[Resource Topic] 2024/558: Scoring the predictions: a way to improve profiling side-channel attacks
|
|
0
|
27
|
April 10, 2024
|
[Resource Topic] 2024/557: Permutation-Based Hash Chains with Application to Password Hashing
|
|
0
|
26
|
April 10, 2024
|
[Resource Topic] 2024/556: Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage
|
|
0
|
23
|
April 10, 2024
|
[Resource Topic] 2024/554: Leakage-Abuse Attacks Against Structured Encryption for SQL
|
|
0
|
25
|
April 10, 2024
|
[Resource Topic] 2024/553: Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations
|
|
0
|
26
|
April 10, 2024
|
[Resource Topic] 2024/552: Insights from building a blockchain-based metaverse
|
|
0
|
18
|
April 10, 2024
|
[Resource Topic] 2024/551: Probabilistic Algorithms with applications to countering Fault Attacks on Lattice based Post-Quantum Cryptography
|
|
0
|
26
|
April 10, 2024
|
[Resource Topic] 2024/550: Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV
|
|
0
|
21
|
April 10, 2024
|
[Resource Topic] 2024/549: Integral Attack on the Full FUTURE Block Cipher
|
|
0
|
27
|
April 10, 2024
|
[Resource Topic] 2024/548: Efficient isochronous fixed-weight sampling with applications to NTRU
|
|
0
|
23
|
April 10, 2024
|
[Resource Topic] 2024/547: Efficient Permutation Correlations and Batched Random Access for Two-Party Computation
|
|
0
|
26
|
April 10, 2024
|
[Resource Topic] 2024/546: Share with Care: Breaking E2EE in Nextcloud
|
|
0
|
27
|
April 10, 2024
|
Isogeny Club - Season 4 - Talk #4: The endomorphism ring problem given one endomorphism
|
|
0
|
46
|
April 10, 2024
|
[Resource Topic] 2024/545: Optimal Asynchronous Byzantine Consensus with Fair Separability
|
|
0
|
28
|
April 8, 2024
|
[Resource Topic] 2024/544: A post-quantum Distributed OPRF from the Legendre PRF
|
|
0
|
29
|
April 8, 2024
|
[Resource Topic] 2024/543: A Note on the Common Haar State Model
|
|
0
|
25
|
April 8, 2024
|
[Resource Topic] 2024/542: Breaking Bicoptor from S$\&$P 2023 Based on Practical Secret Recovery Attack
|
|
0
|
32
|
April 8, 2024
|
[Resource Topic] 2024/541: Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank
|
|
0
|
26
|
April 8, 2024
|
[Resource Topic] 2024/540: Lattice-Based Timed Cryptography
|
|
0
|
27
|
April 8, 2024
|
[Resource Topic] 2024/539: Supersingular Hashing using Lattès Maps
|
|
0
|
22
|
April 8, 2024
|
[Resource Topic] 2024/538: A comment on "Comparing the MOV and FR reductions in elliptic curve cryptography" from EUROCRYPT'99
|
|
0
|
23
|
April 8, 2024
|
[Resource Topic] 2024/537: Confidential and Verifiable Machine Learning Delegations on the Cloud
|
|
0
|
21
|
April 8, 2024
|
[Resource Topic] 2024/536: Highly-Effective Backdoors for Hash Functions and Beyond
|
|
0
|
31
|
April 6, 2024
|
[Resource Topic] 2024/535: NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree
|
|
0
|
20
|
April 6, 2024
|
[Resource Topic] 2024/534: CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model
|
|
0
|
23
|
April 6, 2024
|
[Resource Topic] 2024/533: HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation
|
|
0
|
22
|
April 6, 2024
|
[Resource Topic] 2024/532: Analysing Cryptography in the Wild -- A Retrospective
|
|
0
|
32
|
April 6, 2024
|
[Resource Topic] 2024/531: Avoiding Trusted Setup in Isogeny-based Commitments
|
|
0
|
29
|
April 6, 2024
|
[Resource Topic] 2024/530: An efficient key generation algorithm for GR-NTRU over dihedral group
|
|
0
|
26
|
April 6, 2024
|
[Resource Topic] 2024/529: Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest
|
|
0
|
28
|
April 6, 2024
|