[Resource Topic] 2024/1394: SLAMP-FSS: Two-Party Multi-Point Function Secret Sharing from Simple Linear Algebra
|
|
0
|
16
|
September 11, 2024
|
[Resource Topic] 2024/1393: Survivable Payment Channel Networks
|
|
0
|
11
|
September 11, 2024
|
[Resource Topic] 2024/1392: Key Policy Attribute-Based Encryption Leveraging Isogeny-Based Cryptography
|
|
0
|
13
|
September 11, 2024
|
[Resource Topic] 2024/1391: Scalable Equi-Join Queries over Encrypted Database
|
|
0
|
12
|
September 11, 2024
|
[Resource Topic] 2024/1390: Cache Timing Leakages in Zero-Knowledge Protocols
|
|
0
|
41
|
September 4, 2024
|
[Resource Topic] 2024/1389: DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES
|
|
0
|
41
|
September 4, 2024
|
[Resource Topic] 2024/1388: One-Way Functions and pKt Complexity
|
|
0
|
38
|
September 4, 2024
|
[Resource Topic] 2024/1387: SPADE: Digging into Selective and PArtial DEcryption using Functional Encryption
|
|
0
|
36
|
September 4, 2024
|
[Resource Topic] 2024/1386: Problems and New Approaches for Crypto-Agility in Operational Technology
|
|
0
|
38
|
September 4, 2024
|
[Resource Topic] 2024/1385: Locally Verifiable Distributed SNARGs
|
|
0
|
38
|
September 4, 2024
|
[Resource Topic] 2024/1384: Password-Protected Key Retrieval with(out) HSM Protection
|
|
0
|
37
|
September 4, 2024
|
[Resource Topic] 2024/1383: Self-Orthogonal Minimal Codes From (Vectorial) p-ary Plateaued Functions
|
|
0
|
38
|
September 4, 2024
|
[Resource Topic] 2024/1382: Universal Context Commitment without Ciphertext Expansion
|
|
0
|
40
|
September 4, 2024
|
[Resource Topic] 2024/1381: Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor
|
|
0
|
32
|
September 4, 2024
|
[Resource Topic] 2024/1380: EUCLEAK
|
|
0
|
30
|
September 4, 2024
|
[Resource Topic] 2024/1379: EvalRound+ Bootstrapping and its Rigorous Analysis for CKKS Scheme
|
|
0
|
28
|
September 4, 2024
|
[Resource Topic] 2024/1378: Practical Blind Signatures in Pairing-Free Groups
|
|
0
|
32
|
September 4, 2024
|
[Resource Topic] 2024/1377: Security Strengthening of Threshold Symmetric Schemes
|
|
0
|
28
|
September 4, 2024
|
[Resource Topic] 2024/1376: FDFB$^2$: Functional Bootstrapping via Sparse Polynomial Multiplication
|
|
0
|
27
|
September 4, 2024
|
[Resource Topic] 2024/1375: ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme
|
|
0
|
27
|
September 4, 2024
|
[Resource Topic] 2024/1374: Lifting approach against the SNOVA scheme
|
|
0
|
31
|
September 4, 2024
|
[Resource Topic] 2024/1373: Uncompressing Dilithium's public key
|
|
0
|
38
|
September 4, 2024
|
[Resource Topic] 2024/1372: Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits
|
|
0
|
29
|
September 4, 2024
|
[Resource Topic] 2024/1371: PIGEON: A Framework for Private Inference of Neural Networks
|
|
0
|
37
|
September 2, 2024
|
[Resource Topic] 2024/1370: ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON
|
|
0
|
35
|
September 2, 2024
|
[Resource Topic] 2024/1369: AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework
|
|
0
|
32
|
September 2, 2024
|
[Resource Topic] 2024/1368: Tightly Secure Non-Interactive BLS Multi-Signatures
|
|
0
|
31
|
September 2, 2024
|
[Resource Topic] 2024/1367: A Better Kyber Butterfly for FPGAs
|
|
0
|
40
|
September 2, 2024
|
[Resource Topic] 2024/1366: Adaptive Successive Over-Relaxation Method for a Faster Iterative Approximation of Homomorphic Operations
|
|
0
|
39
|
August 30, 2024
|
[Resource Topic] 2024/1365: High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature
|
|
0
|
34
|
August 30, 2024
|