[Resource Topic] 2025/523: Assembly optimised Curve25519 and Curve448 implementations for ARM Cortex-M4 and Cortex-M33
|
|
0
|
4
|
March 21, 2025
|
[Resource Topic] 2025/522: New Techniques for Analyzing Fully Secure Protocols: A Case Study of Solitary Output Secure Computation
|
|
0
|
3
|
March 21, 2025
|
[Resource Topic] 2025/521: Division polynomials for arbitrary isogenies
|
|
0
|
4
|
March 21, 2025
|
[Resource Topic] 2025/520: Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework
|
|
0
|
0
|
March 21, 2025
|
[Resource Topic] 2025/519: mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software
|
|
0
|
4
|
March 21, 2025
|
[Resource Topic] 2025/518: Secret-Sharing Schemes for General Access Structures: An Introduction
|
|
0
|
1
|
March 21, 2025
|
[Resource Topic] 2025/517: Designated-Verifier SNARGs with One Group Element
|
|
0
|
6
|
March 21, 2025
|
[Resource Topic] 2025/516: Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action
|
|
0
|
5
|
March 21, 2025
|
[Resource Topic] 2025/515: Compressed Sigma Protocols: New Model and Aggregation Techniques
|
|
0
|
9
|
March 21, 2025
|
[Resource Topic] 2025/514: On Extractability of the KZG Family of Polynomial Commitment Schemes
|
|
0
|
2
|
March 21, 2025
|
[Resource Topic] 2025/513: Server-Aided Anonymous Credentials
|
|
0
|
4
|
March 21, 2025
|
[Resource Topic] 2025/512: Optimizing AES-GCM on ARM Cortex-M4: A Fixslicing and FACE-Based Approach
|
|
0
|
2
|
March 21, 2025
|
[Resource Topic] 2025/511: VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials
|
|
0
|
4
|
March 20, 2025
|
[Resource Topic] 2025/510: Adaptive Adversaries in Byzantine-Robust Federated Learning: A survey
|
|
0
|
7
|
March 20, 2025
|
[Resource Topic] 2025/509: Almost Optimal KP and CP-ABE for Circuits from Succinct LWE
|
|
0
|
3
|
March 20, 2025
|
[Resource Topic] 2025/508: Towards Building Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing
|
|
0
|
5
|
March 20, 2025
|
[Resource Topic] 2025/507: Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning
|
|
0
|
7
|
March 20, 2025
|
[Resource Topic] 2025/506: On the Estonian Internet Voting System, IVXV, SoK and Suggestions
|
|
0
|
6
|
March 19, 2025
|
[Resource Topic] 2025/505: Capitalized Bitcoin Fork for National Strategic Reserve
|
|
0
|
2
|
March 19, 2025
|
[Resource Topic] 2025/504: Ideal Compartmented Secret Sharing Scheme Based on the Chinese Remainder Theorem for Polynomial Rings
|
|
0
|
6
|
March 19, 2025
|
[Resource Topic] 2025/503: Max Bias Analysis: A New Approach on Computing the Entropy of Free Ring-Oscillator
|
|
0
|
3
|
March 19, 2025
|
[Resource Topic] 2025/502: Registration-Based Encryption in the Plain Model
|
|
0
|
3
|
March 19, 2025
|
[Resource Topic] 2025/501: Quantum Key-Recovery Attacks on Permutation-Based Pseudorandom Functions
|
|
0
|
3
|
March 19, 2025
|
[Resource Topic] 2025/500: SecurED: Secure Multiparty Edit Distance for Genomic Sequences
|
|
0
|
3
|
March 17, 2025
|
[Resource Topic] 2025/499: SCAPEgoat: Side-channel Analysis Library
|
|
0
|
5
|
March 17, 2025
|
[Resource Topic] 2025/498: Scoop: An Optimizer for Profiling Attacks against Higher-Order Masking
|
|
0
|
3
|
March 17, 2025
|
[Resource Topic] 2025/497: Fast Scloud+: A Fast Hardware Implementation for the Unstructured LWE-based KEM - Scloud+
|
|
0
|
9
|
March 17, 2025
|
[Resource Topic] 2025/496: Shortcut2Secrets: A Table-based Differential Fault Attack Framework
|
|
0
|
3
|
March 17, 2025
|
[Resource Topic] 2025/495: A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks, Revisited
|
|
0
|
5
|
March 17, 2025
|
[Resource Topic] 2025/494: Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher
|
|
0
|
6
|
March 17, 2025
|