[Resource Topic] 2024/1858: (In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing
|
|
0
|
27
|
November 15, 2024
|
[Resource Topic] 2024/1857: Access-Controlled Inner Product Function-Revealing Encryption
|
|
0
|
25
|
November 15, 2024
|
[Resource Topic] 2024/1856: "There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting
|
|
0
|
25
|
November 15, 2024
|
[Resource Topic] 2024/1855: Lova: A Novel Framework for Verifying Mathematical Proofs with Incrementally Verifiable Computation
|
|
0
|
29
|
November 15, 2024
|
[Resource Topic] 2024/1854: A Zero-Knowledge PCP Theorem
|
|
0
|
27
|
November 15, 2024
|
[Resource Topic] 2024/1853: Giant Does NOT Mean Strong: Cryptanalysis of BQTRU
|
|
0
|
25
|
November 15, 2024
|
[Resource Topic] 2024/1852: Faster algorithms for isogeny computations over extensions of finite fields
|
|
0
|
26
|
November 15, 2024
|
[Resource Topic] 2024/1851: Secure Transformer-Based Neural Network Inference for Protein Sequence Classification
|
|
0
|
28
|
November 15, 2024
|
[Resource Topic] 2024/1850: Single-trace side-channel attacks on MAYO exploiting leaky modular multiplication
|
|
0
|
27
|
November 15, 2024
|
[Resource Topic] 2024/1849: A Linearisation Method for Identifying Dependencies in Differential Characteristics: Examining the Intersection of Deterministic Linear Relations and Nonlinear Constraints
|
|
0
|
24
|
November 15, 2024
|
[Resource Topic] 2024/1848: Non-Interactive Zero-Knowledge Proofs with Certified Deletion
|
|
0
|
38
|
November 11, 2024
|
[Resource Topic] 2024/1847: Notions of Quantum Reductions and Impossibility of Statistical NIZK
|
|
0
|
35
|
November 11, 2024
|
[Resource Topic] 2024/1846: The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy
|
|
0
|
41
|
November 11, 2024
|
[Resource Topic] 2024/1845: Single-Server Client Preprocessing PIR with Tight Space-Time Trade-off
|
|
0
|
34
|
November 11, 2024
|
[Resource Topic] 2024/1844: KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies
|
|
0
|
34
|
November 11, 2024
|
[Resource Topic] 2024/1843: Khatam: Reducing the Communication Complexity of Code-Based SNARKs
|
|
0
|
38
|
November 11, 2024
|
[Resource Topic] 2024/1842: Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs
|
|
0
|
31
|
November 11, 2024
|
[Resource Topic] 2024/1841: Verifying Jolt zkVM Lookup Semantics
|
|
0
|
35
|
November 11, 2024
|
[Resource Topic] 2024/1840: Ideal Pseudorandom Codes
|
|
0
|
36
|
November 11, 2024
|
[Resource Topic] 2024/1839: Cryptographically Secure Digital Consent
|
|
0
|
34
|
November 11, 2024
|
[Resource Topic] 2024/1838: Pushing the QAM method for finding APN functions further
|
|
0
|
28
|
November 11, 2024
|
[Resource Topic] 2024/1837: A Query Reconstruction Attack on the Chase-Shen Substring-Searchable Symmetric Encryption Scheme
|
|
0
|
23
|
November 11, 2024
|
[Resource Topic] 2024/1836: Symmetric Encryption on a Quantum Computer
|
|
0
|
29
|
November 11, 2024
|
[Resource Topic] 2024/1835: Hybrid Zero-Knowledge from Garbled Circuits
|
|
0
|
26
|
November 11, 2024
|
[Resource Topic] 2024/1834: Scutum: Temporal Verification for Cross-Rollup Bridges via Goal-Driven Reduction
|
|
0
|
43
|
November 8, 2024
|
[Resource Topic] 2024/1833: Private Neural Network Training with Packed Secret Sharing
|
|
0
|
33
|
November 8, 2024
|
[Resource Topic] 2024/1832: How to Delete Without a Trace: Certified Deniability in a Quantum World
|
|
0
|
36
|
November 8, 2024
|
[Resource Topic] 2024/1831: Fast Two-party Threshold ECDSA with Proactive Security
|
|
0
|
35
|
November 8, 2024
|
[Resource Topic] 2024/1830: A Tight Analysis of GHOST Consistency
|
|
0
|
37
|
November 8, 2024
|
[Resource Topic] 2024/1829: Compiled Nonlocal Games from any Trapdoor Claw-Free Function
|
|
0
|
43
|
November 8, 2024
|