[Resource Topic] 2024/466: Arctic: Lightweight and Stateless Threshold Schnorr Signatures
|
|
0
|
23
|
March 22, 2024
|
[Resource Topic] 2024/465: Shorter VOLEitH Signature from Multivariate Quadratic
|
|
0
|
17
|
March 22, 2024
|
[Resource Topic] 2024/464: ON THE IMPLEMENTATION OF A LATTICE-BASED DAA FOR VANET SYSTEM
|
|
0
|
15
|
March 22, 2024
|
[Resource Topic] 2024/463: Security Guidelines for Implementing Homomorphic Encryption
|
|
0
|
27
|
March 22, 2024
|
[Resource Topic] 2024/462: Perfect Zero-Knowledge PCPs for #P
|
|
0
|
16
|
March 22, 2024
|
[Resource Topic] 2024/461: Atlas-X Equity Financing: Unlocking New Methods to Securely Obfuscate Axe Inventory Data Based on Differential Privacy
|
|
0
|
16
|
March 22, 2024
|
[Resource Topic] 2024/460: Encrypted Image Classification with Low Memory Footprint using Fully Homomorphic Encryption
|
|
0
|
18
|
March 22, 2024
|
[Resource Topic] 2024/459: Isogeny problems with level structure
|
|
0
|
17
|
March 22, 2024
|
[Resource Topic] 2024/458: Classical and Quantum Generic Attacks on 6-round Feistel Schemes
|
|
0
|
14
|
March 22, 2024
|
[Resource Topic] 2024/457: Studying Lattice-Based Zero-Knowlege Proofs: A Tutorial and an Implementation of Lantern
|
|
0
|
18
|
March 22, 2024
|
[Resource Topic] 2024/456: Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction
|
|
0
|
16
|
March 22, 2024
|
[Resource Topic] 2024/455: Anonymous Complaint Aggregation for Secure Messaging
|
|
0
|
30
|
March 18, 2024
|
[Resource Topic] 2024/454: The Systemic Errors of Banded Quantum Fourier Transformation
|
|
0
|
24
|
March 18, 2024
|
[Resource Topic] 2024/453: Verifiable Information-Theoretic Function Secret Sharing
|
|
0
|
28
|
March 18, 2024
|
[Resource Topic] 2024/452: Modeling Mobile Crash in Byzantine Consensus
|
|
0
|
25
|
March 18, 2024
|
[Resource Topic] 2024/451: Towards Verifiable FHE in Practice: Proving Correct Execution of TFHE's Bootstrapping using plonky2
|
|
0
|
32
|
March 18, 2024
|
[Resource Topic] 2024/450: The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
|
|
0
|
30
|
March 18, 2024
|
[Resource Topic] 2024/449: Practical Lattice-Based Distributed Signatures for a Small Number of Signers
|
|
0
|
29
|
March 18, 2024
|
[Resource Topic] 2024/448: Differential Cryptanalysis of a Lightweight Block Cipher LELBC
|
|
0
|
26
|
March 18, 2024
|
[Resource Topic] 2024/447: ORIGO: Proving Provenance of Sensitive Data with Constant Communication
|
|
0
|
32
|
March 15, 2024
|
[Resource Topic] 2024/446: Estimating the Unpredictability of Multi-Bit Strong PUF Classes
|
|
0
|
27
|
March 15, 2024
|
[Resource Topic] 2024/445: Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions
|
|
0
|
23
|
March 15, 2024
|
[Resource Topic] 2024/444: A trust-minimized e-cash for cryptocurrencies
|
|
0
|
25
|
March 15, 2024
|
[Resource Topic] 2024/443: The cool and the cruel: separating hard parts of LWE secrets
|
|
0
|
23
|
March 15, 2024
|
[Resource Topic] 2024/442: Fastcrypto: Pioneering Cryptography Via Continuous Benchmarking
|
|
0
|
23
|
March 15, 2024
|
[Resource Topic] 2024/441: Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields
|
|
0
|
21
|
March 15, 2024
|
[Resource Topic] 2024/440: Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA
|
|
0
|
24
|
March 15, 2024
|
[Resource Topic] 2024/439: Threshold implementations of cryptographic functions between finite Abelian groups
|
|
0
|
32
|
March 15, 2024
|
[Resource Topic] 2024/438: EFFLUX-F2: A High Performance Hardware Security Evaluation Board
|
|
0
|
33
|
March 15, 2024
|
[Resource Topic] 2024/437: Insecurity of MuSig and BN Multi-Signatures with Delayed Message Selection
|
|
0
|
20
|
March 15, 2024
|