|
[Resource Topic] 2025/2109: Secure Lookup Tables: Faster, Leaner, and More General
|
|
0
|
4
|
November 18, 2025
|
|
[Resource Topic] 2025/2108: The Grain Family of Stream Ciphers: an Abstraction, Strengthening of Components and New Concrete Instantiations
|
|
0
|
3
|
November 18, 2025
|
|
[Resource Topic] 2025/2107: Quantum-safe Identity-binding Password Authenticated Key Exchange Protocols
|
|
0
|
7
|
November 17, 2025
|
|
[Resource Topic] 2025/2106: SoK: Blockchain Oracles Between Theory and Practice
|
|
0
|
7
|
November 17, 2025
|
|
[Resource Topic] 2025/2105: A Lattice-Based Puncturable Attribute-Based Proxy Re-Encryption with HRA Security and Switchable Tags for Cloud Data Sharing
|
|
0
|
7
|
November 17, 2025
|
|
[Resource Topic] 2025/2104: Quantum Voting Protocol from Classical Assumption
|
|
0
|
8
|
November 17, 2025
|
|
[Resource Topic] 2025/2103: Threshold Batched Identity-Based Encryption from Pairings in the Plain Model
|
|
0
|
6
|
November 17, 2025
|
|
[Resource Topic] 2025/2102: A Graph-Theoretic Framework for Randomness Optimization in First-Order Masked Circuits
|
|
0
|
5
|
November 17, 2025
|
|
[Resource Topic] 2025/2101: Fault Attacks against UOV-based Signatures
|
|
0
|
8
|
November 17, 2025
|
|
[Resource Topic] 2025/2100: Tag Functions and Their Applications to Lattice-based Signatures and IBEs — Compact Designs and Tighter Security
|
|
0
|
5
|
November 17, 2025
|
|
[Resource Topic] 2025/2099: A Lattice-based Designated Verifier zkSNARK from Standard Assumptions
|
|
0
|
5
|
November 17, 2025
|
|
[Resource Topic] 2025/2098: Optical computing of zero-knowledge proof with single-pixel imaging
|
|
0
|
5
|
November 17, 2025
|
|
[Resource Topic] 2025/2097: Hash-Based Blind Signatures: First Steps
|
|
0
|
6
|
November 17, 2025
|
|
[Resource Topic] 2025/2096: Laser Fault Injection Attack on the eXtended Merkle Signature Scheme
|
|
0
|
4
|
November 17, 2025
|
|
[Resource Topic] 2025/2095: FPS: Flexible Payment System
|
|
0
|
2
|
November 17, 2025
|
|
[Resource Topic] 2025/2094: Vega: Low-Latency Zero-Knowledge Proofs over Existing Credentials
|
|
0
|
6
|
November 14, 2025
|
|
[Resource Topic] 2025/2093: Lore: An LWE-based Key Encapsulation Mechanism with Variable Modulus and CRT Compression
|
|
0
|
6
|
November 14, 2025
|
|
[Resource Topic] 2025/2092: CRA and Cryptography: The Story Thus Far
|
|
0
|
4
|
November 14, 2025
|
|
[Resource Topic] 2025/2091: Efficient and Proof-of-Useful-Work Friendly Local-Search for Distributed Consensus
|
|
0
|
5
|
November 14, 2025
|
|
[Resource Topic] 2025/2090: Quantum Grover Attack on MIBS
|
|
0
|
6
|
November 14, 2025
|
|
[Resource Topic] 2025/2089: Traceable Bottom-Up Secret Sharing and Law & Order on Community Social Key Recovery (Full Version)
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2088: UP TO 50% OFF: Efficient Implementation of Polynomial Masking
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2087: Leakage-Free Enhanced Private Set Union for Balanced and Unbalanced Scenarios
|
|
0
|
7
|
November 13, 2025
|
|
[Resource Topic] 2025/2086: On Composing AGM-Secure Functionalities with Cryptographic Proofs: Applications to Unbounded-Depth IVC and More
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2085: Strong Pseudorandom Functions in $AC^0[2]$ in the Bounded-Query Setting
|
|
0
|
5
|
November 13, 2025
|
|
[Resource Topic] 2025/2084: Postponing the Glitches is Not Enough - A Critical Analysis of the DATE 2024 E-ISW Masking Scheme
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2083: Improvements to Lucas-sequence modular square roots and primality testing
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2082: Integrating PQC in OpenSSL via Shallow Providers for Cryptographic Agility
|
|
0
|
4
|
November 13, 2025
|
|
[Resource Topic] 2025/2081: Partial Fraction Techniques for Cryptography
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2080: Issuer Hiding for BBS-Based Anonymous Credentials
|
|
0
|
3
|
November 13, 2025
|