|
[Resource Topic] 2025/2019: Practical Multi-party Private Set Intersection with Reducible Zero-sharing
|
|
0
|
3
|
November 1, 2025
|
|
[Resource Topic] 2025/2018: Batched and Packed (Publicly) Verifiable Secret Sharing: A Unified Framework and Applications
|
|
0
|
3
|
November 1, 2025
|
|
[Resource Topic] 2025/2017: Secure Onion Encryption and the Case of Counter Galois Onion
|
|
0
|
5
|
November 1, 2025
|
|
[Resource Topic] 2025/2016: Constructions of a Family of Nonlinear Permutations of Any Possible Algebraic Degrees with the Optimal Threshold Implementations
|
|
0
|
5
|
November 1, 2025
|
|
[Resource Topic] 2025/2015: Proving Authenticated Key Exchange via Memory-Efficient Reductions
|
|
0
|
6
|
November 1, 2025
|
|
[Resource Topic] 2025/2014: Multi-Splitting Forking Based Modular Security of Signatures in Multivariate Quadratic Setting
|
|
0
|
2
|
November 1, 2025
|
|
[Resource Topic] 2025/2013: MARS: Low-Leakage Multi Adversarial Owner and Reader Replication-free Searchable Encryption from Private Information Retrieval
|
|
0
|
6
|
November 1, 2025
|
|
[Resource Topic] 2025/2012: Head Start: Digit Extraction in TFHE from MSB to LSB
|
|
0
|
6
|
November 1, 2025
|
|
[Resource Topic] 2025/2011: When the Wrong Key Lives On: The Key-Recovery Procedure in Integral Attacks
|
|
0
|
2
|
November 1, 2025
|
|
[Resource Topic] 2025/2010: On the Distribution of the Distances of Random Words
|
|
0
|
7
|
November 1, 2025
|
|
[Resource Topic] 2025/2009: When Randomness Isn’t Random: Practical Fault Attack on Post-Quantum Lattice Standards
|
|
0
|
5
|
November 1, 2025
|
|
[Resource Topic] 2025/2008: Two-Server Private Information Retrieval in Sublinear Time and Quasilinear Space
|
|
0
|
2
|
November 1, 2025
|
|
[Resource Topic] 2025/2007: k-Anonymous Group Signatures: Addressing Strict Content Moderation in End-to-End Secure Messaging Platforms
|
|
0
|
6
|
October 30, 2025
|
|
[Resource Topic] 2025/2006: OmniBA: Round-Efficient BA with Quadratic Communication under Mixed Faults
|
|
0
|
7
|
October 30, 2025
|
|
[Resource Topic] 2025/2005: Reactive Correctness, sINDCPA-D-Security and Deterministic Evaluation for TFHE
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/2004: Re-randomization Attack on the Certificateless Encryption Scheme proposed by Guo et al
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/2003: A Sparse Polynomial Multiplier for HQC Integrating Parallelism and Power-Based Side-Channel Countermeasures
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/2002: Pseudorandom Correlation Functions for Multiparty Beaver Triples from Sparse LPN
|
|
0
|
6
|
October 30, 2025
|
|
[Resource Topic] 2025/2001: On Computational VSS for General Access Structures
|
|
0
|
3
|
October 30, 2025
|
|
[Resource Topic] 2025/2000: Trust, But Verify When Using the Powers of Tau
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/1999: New Security Proofs of MPC-in-the-Head Signatures in the Quantum Random Oracle Model
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/1998: Non-adaptive One-Way to Hiding not only Implies Adaptive Quantum Reprogramming, but also Does Better
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/1997: Provable decryption failure security for practical lattice-based PKE
|
|
0
|
7
|
October 30, 2025
|
|
[Resource Topic] 2025/1996: Turning Multiple Key-Dependent Attacks into Universal Attacks
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/1995: Device-Bound Anonymous Credentials With(out) Trusted Hardware
|
|
0
|
5
|
October 30, 2025
|
|
[Resource Topic] 2025/1994: Separating Pseudorandom Generators from Logarithmic Pseudorandom States
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/1993: A Simplified Round-by-round Soundness Proof of FRI
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/1992: Towards Optimal Concurrent-Secure Blind Schnorr Signatures
|
|
0
|
2
|
October 30, 2025
|
|
[Resource Topic] 2025/1991: TWFalcon: Triple-Word Arithmetic for Falcon; Giving Falcon the Precision to Fly Securely
|
|
0
|
4
|
October 30, 2025
|
|
[Resource Topic] 2025/1990: Accelerating the Primal Hybrid Attack against Sparse LWE using GPUs
|
|
0
|
7
|
October 30, 2025
|