[Resource Topic] 2023/352: Post-Quantum Security for the Extended Access Control Protocol
|
|
0
|
7
|
March 15, 2023
|
[Resource Topic] 2023/351: Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE
|
|
0
|
8
|
March 15, 2023
|
[Resource Topic] 2023/350: Weighted Oblivious RAM, with Applications to Searchable Symmetric Encryption
|
|
0
|
5
|
March 15, 2023
|
[Resource Topic] 2023/349: AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios
|
|
0
|
7
|
March 15, 2023
|
[Resource Topic] 2023/348: Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
|
|
0
|
7
|
March 15, 2023
|
[Resource Topic] 2023/347: Off-Chain Programmability at Scale
|
|
0
|
5
|
March 15, 2023
|
[Resource Topic] 2023/346: How to achieve bidirectional zero-knowledge authentication?
|
|
0
|
20
|
March 9, 2023
|
[Resource Topic] 2023/345: Encryption with Quantum Public Keys
|
|
0
|
18
|
March 9, 2023
|
[Resource Topic] 2023/344: Quantum Search-to-Decision Reduction for the LWE Problem
|
|
0
|
21
|
March 9, 2023
|
[Resource Topic] 2023/343: A Map of Witness Maps: New Definitions and Connections
|
|
0
|
15
|
March 8, 2023
|
[Resource Topic] 2023/189: tlock: Practical Timelock Encryption from Threshold BLS
|
|
1
|
33
|
March 8, 2023
|
[Resource Topic] 2023/342: TurboSHAKE
|
|
0
|
17
|
March 8, 2023
|
[Resource Topic] 2023/341: On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
|
|
0
|
16
|
March 8, 2023
|
[Resource Topic] 2023/340: SALSA PICANTE: a machine learning attack on LWE with binary secrets
|
|
0
|
18
|
March 8, 2023
|
[Resource Topic] 2023/339: An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES
|
|
0
|
17
|
March 8, 2023
|
[Resource Topic] 2023/338: Shield: Secure Allegation Escrow System with Stronger Guarantees
|
|
0
|
17
|
March 8, 2023
|
[Resource Topic] 2023/337: Quantum Implementation of AIM: Aiming for Low-Depth
|
|
0
|
16
|
March 8, 2023
|
[Resource Topic] 2023/336: A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption
|
|
0
|
16
|
March 8, 2023
|
[Resource Topic] 2023/335: Separating Oil and Vinegar with a Single Trace
|
|
0
|
22
|
March 8, 2023
|
[Resource Topic] 2023/334: A Generic Transform from Multi-Round Interactive Proof to NIZK
|
|
0
|
20
|
March 8, 2023
|
[Resource Topic] 2023/333: Secret Sharing Scheme with Perfect Concealment
|
|
0
|
15
|
March 8, 2023
|
[Resource Topic] 2023/332: Asymmetric Group Message Franking: Definitions & Constructions
|
|
0
|
22
|
March 8, 2023
|
Isogeny Club talk: Deuring for the people
|
|
5
|
103
|
March 7, 2023
|
[Resource Topic] 2023/305: A Novel Related Nonce Attack for ECDSA
|
|
1
|
27
|
March 7, 2023
|
[Resource Topic] 2023/331: A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm
|
|
0
|
19
|
March 6, 2023
|
[Resource Topic] 2023/330: Perfect MPC over Layered Graphs
|
|
0
|
17
|
March 6, 2023
|
[Resource Topic] 2023/329: Caveat Implementor! Key Recovery Attacks on MEGA
|
|
0
|
20
|
March 6, 2023
|
[Resource Topic] 2023/328: The state diagram of $\chi$
|
|
0
|
19
|
March 6, 2023
|
[Resource Topic] 2023/327: New Quantum Search Model on Symmetric Ciphers and Its Applications
|
|
0
|
17
|
March 6, 2023
|
[Resource Topic] 2023/326: A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality
|
|
0
|
20
|
March 6, 2023
|