[Resource Topic] 2024/1828: Classic McEliece Hardware Implementation with Enhanced Side-Channel and Fault Resistance
|
|
0
|
37
|
November 8, 2024
|
[Resource Topic] 2024/1827: OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM
|
|
0
|
36
|
November 8, 2024
|
[Resource Topic] 2024/1826: Cloning Games, Black Holes and Cryptography
|
|
0
|
31
|
November 8, 2024
|
[Resource Topic] 2024/1825: BrakingBase - a linear prover, poly-logarithmic verifier, field agnostic polynomial commitment scheme
|
|
0
|
31
|
November 8, 2024
|
[Resource Topic] 2024/1824: Constructing Dembowski–Ostrom permutation polynomials from upper triangular matrices
|
|
0
|
31
|
November 8, 2024
|
[Resource Topic] 2024/1823: A Composability Treatment of Bitcoin's Transaction Ledger with Variable Difficulty
|
|
0
|
31
|
November 8, 2024
|
[Resource Topic] 2024/1822: Anonymous Public-Key Quantum Money and Quantum Voting
|
|
0
|
32
|
November 8, 2024
|
[Resource Topic] 2024/1821: SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security
|
|
0
|
31
|
November 8, 2024
|
[Resource Topic] 2024/1820: On the Power of Oblivious State Preparation
|
|
0
|
29
|
November 8, 2024
|
[Resource Topic] 2024/1819: VCVio: A Formally Verified Forking Lemma and Fiat-Shamir Transform, via a Flexible and Expressive Oracle Representation
|
|
0
|
30
|
November 8, 2024
|
[Resource Topic] 2024/1818: SoK: On the Physical Security of UOV-based Signature Schemes
|
|
0
|
29
|
November 8, 2024
|
[Resource Topic] 2024/1817: Improved ML-DSA Hardware Implementation With First Order Masking Countermeasure
|
|
0
|
31
|
November 8, 2024
|
[Resource Topic] 2024/1816: Attacking Automotive RKE Security: How Smart are your ‘Smart’ Keys?
|
|
0
|
33
|
November 8, 2024
|
[Resource Topic] 2024/1815: Succinct Randomized Encodings from Non-compact Functional Encryption, Faster and Simpler
|
|
0
|
29
|
November 8, 2024
|
[Resource Topic] 2024/1814: SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression
|
|
0
|
23
|
November 8, 2024
|
[Resource Topic] 2024/1813: Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections
|
|
0
|
28
|
November 8, 2024
|
[Resource Topic] 2024/1812: Batching Adaptively-Sound SNARGs for NP
|
|
0
|
27
|
November 8, 2024
|
[Resource Topic] 2024/1811: Pseudorandom Function-like States from Common Haar Unitary
|
|
0
|
30
|
November 8, 2024
|
[Resource Topic] 2024/1810: Linear Proximity Gap for Reed-Solomon Codes within the 1.5 Johnson Bound
|
|
0
|
24
|
November 8, 2024
|
[Resource Topic] 2024/1809: Foundations of Adaptor Signatures
|
|
0
|
27
|
November 8, 2024
|
[Resource Topic] 2024/1808: Breaking BASS
|
|
0
|
31
|
November 8, 2024
|
[Resource Topic] 2024/1807: An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast
|
|
0
|
21
|
November 8, 2024
|
[Resource Topic] 2024/1806: Encrypted RAM Delegation: Applications to Rate-1 Extractable Arguments, Homomorphic NIZKs, MPC, and more
|
|
0
|
27
|
November 8, 2024
|
[Resource Topic] 2024/1805: Smoothing Parameter and Shortest Vector Problem on Random Lattices
|
|
0
|
16
|
November 8, 2024
|
[Resource Topic] 2024/1804: Quantum Chosen-Cipher Attack on Camellia
|
|
0
|
15
|
November 8, 2024
|
[Resource Topic] 2024/1803: Siniel: Distributed Privacy-Preserving zkSNARK
|
|
0
|
16
|
November 8, 2024
|
[Resource Topic] 2024/1802: Honey I shrunk the signatures: Covenants in Bitcoin via 160-bit hash collisions
|
|
0
|
15
|
November 8, 2024
|
[Resource Topic] 2024/1801: Investigation of the Optimal Linear Characteristics of BAKSHEESH (Full Version)
|
|
0
|
15
|
November 8, 2024
|
[Resource Topic] 2024/1800: Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth
|
|
0
|
16
|
November 8, 2024
|
[Resource Topic] 2024/1799: Consensus Under Adversary Majority Done Right
|
|
0
|
41
|
November 4, 2024
|