|
[Resource Topic] 2025/2078: Broadcast for Dynamic Committees without Trusted Setup
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2077: Malicious Homomorphic Secret Sharing with Applications to DV-NIZK and More
|
|
0
|
7
|
November 13, 2025
|
|
[Resource Topic] 2025/2076: Non-Interactive Blind Signatures from RSA Assumption and More
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2075: Leveled Isogeny Problems with Hints
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2074: VIA: Communication-Efficient Single-Server Private Information Retrieval
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2073: Recursion Enabled: Improved Cryptanalysis of the Permuted Kernel Problem
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2072: Multi-server Fuzzy Message Detection
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2071: On Cryptography and Distribution Verification, with Applications to Quantum Advantage
|
|
0
|
1
|
November 13, 2025
|
|
[Resource Topic] 2025/2070: MIFA: An MILP-based Framework for Improving Differential Fault Attacks
|
|
0
|
1
|
November 13, 2025
|
|
[Resource Topic] 2025/2069: Shorter Hash-Based Signatures Using Forced Pruning
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2068: Fast Networks for High-Performance Distributed Trust
|
|
0
|
2
|
November 13, 2025
|
|
[Resource Topic] 2025/2067: Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Channel Binding
|
|
0
|
1
|
November 13, 2025
|
|
[Resource Topic] 2025/2066: A Comprehensive Analysis of the AKMA+ Protocol
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2065: TensorSwitch: Nearly Optimal Polynomial Commitments from Tensor Codes
|
|
0
|
4
|
November 13, 2025
|
|
[Resource Topic] 2025/2064: Security of Private Set Operation Schemes: Separations and Implications
|
|
0
|
3
|
November 13, 2025
|
|
[Resource Topic] 2025/2063: QUIC-MLS: Making a Space Security Draft Standard Resilient for Disconnected Environments
|
|
0
|
5
|
November 9, 2025
|
|
[Resource Topic] 2025/2062: Cryptanalysis of Multi-Party Key Exchange Protocols over a Modified Supertropical Semiring
|
|
0
|
3
|
November 9, 2025
|
|
[Resource Topic] 2025/2061: Multivariate Signatures with Polynomial Factorization
|
|
0
|
1
|
November 9, 2025
|
|
[Resource Topic] 2025/2060: Multi-homogeneous XL
|
|
0
|
2
|
November 9, 2025
|
|
[Resource Topic] 2025/2059: Compact, Efficient and Non-Separable Hybrid Signatures
|
|
0
|
4
|
November 9, 2025
|
|
[Resource Topic] 2025/2058: Real-Time Encrypted Emotion Recognition Using Homomorphic Encryption
|
|
0
|
3
|
November 9, 2025
|
|
[Resource Topic] 2025/2057: Distributed Key Generation for Efficient Threshold-CKKS
|
|
0
|
2
|
November 9, 2025
|
|
[Resource Topic] 2025/2056: Unclonable Cryptography in Linear Quantum Memory
|
|
0
|
4
|
November 9, 2025
|
|
[Resource Topic] 2025/2055: On Proximity Gaps for Reed–Solomon Codes
|
|
0
|
2
|
November 9, 2025
|
|
[Resource Topic] 2025/2054: Optimal Proximity Gaps for Subspace-Design Codes and (Random) Reed-Solomon Codes
|
|
0
|
6
|
November 9, 2025
|
|
[Resource Topic] 2025/2053: DIFA-Rent: Division Property Based Fault Attacks on DEFAULT and BAKSHEESH
|
|
0
|
1
|
November 9, 2025
|
|
[Resource Topic] 2025/2052: SoK: Systematizing Hybrid Strategies for the Transition to Post-Quantum Cryptography
|
|
0
|
9
|
November 9, 2025
|
|
[Resource Topic] 2025/2051: All Polynomial Generators Preserve Distance with Mutual Correlated Agreement
|
|
0
|
2
|
November 9, 2025
|
|
[Resource Topic] 2025/2050: TPL: Power Leakage Model Based on Technology Library
|
|
0
|
2
|
November 9, 2025
|
|
[Resource Topic] 2025/2049: Black-Box Separation Between Multi-Collision Resistance and Collision Resistance
|
|
0
|
1
|
November 9, 2025
|