[Resource Topic] 2024/617: Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions
|
|
0
|
18
|
April 26, 2024
|
[Resource Topic] 2024/616: $\mathsf{Cougar}$: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption
|
|
0
|
15
|
April 26, 2024
|
[Resource Topic] 2024/615: Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA
|
|
0
|
17
|
April 26, 2024
|
[Resource Topic] 2024/614: Non-interactive Blind Signatures from Lattices
|
|
0
|
21
|
April 26, 2024
|
Isogeny Club - Season 4 - Talk #5: A survey on modular curves and their applications
|
|
0
|
49
|
April 24, 2024
|
[Resource Topic] 2024/613: Hadamard Product Argument from Lagrange-Based Univariate Polynomials
|
|
0
|
37
|
April 22, 2024
|
[Resource Topic] 2024/612: FHERMA: Building the Open-Source FHE Components Library for Practical Use
|
|
0
|
34
|
April 22, 2024
|
[Resource Topic] 2024/611: A Security Analysis of Restricted Syndrome Decoding Problems
|
|
0
|
33
|
April 22, 2024
|
[Resource Topic] 2024/610: Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation
|
|
0
|
35
|
April 22, 2024
|
[Resource Topic] 2024/609: New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes
|
|
0
|
33
|
April 22, 2024
|
[Resource Topic] 2024/608: The Practical Advantage of RSA over ECC and Pairings
|
|
0
|
33
|
April 22, 2024
|
[Resource Topic] 2024/607: Low-latency Secure Integrated Sensing and Communication with Transmitter Actions
|
|
0
|
31
|
April 22, 2024
|
[Resource Topic] 2024/606: Classical Commitments to Quantum States
|
|
0
|
36
|
April 22, 2024
|
[Resource Topic] 2024/605: Security Analysis of XHASH8/12
|
|
0
|
29
|
April 22, 2024
|
[Resource Topic] 2024/604: Generic MitM Attack Frameworks on Sponge Constructions
|
|
0
|
28
|
April 22, 2024
|
[Resource Topic] 2024/603: Worst-Case to Average-Case Hardness of LWE: A Simple and Practical Perspective
|
|
0
|
33
|
April 22, 2024
|
[Resource Topic] 2024/602: Secret-Sharing Schemes for High Slices
|
|
0
|
28
|
April 22, 2024
|
[Resource Topic] 2024/601: Improved Provable Reduction of NTRU and Hypercubic Lattices
|
|
0
|
32
|
April 22, 2024
|
[Resource Topic] 2024/600: A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-
|
|
0
|
32
|
April 22, 2024
|
A bug has been found
|
|
0
|
66
|
April 19, 2024
|
[Resource Topic] 2024/599: Probabilistically Checkable Arguments for all NP
|
|
0
|
33
|
April 18, 2024
|
[Resource Topic] 2024/598: A Characterization of AE Robustness as Decryption Leakage Indistinguishability
|
|
0
|
31
|
April 18, 2024
|
[Resource Topic] 2024/597: Blockchain-based decentralized identity system: Design and security analysis
|
|
0
|
29
|
April 18, 2024
|
[Resource Topic] 2024/596: Cryptanalysis of signature schemes based on the root extraction problem over braid group
|
|
0
|
38
|
April 18, 2024
|
[Resource Topic] 2024/595: Analysis of Multivariate Encryption Schemes: Application to Dob and C*
|
|
0
|
27
|
April 18, 2024
|
[Resource Topic] 2024/555: Quantum Algorithms for Lattice Problems
|
|
1
|
304
|
April 16, 2024
|
Collection of X/Twitter Discussions
|
|
0
|
165
|
April 16, 2024
|
How does 2024/583 relate to the current result?
|
|
1
|
184
|
April 16, 2024
|
[Resource Topic] 2024/594: Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation
|
|
0
|
38
|
April 16, 2024
|
[Resource Topic] 2024/593: The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem
|
|
0
|
36
|
April 16, 2024
|