[Resource Topic] 2024/600: A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-
|
|
0
|
33
|
April 22, 2024
|
A bug has been found
|
|
0
|
66
|
April 19, 2024
|
[Resource Topic] 2024/599: Probabilistically Checkable Arguments for all NP
|
|
0
|
33
|
April 18, 2024
|
[Resource Topic] 2024/598: A Characterization of AE Robustness as Decryption Leakage Indistinguishability
|
|
0
|
31
|
April 18, 2024
|
[Resource Topic] 2024/597: Blockchain-based decentralized identity system: Design and security analysis
|
|
0
|
29
|
April 18, 2024
|
[Resource Topic] 2024/596: Cryptanalysis of signature schemes based on the root extraction problem over braid group
|
|
0
|
38
|
April 18, 2024
|
[Resource Topic] 2024/595: Analysis of Multivariate Encryption Schemes: Application to Dob and C*
|
|
0
|
27
|
April 18, 2024
|
[Resource Topic] 2024/555: Quantum Algorithms for Lattice Problems
|
|
1
|
305
|
April 16, 2024
|
Collection of X/Twitter Discussions
|
|
0
|
165
|
April 16, 2024
|
How does 2024/583 relate to the current result?
|
|
1
|
184
|
April 16, 2024
|
[Resource Topic] 2024/594: Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation
|
|
0
|
38
|
April 16, 2024
|
[Resource Topic] 2024/593: The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem
|
|
0
|
36
|
April 16, 2024
|
[Resource Topic] 2024/592: Asymptotics for the standard block size in primal lattice attacks: second order, formally verified
|
|
0
|
34
|
April 16, 2024
|
[Resource Topic] 2024/591: Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures
|
|
0
|
33
|
April 16, 2024
|
[Resource Topic] 2024/590: Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks
|
|
0
|
42
|
April 16, 2024
|
[Resource Topic] 2024/589: Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
|
|
0
|
46
|
April 16, 2024
|
[Resource Topic] 2024/588: Digital Signatures for Authenticating Compressed JPEG Images
|
|
0
|
32
|
April 16, 2024
|
[Resource Topic] 2024/587: Hidden $\Delta$-fairness: A Novel Notion for Fair Secure Two-Party Computation
|
|
0
|
31
|
April 16, 2024
|
[Resource Topic] 2024/586: Encryption Based Covert Channel for Large Language Models
|
|
0
|
35
|
April 16, 2024
|
[Resource Topic] 2024/585: A Complete Beginner Guide to the Number Theoretic Transform (NTT)
|
|
0
|
36
|
April 16, 2024
|
[Resource Topic] 2024/584: Efficient Implementations of Square-root Vélu's Formulas
|
|
0
|
28
|
April 16, 2024
|
[Resource Topic] 2024/583: A Note on Quantum Algorithms for Lattice Problems
|
|
0
|
86
|
April 16, 2024
|
[Resource Topic] 2024/582: Improved Alternating Moduli PRFs and Post-Quantum Signatures
|
|
0
|
38
|
April 16, 2024
|
[Resource Topic] 2024/581: Fault Attack on SQIsign
|
|
0
|
28
|
April 16, 2024
|
[Resource Topic] 2024/580: Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model
|
|
0
|
30
|
April 16, 2024
|
[Resource Topic] 2024/579: Tight Multi-user Security of Ascon and Its Large Key Extension
|
|
0
|
29
|
April 16, 2024
|
[Resource Topic] 2024/578: Assessing the quality of Random Number Generators through Neural Networks
|
|
0
|
26
|
April 16, 2024
|
[Resource Topic] 2024/577: Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box
|
|
0
|
30
|
April 16, 2024
|
[Resource Topic] 2024/576: On complexity of the problem of solving systems of tropical polynomial equations of degree two
|
|
0
|
30
|
April 16, 2024
|
[Resource Topic] 2024/575: Pairing Optimizations for Isogeny-based Cryptosystems
|
|
0
|
31
|
April 16, 2024
|