[Resource Topic] 2025/049: On the gap between terms in an addition chain
|
|
0
|
1
|
January 14, 2025
|
[Resource Topic] 2025/048: ABLE: Optimizing Mixed Arithmetic and Boolean Garbled Circuit
|
|
0
|
0
|
January 13, 2025
|
[Resource Topic] 2025/047: Time-Lock Puzzles from Lattices
|
|
0
|
3
|
January 13, 2025
|
[Resource Topic] 2025/046: The Meta-Complexity of Secret Sharing
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/045: IND-CPA$^{\text{C}}$: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption
|
|
0
|
3
|
January 13, 2025
|
[Resource Topic] 2025/044: Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/043: SoK: Time to be Selfless?! Demystifying the Landscape of Selfish Mining Strategies and Models
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/042: Structural Results for Maximal Quaternion Orders and Connecting Ideals of Prime Power Norm in $B_{p,\infty}$
|
|
0
|
2
|
January 13, 2025
|
[Resource Topic] 2025/041: Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/040: Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol
|
|
0
|
1
|
January 13, 2025
|
[Resource Topic] 2025/039: VDORAM: Towards a Random Access Machine with Both Public Verifiability and Distributed Obliviousness
|
|
0
|
3
|
January 13, 2025
|
[Resource Topic] 2025/038: Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains
|
|
0
|
2
|
January 13, 2025
|
[Resource Topic] 2025/037: Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon
|
|
0
|
4
|
January 10, 2025
|
[Resource Topic] 2025/036: Scalable Post-Quantum Oblivious Transfers for Resource-Constrained Receivers
|
|
0
|
1
|
January 9, 2025
|
[Resource Topic] 2025/035: Long Paper: All-You-Can-Compute: Packed Secret Sharing for Combined Resilience
|
|
0
|
2
|
January 9, 2025
|
[Resource Topic] 2025/034: ZODA: Zero-Overhead Data Availability
|
|
0
|
2
|
January 9, 2025
|
[Resource Topic] 2025/033: Parametrizing Maximal Orders Along Supersingular $\ell$-Isogeny Paths
|
|
0
|
1
|
January 9, 2025
|
[Resource Topic] 2025/032: A New Paradigm for Server-Aided MPC
|
|
0
|
0
|
January 9, 2025
|
[Resource Topic] 2025/031: Round-Optimal Compiler for Semi-Honest to Malicious Oblivious Transfer via CIH
|
|
0
|
1
|
January 9, 2025
|
[Resource Topic] 2025/030: Delegated Multi-party Private Set Intersection from Secret Sharing
|
|
0
|
1
|
January 9, 2025
|
[Resource Topic] 2025/029: Highly Efficient Server-Aided Multiparty Subfield VOLE Distribution Protocol
|
|
0
|
0
|
January 9, 2025
|
[Resource Topic] 2025/028: Extending Groth16 for Disjunctive Statements
|
|
0
|
0
|
January 8, 2025
|
[Resource Topic] 2025/027: Constant time lattice reduction in dimension 4 with application to SQIsign
|
|
0
|
4
|
January 8, 2025
|
[Resource Topic] 2025/026: How to use your brain for cryptography without trustworthy machines
|
|
0
|
2
|
January 8, 2025
|
[Resource Topic] 2025/025: Chosen-Ciphertext Security for Inner Product FE: Mutli-Client and Multi-Input, Generically
|
|
0
|
0
|
January 8, 2025
|
[Resource Topic] 2025/024: Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited
|
|
0
|
1
|
January 7, 2025
|
[Resource Topic] 2025/023: Cryptography is Rocket Science: Analysis of BPSec
|
|
0
|
2
|
January 7, 2025
|
[Resource Topic] 2025/022: Leveled Functional Bootstrapping via External Product Tree
|
|
0
|
0
|
January 7, 2025
|
[Resource Topic] 2025/021: Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem
|
|
0
|
1
|
January 7, 2025
|
[Resource Topic] 2025/020: ProbeShooter: A New Practical Approach for Probe Aiming
|
|
0
|
0
|
January 7, 2025
|