|
[Resource Topic] 2022/929: PH = PSPACE
|
|
0
|
141
|
July 31, 2022
|
|
[Resource Topic] 2022/928: Universal Gaussian Elimination Hardware for Cryptographic Purposes
|
|
0
|
182
|
July 31, 2022
|
|
[Resource Topic] 2022/927: Fit The Joint Moments
|
|
0
|
190
|
July 31, 2022
|
|
[Resource Topic] 2022/926: Zero-Knowledge in EasyCrypt
|
|
0
|
105
|
July 31, 2022
|
|
[Resource Topic] 2022/925: Ad Hoc (Decentralized) Broadcast, Trace, and Revoke
|
|
0
|
158
|
July 31, 2022
|
|
[Resource Topic] 2022/924: FICS PCB X-ray: A dataset for automated printed circuit board inter-layers inspection
|
|
0
|
191
|
July 31, 2022
|
|
[Resource Topic] 2022/923: All for one and one for all: Fully decentralised privacy-preserving dark pool trading using multi-party computation
|
|
0
|
149
|
July 31, 2022
|
|
[Resource Topic] 2022/922: Estimating the Hidden Overheads in the BDGL Lattice Sieving Algorithm
|
|
0
|
112
|
July 31, 2022
|
|
[Resource Topic] 2022/921: Low-Delay 4, 5 and 6-Term Karatsuba Formulae in $\mathbb{F}_2[x]$ Using Overlap-free Splitting
|
|
0
|
93
|
July 31, 2022
|
|
[Resource Topic] 2022/920: Distributed, Private, Sparse Histograms in the Two-Server Model
|
|
0
|
120
|
July 31, 2022
|
|
[Resource Topic] 2022/919: Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking
|
|
0
|
174
|
July 31, 2022
|
|
[Resource Topic] 2022/918: Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds
|
|
0
|
157
|
July 31, 2022
|
|
[Resource Topic] 2022/917: Almost-Surely Terminating Asynchronous Byzantine Agreement Against General Adversaries with Optimal Resilience
|
|
0
|
133
|
July 31, 2022
|
|
[Resource Topic] 2022/916: Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
|
|
0
|
79
|
July 31, 2022
|
|
[Resource Topic] 2022/915: OpenFHE: Open-Source Fully Homomorphic Encryption Library
|
|
0
|
175
|
July 31, 2022
|
|
[Resource Topic] 2022/914: Cryptanalyzing MEGA in Six Queries
|
|
0
|
160
|
July 31, 2022
|
|
[Resource Topic] 2022/913: On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience
|
|
0
|
76
|
July 31, 2022
|
|
[Resource Topic] 2022/912: Individual Discrete Logarithm with Sublattice Reduction
|
|
0
|
161
|
July 31, 2022
|
|
[Resource Topic] 2022/911: Some Security Arguments For Xifrat1
|
|
0
|
91
|
July 31, 2022
|
|
[Resource Topic] 2022/909: Multi-Instance Secure Public-Key Encryption
|
|
0
|
116
|
July 31, 2022
|
|
[Resource Topic] 2022/908: On fast computations of numerical parameters of homogeneous algebraic graphs of large girth and small diameter and encryption of large files
|
|
0
|
137
|
July 31, 2022
|
|
[Resource Topic] 2022/907: A New Approach to Post-Quantum Non-Malleability
|
|
0
|
201
|
July 31, 2022
|
|
[Resource Topic] 2022/906: A Random Oracle for All of Us
|
|
0
|
163
|
July 31, 2022
|
|
[Resource Topic] 2022/905: Tight Security Analysis of the Public Permutation-Based PMAC_Plus
|
|
0
|
170
|
July 31, 2022
|
|
[Resource Topic] 2022/904: Patient Zero and Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE
|
|
0
|
84
|
July 31, 2022
|
|
[Resource Topic] 2022/903: Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling
|
|
0
|
158
|
July 31, 2022
|
|
[Resource Topic] 2022/902: MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably
|
|
0
|
110
|
July 31, 2022
|
|
[Resource Topic] 2022/901: Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive.
|
|
0
|
151
|
July 31, 2022
|
|
[Resource Topic] 2022/900: On the key generation in SQISign
|
|
0
|
111
|
July 31, 2022
|
|
[Resource Topic] 2022/899: Deep Learning-Based Medical Diagnostic Services: A Secure, Lightweight, and Accurate Realization
|
|
0
|
95
|
July 31, 2022
|