[Resource Topic] 2025/1322: Generation of Fast Finite Field Arithmetic for Cortex-M4 with ECDH and SQIsign Applications
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1321: Threshold Receipt-Free Voting with Server-Side Vote Validation
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1320: Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1319: Bridging Usability and Performance: A Tensor Compiler for Autovectorizing Homomorphic Encryption
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1318: Lifeline: Optimal Byzantine Agreement Under Minimal Synchrony
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1317: FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm (Extended Version)
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1316: Scalable Information Theoretic Evaluation of the Rank Statistics in Side-Channel Attacks
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1315: CostSphere: A Cost Model-Driven Privacy-Preserving Machine Learning Framework with Network Context Adaptation
|
|
0
|
3
|
July 19, 2025
|
[Resource Topic] 2025/1314: Blink: A Family of Low-latency Tweakable Block Ciphers
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1313: Two-Server Sublinear PIR with Symmetric Privacy and Statistical Security
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1312: Can FrodoKEM Run in a Millisecond? FPGA Says Yes!
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1311: Batch subgroup membership testing on pairing-friendly curves
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1310: A Comprehensive Survey of Privacy-Preserving Decision Trees Based on Homomorphic Encryption
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1309: SoK: Deep Learning-based Side-channel Analysis Trends and Challenges
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1308: Efficient High-Order Masking of FrodoKEM’s CDT-Based Gaussian Sampler
|
|
0
|
3
|
July 19, 2025
|
[Resource Topic] 2025/1307: The Post-Quantum Security of Bitcoin's Taproot as a Commitment Scheme
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1306: Rethinking Learning-based Symmetric Cryptanalysis: a Theoretical Perspective
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1305: Barely Doubly-Efficient SimplePIR
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1304: Cascader: A Recurrence-Based Key Exchange Protocol
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1303: Bumpy RYDE: A New Hybrid Technique for Generic Rank-Metric Decoders
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1302: FHERMA Cookbook: FHE Components for Privacy-Preserving Applications
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1301: Evaluating Larger Lookup Tables using CKKS
|
|
0
|
3
|
July 16, 2025
|
[Resource Topic] 2025/1300: PlasmaFold: An Efficient and Scalable Layer 2 with Client-Side Proving
|
|
0
|
4
|
July 16, 2025
|
[Resource Topic] 2025/1299: Sota Voce: Low-Noise Sampling of Sparse Fixed-Weight Vectors
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1298: OverModRaise: Reducing Modulus Consumption of CKKS Bootstrapping
|
|
0
|
2
|
July 16, 2025
|
[Resource Topic] 2025/1297: On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1296: Gödel in Cryptography: Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness
|
|
0
|
6
|
July 16, 2025
|
[Resource Topic] 2025/1295: The computational refined Humbert invariant problem is equivalent to the computational isogeny problem
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1294: Interstellar: GKR Protocol based Low Prover Cost Folding Scheme for Circuit Satisfiability
|
|
0
|
0
|
July 16, 2025
|
[Resource Topic] 2025/1293: ECTester: Reverse-engineering side-channel countermeasures of ECC implementations
|
|
0
|
0
|
July 16, 2025
|