[Resource Topic] 2024/1768: Push-Button Verification for BitVM Implementations
|
|
0
|
40
|
October 30, 2024
|
[Resource Topic] 2024/1767: ECPM Cryptanalysis Resource Estimation
|
|
0
|
33
|
October 30, 2024
|
[Resource Topic] 2024/1766: Critical Round in Multi-Round Proofs: Compositions and Transformation to Trapdoor Commitments
|
|
0
|
26
|
October 30, 2024
|
[Resource Topic] 2024/1765: Compact and Tightly Secure (Anonymous) IBE from Module LWE in the QROM
|
|
0
|
38
|
October 30, 2024
|
[Resource Topic] 2024/1764: Fully Homomorphic Encryption with Efficient Public Verification
|
|
0
|
33
|
October 30, 2024
|
[Resource Topic] 2024/1763: Quantum Black-Box Separations: Succinct Non-Interactive Arguments from Falsifiable Assumptions
|
|
0
|
29
|
October 30, 2024
|
[Resource Topic] 2024/1762: Homomorphic Matrix Operations under Bicyclic Encoding
|
|
0
|
28
|
October 30, 2024
|
[Resource Topic] 2024/1761: Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing
|
|
0
|
29
|
October 30, 2024
|
[Resource Topic] 2024/1760: Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN
|
|
0
|
34
|
October 30, 2024
|
[Resource Topic] 2024/1759: A Forgery Attack on a Code-based Signature Scheme
|
|
0
|
35
|
October 30, 2024
|
[Resource Topic] 2024/1758: A comprehensive analysis of Regev's quantum algorithm
|
|
0
|
33
|
October 30, 2024
|
[Resource Topic] 2024/1757: On the Sample Complexity of Linear Code Equivalence for all Code Rates
|
|
0
|
34
|
October 30, 2024
|
[Resource Topic] 2024/1756: $\mathsf{Graphiti}$: Secure Graph Computation Made More Scalable
|
|
0
|
33
|
October 30, 2024
|
[Resource Topic] 2024/1755: Exponential sums in linear cryptanalysis
|
|
0
|
37
|
October 30, 2024
|
[Resource Topic] 2024/1754: PQNTRU: Acceleration of NTRU-based Schemes via Customized Post-Quantum Processor
|
|
0
|
29
|
October 30, 2024
|
[Resource Topic] 2024/1753: HTCNN: High-Throughput Batch CNN Inference with Homomorphic Encryption for Edge Computing
|
|
0
|
27
|
October 30, 2024
|
[Resource Topic] 2024/1752: DEEP Commitments and Their Applications
|
|
0
|
43
|
October 28, 2024
|
[Resource Topic] 2024/1751: Offline-Online Indifferentiability of Cryptographic Systems
|
|
0
|
36
|
October 28, 2024
|
[Resource Topic] 2024/1750: Robust Double Auctions for Resource Allocation
|
|
0
|
35
|
October 28, 2024
|
[Resource Topic] 2024/1749: Revisiting the “improving the security of multi-party quantum key agreement with five- qubit Brown states”
|
|
0
|
33
|
October 28, 2024
|
[Resource Topic] 2024/1748: A Simple Method to Test the Zeros of Riemann Zeta Function
|
|
0
|
51
|
October 28, 2024
|
[Resource Topic] 2024/1747: POMS : Proxy Offloading for Multicloud Storage with Keyword Search
|
|
0
|
32
|
October 28, 2024
|
[Resource Topic] 2024/1746: Secure and Privacy-preserving CBDC Offline Payments using a Secure Element
|
|
0
|
39
|
October 28, 2024
|
[Resource Topic] 2024/1745: Pseudorandomness in the (Inverseless) Haar Random Oracle Model
|
|
0
|
38
|
October 28, 2024
|
[Resource Topic] 2024/1744: PEARL-SCALLOP: Parameter Extension Applicable in Real-Life SCALLOP
|
|
0
|
38
|
October 28, 2024
|
[Resource Topic] 2024/1743: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs
|
|
0
|
34
|
October 28, 2024
|
[Resource Topic] 2024/1742: Pseudorandom Obfuscation and Applications
|
|
0
|
39
|
October 28, 2024
|
[Resource Topic] 2024/1741: The Learning Stabilizers with Noise problem
|
|
0
|
34
|
October 25, 2024
|
[Resource Topic] 2024/1740: OpenNTT: An Automated Toolchain for Compiling High-Performance NTT Accelerators in FHE
|
|
0
|
42
|
October 25, 2024
|
[Resource Topic] 2024/1739: Provably Robust Watermarks for Open-Source Language Models
|
|
0
|
35
|
October 25, 2024
|