
0
|
49
|
February 12, 2024
|
[Resource Topic] 2024/183: On Security Proofs of Existing Equivalence Class Signature Schemes
|
|
0
|
49
|
February 9, 2024
|
[Resource Topic] 2024/181: Functional Bootstrapping for FV-style Cryptosystems
|
|
0
|
38
|
February 9, 2024
|
[Resource Topic] 2024/179: Traitor Tracing without Trusted Authority from Registered Functional Encryption
|
|
0
|
40
|
February 9, 2024
|
[Resource Topic] 2024/177: Registered Functional Encryption for Quadratic Functions from MDDH
|
|
0
|
42
|
February 6, 2024
|
[Resource Topic] 2024/175: Lossy Cryptography from Code-Based Assumptions
|
|
0
|
39
|
February 6, 2024
|
[Resource Topic] 2024/171: Approximate Methods for the Computation of Step Functions in Homomorphic Encryption
|
|
0
|
45
|
February 6, 2024
|
[Resource Topic] 2024/164: Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT
|
|
0
|
34
|
February 6, 2024
|
[Resource Topic] 2024/156: Homomorphic sign evaluation using functional bootstrapping with a RNS representation of integers
|
|
0
|
42
|
February 5, 2024
|
[Resource Topic] 2024/155: Fully Homomorphic Encryption on large integers
|
|
0
|
37
|
February 5, 2024
|
[Resource Topic] 2024/153: Revisiting the Slot-to-Coefficient Transformation for BGV and BFV
|
|
0
|
36
|
February 5, 2024
|
[Resource Topic] 2024/146: Computing Orientations from the Endomorphism Ring of Supersingular Curves and Applications
|
|
0
|
43
|
February 2, 2024
|
[Resource Topic] 2024/144: Efficient (3,3)-isogenies on fast Kummer surfaces
|
|
0
|
44
|
February 2, 2024
|