default search action
IACR Cryptology ePrint Archive, Volume 2025
Volume 2025, 2025
- Shweta Agrawal, Simran Kumari, Shota Yamada:
Attribute Based Encryption for Turing Machines from Lattices. 1 - Panagiotis Grontas, Aris Pagourtzis, Marianna Spyrakou:
Voting with coercion resistance and everlasting privacy using linkable ring signatures. 2 - Aditya Singh Rawat, Mahabir Prasad Jhanwar:
Post-Quantum DNSSEC with Faster TCP Fallbacks. 3 - Radhika Garg, Xiao Wang:
Smaug: Modular Augmentation of LLVM for MPC. 4 - Tanusree Sharma, Mizanur Rahman, Silvia Sandhi, Yang Wang, Rifat Shahriyar, S. M. Taiabul Haque:
What is "legal" and "illegal?": Social Norms, Current Practices and Perceived Risks among the Cryptocurrency Users in Bangladesh. 5 - Ittai Abraham, Renas Bacho, Julian Loss, Gilad Stern:
Nearly Quadratic Asynchronous Distributed Key Generation. 6 - Daniel Nager:
Non Linearizable Entropic Operator. 7 - Angold Wang:
A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials. 8 - Merve Karabulut, Reza Azarderakhsh:
Efficient CPA Attack on Hardware Implementation of ML-DSA in Post-Quantum Root of Trust. 9 - Anandarup Roy, Bimal Kumar Roy, Kouichi Sakurai, Suprita Talnikar:
A Combinatorial Approach to IoT Data Security. 10 - Dipayan Saha, Farimah Farahmandi:
DL-SCADS: Deep Learning-Based Post-Silicon Side-Channel Analysis Using Decomposed Signal. 11 - Wouter Legiest, Jan-Pieter D'Anvers, Bojan Spasic, Nam-Luc Tran, Ingrid Verbauwhede:
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell. 12 - José Reis, Mehmet Ugurbil, Sameer Wagh, Ryan Henry, Miguel de Vega:
Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms. 13 - Md Kawser Bepary, Arunabho Basu, Sajeed Mohammad, Rakibul Hassan, Farimah Farahmandi, Mark M. Tehranipoor:
SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity. 14 - Jianjun Hu:
A New Method for Solving Discrete Logarithm Based on Index Calculus. 15 - Yuval Efron, Ertem Nusret Tas:
Dynamically Available Common Subset. 16 - Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo:
New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version). 17 - Maxime Bombar, Nicolas Resch, Emiel Wiedijk:
On the Independence Assumption in Quasi-Cyclic Code-Based Cryptography. 18 - Hao Chung, Ke Wu, Elaine Shi:
Foundations of Platform-Assisted Auctions. 19 - Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, Heeseok Kim, Seokhie Hong:
ProbeShooter: A New Practical Approach for Probe Aiming. 20 - Thomas Johansson, Mustafa Khairallah, Vu Nguyen:
Efficient Authentication Protocols from the Restricted Syndrome Decoding Problem. 21 - Zhihao Li, Xuan Shen, Xianhui Lu, Ruida Wang, Yuan Zhao, Zhiwei Wang, Benqiang Wei:
Leveled Functional Bootstrapping via External Product Tree. 22 - Benjamin Dowling, Britta Hale, Xisen Tian, Bhagya Wimalasiri:
Cryptography is Rocket Science: Analysis of BPSec. 23 - Olivier Blazy, Emmanuel Conchon, Philippe Gaborit, Philippe Krejci, Cristina Onete:
Quantum-resistant secret handshakes with dynamic joining, leaving, and banishment: GCD revisited. 24
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.