[Resource Topic] 2025/1329: Cryptanalysis of a multivariate CCZ scheme
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1328: Private Set Intersection and other Set Operations in the Third Party Setting
|
|
0
|
0
|
July 22, 2025
|
[Resource Topic] 2025/1327: Randomized Agreement, Verifiable Secret Sharing and Multi-Party Computation in Granular Synchrony
|
|
0
|
1
|
July 22, 2025
|
[Resource Topic] 2025/1326: New Techniques for Analyzing Differentials with Application to AES
|
|
0
|
3
|
July 22, 2025
|
[Resource Topic] 2025/1325: Revisiting the IPA-sumcheck connection
|
|
0
|
3
|
July 22, 2025
|
[Resource Topic] 2025/1324: FPGA-Friendly Compact andEfficient AES-like 8x8 S-Box
|
|
0
|
1
|
July 22, 2025
|
[Resource Topic] 2025/1323: Pairing-Based Batch Arguments for NP with a Linear-Size CRS
|
|
0
|
1
|
July 22, 2025
|
[Resource Topic] 2025/1322: Generation of Fast Finite Field Arithmetic for Cortex-M4 with ECDH and SQIsign Applications
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1321: Threshold Receipt-Free Voting with Server-Side Vote Validation
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1320: Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1319: Bridging Usability and Performance: A Tensor Compiler for Autovectorizing Homomorphic Encryption
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1318: Lifeline: Optimal Byzantine Agreement Under Minimal Synchrony
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1317: FunBic-CCA: Function Secret Sharing for Biclusterings Applied to Cheng and Church Algorithm (Extended Version)
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1316: Scalable Information Theoretic Evaluation of the Rank Statistics in Side-Channel Attacks
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1315: CostSphere: A Cost Model-Driven Privacy-Preserving Machine Learning Framework with Network Context Adaptation
|
|
0
|
3
|
July 19, 2025
|
[Resource Topic] 2025/1314: Blink: A Family of Low-latency Tweakable Block Ciphers
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1313: Two-Server Sublinear PIR with Symmetric Privacy and Statistical Security
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1312: Can FrodoKEM Run in a Millisecond? FPGA Says Yes!
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1311: Batch subgroup membership testing on pairing-friendly curves
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1310: A Comprehensive Survey of Privacy-Preserving Decision Trees Based on Homomorphic Encryption
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1309: SoK: Deep Learning-based Side-channel Analysis Trends and Challenges
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1308: Efficient High-Order Masking of FrodoKEM’s CDT-Based Gaussian Sampler
|
|
0
|
3
|
July 19, 2025
|
[Resource Topic] 2025/1307: The Post-Quantum Security of Bitcoin's Taproot as a Commitment Scheme
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1306: Rethinking Learning-based Symmetric Cryptanalysis: a Theoretical Perspective
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1305: Barely Doubly-Efficient SimplePIR
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1304: Cascader: A Recurrence-Based Key Exchange Protocol
|
|
0
|
0
|
July 19, 2025
|
[Resource Topic] 2025/1303: Bumpy RYDE: A New Hybrid Technique for Generic Rank-Metric Decoders
|
|
0
|
2
|
July 19, 2025
|
[Resource Topic] 2025/1302: FHERMA Cookbook: FHE Components for Privacy-Preserving Applications
|
|
0
|
1
|
July 19, 2025
|
[Resource Topic] 2025/1301: Evaluating Larger Lookup Tables using CKKS
|
|
0
|
3
|
July 16, 2025
|
[Resource Topic] 2025/1300: PlasmaFold: An Efficient and Scalable Layer 2 with Client-Side Proving
|
|
0
|
4
|
July 16, 2025
|