[Resource Topic] 2024/144: Efficient (3,3)-isogenies on fast Kummer surfaces
|
|
0
|
46
|
February 2, 2024
|
[Resource Topic] 2024/140: Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
|
|
0
|
39
|
February 2, 2024
|
[Resource Topic] 2024/131: Practical Post-Quantum Signatures for Privacy
|
|
0
|
51
|
January 31, 2024
|
[Resource Topic] 2024/115: Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
|
|
0
|
37
|
January 29, 2024
|
[Resource Topic] 2024/097: Improved All-but-One Vector Commitment with Applications to Post-Quantum Signatures
|
|
0
|
57
|
January 22, 2024
|
[Resource Topic] 2024/094: Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions
|
|
0
|
53
|
January 22, 2024
|
[Resource Topic] 2024/093: Short Code-based One-out-of-Many Proofs and Applications
|
|
0
|
43
|
January 22, 2024
|
[Resource Topic] 2024/087: Tree-based Lookup Table on Batched Encrypted Queries using Homomorphic Encryption
|
|
0
|
69
|
January 19, 2024
|
[Resource Topic] 2024/076: A provably masked implementation of BIKE Key Encapsulation Mechanism
|
|
0
|
42
|
January 17, 2024
|
[Resource Topic] 2024/068: Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation
|
|
0
|
47
|
January 17, 2024
|
[Resource Topic] 2024/067: A Refined Hardness Estimation of LWE in Two-step Mode
|
|
0
|
41
|
January 17, 2024
|
[Resource Topic] 2024/056: Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion
|
|
0
|
45
|
January 15, 2024
|
[Resource Topic] 2024/055: Multi-Hop Fine-Grained Proxy Re-Encryption
|
|
0
|
42
|
January 15, 2024
|
[Resource Topic] 2024/054: FEASE: Fast and Expressive Asymmetric Searchable Encryption
|
|
0
|
42
|
January 15, 2024
|
[Resource Topic] 2024/053: Anonymous Homomorphic IBE with Application to Anonymous Aggregation
|
|
0
|
41
|
January 15, 2024
|
[Resource Topic] 2024/043: Fuzzy Identity Based Encryption with a flexible threshold value
|
|
0
|
35
|
January 12, 2024
|
[Resource Topic] 2024/042: Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions
|
|
0
|
36
|
January 12, 2024
|
[Resource Topic] 2024/040: ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head
|
|
0
|
40
|
January 10, 2024
|
[Resource Topic] 2024/039: X-Wing: The Hybrid KEM You’ve Been Looking For
|
|
0
|
50
|
January 10, 2024
|
[Resource Topic] 2024/037: Computing $2$-isogenies between Kummer lines
|
|
0
|
31
|
January 10, 2024
|
[Resource Topic] 2024/027: Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice
|
|
0
|
31
|
January 8, 2024
|
[Resource Topic] 2024/026: Towards Compact Identity-based Encryption on Ideal Lattices
|
|
0
|
32
|
January 8, 2024
|
[Resource Topic] 2024/021: Designing homomorphic encryptions with rational functions
|
|
0
|
28
|
January 8, 2024
|
[Resource Topic] 2024/019: Benchmark Performance of Homomorphic Polynomial Public Key Cryptography for Key Encapsulation and Digital Signature Schemes
|
|
0
|
30
|
January 8, 2024
|
[Resource Topic] 2024/018: Smaller Sphincs+
|
|
0
|
29
|
January 8, 2024
|
[Resource Topic] 2024/016: Reducing the computational complexity of fuzzy identity-based encryption from lattice
|
|
0
|
36
|
January 5, 2024
|
[Resource Topic] 2024/014: A Lattice-based Accountable Subgroup Multi-signature Scheme with Verifiable Group Setup
|
|
0
|
41
|
January 5, 2024
|
[Resource Topic] 2023/1968: Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
|
|
0
|
42
|
December 31, 2023
|
[Resource Topic] 2023/1965: More Efficient Public-Key Cryptography with Leakage and Tamper Resilience
|
|
0
|
39
|
December 31, 2023
|
[Resource Topic] 2023/1957: Chosen Ciphertext Security via BARGs
|
|
0
|
43
|
December 25, 2023
|