[Resource Topic] 2024/1819: VCVio: A Formally Verified Forking Lemma and Fiat-Shamir Transform, via a Flexible and Expressive Oracle Representation
|
|
0
|
29
|
November 8, 2024
|
[Resource Topic] 2024/1818: SoK: On the Physical Security of UOV-based Signature Schemes
|
|
0
|
25
|
November 8, 2024
|
[Resource Topic] 2024/1817: Improved ML-DSA Hardware Implementation With First Order Masking Countermeasure
|
|
0
|
29
|
November 8, 2024
|
[Resource Topic] 2024/1816: Attacking Automotive RKE Security: How Smart are your ‘Smart’ Keys?
|
|
0
|
28
|
November 8, 2024
|
[Resource Topic] 2024/1815: Succinct Randomized Encodings from Non-compact Functional Encryption, Faster and Simpler
|
|
0
|
28
|
November 8, 2024
|
[Resource Topic] 2024/1814: SophOMR: Improved Oblivious Message Retrieval from SIMD-Aware Homomorphic Compression
|
|
0
|
21
|
November 8, 2024
|
[Resource Topic] 2024/1813: Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections
|
|
0
|
26
|
November 8, 2024
|
[Resource Topic] 2024/1812: Batching Adaptively-Sound SNARGs for NP
|
|
0
|
24
|
November 8, 2024
|
[Resource Topic] 2024/1811: Pseudorandom Function-like States from Common Haar Unitary
|
|
0
|
27
|
November 8, 2024
|
[Resource Topic] 2024/1810: Linear Proximity Gap for Reed-Solomon Codes within the 1.5 Johnson Bound
|
|
0
|
22
|
November 8, 2024
|
[Resource Topic] 2024/1809: Foundations of Adaptor Signatures
|
|
0
|
22
|
November 8, 2024
|
[Resource Topic] 2024/1808: Breaking BASS
|
|
0
|
26
|
November 8, 2024
|
[Resource Topic] 2024/1807: An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast
|
|
0
|
19
|
November 8, 2024
|
[Resource Topic] 2024/1806: Encrypted RAM Delegation: Applications to Rate-1 Extractable Arguments, Homomorphic NIZKs, MPC, and more
|
|
0
|
25
|
November 8, 2024
|
[Resource Topic] 2024/1805: Smoothing Parameter and Shortest Vector Problem on Random Lattices
|
|
0
|
15
|
November 8, 2024
|
[Resource Topic] 2024/1804: Quantum Chosen-Cipher Attack on Camellia
|
|
0
|
14
|
November 8, 2024
|
[Resource Topic] 2024/1803: Siniel: Distributed Privacy-Preserving zkSNARK
|
|
0
|
15
|
November 8, 2024
|
[Resource Topic] 2024/1802: Honey I shrunk the signatures: Covenants in Bitcoin via 160-bit hash collisions
|
|
0
|
13
|
November 8, 2024
|
[Resource Topic] 2024/1801: Investigation of the Optimal Linear Characteristics of BAKSHEESH (Full Version)
|
|
0
|
14
|
November 8, 2024
|
[Resource Topic] 2024/1800: Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth
|
|
0
|
13
|
November 8, 2024
|
[Resource Topic] 2024/1799: Consensus Under Adversary Majority Done Right
|
|
0
|
40
|
November 4, 2024
|
[Resource Topic] 2024/1798: Quantum One-Time Protection of any Randomized Algorithm
|
|
0
|
39
|
November 4, 2024
|
[Resource Topic] 2024/1797: FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels
|
|
0
|
36
|
November 4, 2024
|
[Resource Topic] 2024/1796: Isogeny interpolation and the computation of isogenies from higher dimensional representations
|
|
0
|
36
|
November 4, 2024
|
[Resource Topic] 2024/1795: How Fast Does the Inverse Walk Approximate a Random Permutation?
|
|
0
|
37
|
November 4, 2024
|
[Resource Topic] 2024/1794: How Much Public Randomness Do Modern Consensus Protocols Need?
|
|
0
|
35
|
November 4, 2024
|
[Resource Topic] 2024/1793: On the Jordan-Gauss graphs and new multivariate public keys
|
|
0
|
33
|
November 4, 2024
|
[Resource Topic] 2024/1792: Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture
|
|
0
|
32
|
November 4, 2024
|
[Resource Topic] 2024/1791: Discrete gaussian sampling for BKZ-reduced basis
|
|
0
|
35
|
November 4, 2024
|
[Resource Topic] 2024/1790: Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing
|
|
0
|
40
|
November 4, 2024
|