[Resource Topic] 2025/182: Deny Whatever You Want: Dual-Deniable Public-Key Encryption
|
|
0
|
5
|
February 10, 2025
|
[Resource Topic] 2025/181: Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber
|
|
0
|
2
|
February 10, 2025
|
[Resource Topic] 2025/175: Updatable Public-Key Encryption, Revisited
|
|
0
|
8
|
February 7, 2025
|
[Resource Topic] 2025/164: Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions
|
|
0
|
6
|
February 5, 2025
|
[Resource Topic] 2025/161: Secure Showing of Partial Attributes
|
|
0
|
1
|
February 5, 2025
|
[Resource Topic] 2025/155: Cycles and Cuts in Supersingular L-Isogeny Graphs
|
|
0
|
3
|
February 1, 2025
|
[Resource Topic] 2025/153: Error floor prediction with Markov models for QC-MDPC codes
|
|
0
|
1
|
February 1, 2025
|
[Resource Topic] 2025/147: Efficient algorithms for the detection of $(N,N)$-splittings and endomorphisms
|
|
0
|
0
|
January 31, 2025
|
[Resource Topic] 2025/138: Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM
|
|
0
|
0
|
January 28, 2025
|
[Resource Topic] 2025/136: Isogeny-based Cryptography using Isomorphisms of Superspecial Abelian Surfaces
|
|
0
|
2
|
January 28, 2025
|
[Resource Topic] 2025/131: On the Anonymity of Linkable Ring Signatures
|
|
0
|
2
|
January 28, 2025
|
[Resource Topic] 2025/127: A Revision of CROSS Security: Proofs and Attacks for Multi-Round Fiat-Shamir Signatures
|
|
0
|
5
|
January 28, 2025
|
[Resource Topic] 2025/117: Post-Quantum Online/Offline Signatures
|
|
0
|
2
|
January 27, 2025
|
[Resource Topic] 2025/115: Signatures with Tight Adaptive Corruptions from Search Assumptions
|
|
0
|
2
|
January 25, 2025
|
[Resource Topic] 2025/114: Better Codes for the HQC Cryptosystem
|
|
0
|
2
|
January 24, 2025
|
[Resource Topic] 2025/113: Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head
|
|
0
|
2
|
January 24, 2025
|
[Resource Topic] 2025/107: dCTIDH: Fast & Deterministic CTIDH
|
|
0
|
3
|
January 23, 2025
|
[Resource Topic] 2025/106: NTRU+Sign: Compact NTRU-Based Signatures Using Bimodal Distributions
|
|
0
|
0
|
January 23, 2025
|
[Resource Topic] 2025/099: Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus
|
|
0
|
3
|
January 22, 2025
|
[Resource Topic] 2025/085: Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements
|
|
0
|
6
|
January 22, 2025
|
[Resource Topic] 2025/081: Integer Commitments, Old and New Tools
|
|
0
|
3
|
January 21, 2025
|
[Resource Topic] 2025/071: The HHE Land: Exploring the Landscape of Hybrid Homomorphic Encryption
|
|
0
|
3
|
January 17, 2025
|
[Resource Topic] 2025/066: Efficient Homomorphic Integer Computer from CKKS
|
|
0
|
0
|
January 17, 2025
|
[Resource Topic] 2025/063: PunSearch: Enabling Puncturable Encrypted Search over Lattice for Cloud Storage Systems
|
|
0
|
4
|
January 17, 2025
|
[Resource Topic] 2025/062: Treating dishonest ciphertexts in post-quantum KEMs -- explicit vs. implicit rejection in the FO transform
|
|
0
|
1
|
January 16, 2025
|
[Resource Topic] 2025/055: Hash-Based Multi-Signatures for Post-Quantum Ethereum
|
|
0
|
7
|
January 14, 2025
|
[Resource Topic] 2025/051: Black-Box Registered ABE from Lattices
|
|
0
|
1
|
January 14, 2025
|
[Resource Topic] 2025/044: Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE
|
|
0
|
5
|
January 13, 2025
|
[Resource Topic] 2025/022: Leveled Functional Bootstrapping via External Product Tree
|
|
0
|
0
|
January 7, 2025
|
[Resource Topic] 2025/017: New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version)
|
|
0
|
4
|
January 6, 2025
|