[Resource Topic] 2025/794: Formal Analysis of Multi-Device Group Messaging in WhatsApp
|
|
0
|
1
|
May 5, 2025
|
[Resource Topic] 2025/793: Solving systems of polynomial equations via Macaulay matrices
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/792: A Scrutiny of the Security of AES-based Hashing and One-way Functions
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/791: Analysis of One Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/790: PULSE: Parallel Private Set Union for Large-Scale Entities
|
|
0
|
0
|
May 5, 2025
|
[Resource Topic] 2025/789: Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations
|
|
0
|
2
|
May 5, 2025
|
[Resource Topic] 2025/788: Identity-Based Ring Signature from Quantum Token
|
|
0
|
0
|
May 4, 2025
|
[Resource Topic] 2025/787: Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer
|
|
0
|
0
|
May 4, 2025
|
[Resource Topic] 2025/786: Robust and Verifiable MPC with Applications to Linear Machine Learning Inference
|
|
0
|
0
|
May 4, 2025
|
[Resource Topic] 2025/785: DNDK: Combining Nonce and Key Derivation for Fast and Scalable AEAD
|
|
0
|
1
|
May 4, 2025
|
[Resource Topic] 2025/784: SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm
|
|
0
|
0
|
May 4, 2025
|
[Resource Topic] 2025/783: Non-Adaptive Cryptanalytic Time-Space Lower Bounds via a Shearer-like Inequality for Permutations
|
|
0
|
0
|
May 4, 2025
|
[Resource Topic] 2025/782: AES Is Not Enough: the Block Ciphers Zoo Goes Homormorphic (over TFHE)
|
|
0
|
0
|
May 4, 2025
|
[Resource Topic] 2025/781: Generalizing the Augot-Finiasz PKE to Other Code Classes
|
|
0
|
1
|
May 2, 2025
|
[Resource Topic] 2025/780: The Planted Orthogonal Vectors Problem
|
|
0
|
0
|
May 2, 2025
|
[Resource Topic] 2025/779: Improving the Round Complexity of MiniCast
|
|
0
|
0
|
May 2, 2025
|
[Resource Topic] 2025/778: Cryptography from Lossy Reductions: Towards OWFs from ETH, and Beyond
|
|
0
|
0
|
May 2, 2025
|
[Resource Topic] 2025/777: Seamless Switching Between PBS and WoPBS for Scalable TFHE
|
|
0
|
0
|
May 2, 2025
|
[Resource Topic] 2025/776: Clementine: A Collateral-Efficient, Trust-Minimized, and Scalable Bitcoin Bridge
|
|
0
|
1
|
May 2, 2025
|
[Resource Topic] 2025/775: AuthOr: Lower Cost Authenticity-Oriented Garbling of Arbitrary Boolean Circuits
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/774: Towards a Modern LLL Implementation
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/773: Exploring Adversarial Attacks on the MaSTer Truncation Protocol
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/772: Publicly Auditable Garbled Circuit
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/771: Differential Fault Attacks on TFHE-friendly cipher $\textsf{FRAST}$
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/770: ZHE: Efficient Zero-Knowledge Proofs for HE Evaluations
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/769: Finding the Inverse of some Shift Invariant Transformations
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/768: Incompleteness in Number-Theoretic Transforms: New Tradeoffs and Faster Lattice-Based Cryptographic Applications
|
|
0
|
0
|
April 30, 2025
|
[Resource Topic] 2025/767: ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/766: Unbiasable Verifiable Random Functions from Generic Assumptions
|
|
0
|
1
|
April 30, 2025
|
[Resource Topic] 2025/765: ZKPoG: Accelerating WitGen-Incorporated End-to-End Zero-Knowledge Proof on GPU
|
|
0
|
0
|
April 30, 2025
|