| 101 |
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
Zhipeng Wang, Stefanos Chaliasos, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
65 |
4 years ago |
| 102 |
One-Way Functions Imply Secure Computation in a Quantum World
James Bartusek, Andrea Coladangelo, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
64 |
5 years ago |
| 103 |
Secure Software Leasing
Prabhanjan Ananth, Rolando L. La Placa
|
👻
Ghosted
|
quant-ph
|
64 |
5 years ago |
| 104 |
Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs
Ahmad Al Badawi, Jin Chao, ... (+7 more)
|
👻
Ghosted
|
cs.CR
|
64 |
7 years ago |
| 105 |
On Finding Quantum Multi-collisions
Qipeng Liu, Mark Zhandry
|
👻
Ghosted
|
cs.CR
|
63 |
7 years ago |
| 106 |
Montgomery curves and their arithmetic
Craig Costello, Benjamin Smith
|
👻
Ghosted
|
cs.CR
|
63 |
9 years ago |
| 107 |
Instantaneous Decentralized Poker
Iddo Bentov, Ranjit Kumaresan, Andrew Miller
|
👻
Ghosted
|
cs.CR
|
63 |
9 years ago |
| 108 |
Stronger and Faster Side-Channel Protections for CSIDH
Daniel Cervantes-Vázquez, Mathilde Chenu, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
62 |
6 years ago |
| 109 |
RankSign: an efficient signature algorithm based on the rank metric
Philippe Gaborit, Olivier Ruatta, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
62 |
9 years ago |
| 110 |
A Geometric Approach to Rank Metric Codes and a Classification of Constant Weight Codes
Tovohery Hajatiana Randrianarisoa
|
👻
Ghosted
|
cs.IT
|
61 |
6 years ago |
| 111 |
LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
Marco Baldi, Alessandro Barenghi, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
61 |
8 years ago |
| 112 |
Binary linear complementary dual codes
Masaaki Harada, Ken Saito
|
🔮
The Ethereal
|
math.CO
|
61 |
8 years ago |
| 113 |
Quantum algorithms for computing short discrete logarithms and factoring RSA integers
Martin Ekerå, Johan Håstad
|
👻
Ghosted
|
cs.CR
|
61 |
9 years ago |
| 114 |
The Mathematical Foundations for Mapping Policies to Network Devices (Technical Report)
Dinesha Ranathunga, Matthew Roughan, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
61 |
9 years ago |
| 115 |
Galois Hulls of Linear Codes over Finite Fields
Hongwei Liu, Xu Pan
|
👻
Ghosted
|
cs.IT
|
60 |
7 years ago |
| 116 |
Conditional Cube Attack on Round-Reduced ASCON
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
|
👻
Ghosted
|
cs.CR
|
58 |
8 months ago |
| 117 |
Constructions of Maximum Distance Separable Symbol-Pair Codes Using Cyclic and Constacyclic Codes
Shuxing Li, Gennian Ge
|
👻
Ghosted
|
cs.IT
|
58 |
9 years ago |
| 118 |
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
Kai-Min Chung, Serge Fehr, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
57 |
5 years ago |
| 119 |
Non-interactive classical verification of quantum computation
Gorjan Alagic, Andrew M. Childs, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
57 |
6 years ago |
| 120 |
Private Aggregation from Fewer Anonymous Messages
Badih Ghazi, Pasin Manurangsi, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
57 |
6 years ago |
| 121 |
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
Mohsen Toorani
|
👻
Ghosted
|
cs.CR
|
57 |
11 years ago |
| 122 |
Optimal Binary LCD Codes
Stefka Bouyuklieva
|
👻
Ghosted
|
cs.IT
|
55 |
5 years ago |
| 123 |
The Adversarial Robustness of Sampling
Omri Ben-Eliezer, Eylon Yogev
|
👻
Ghosted
|
cs.DS
|
55 |
6 years ago |
| 124 |
A kilobit hidden SNFS discrete logarithm computation
Joshua Fried, Pierrick Gaudry, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
55 |
9 years ago |
| 125 |
Simpler Proofs of Quantumness
Zvika Brakerski, Venkata Koppula, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
54 |
5 years ago |
| 126 |
Tropical cryptography II: extensions by homomorphisms
Dima Grigoriev, Vladimir Shpilrain
|
👻
Ghosted
|
cs.CR
|
54 |
7 years ago |
| 127 |
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
Xin Li
|
🔮
The Ethereal
|
cs.CC
|
54 |
8 years ago |
| 128 |
FairTraDEX: A Decentralised Exchange Preventing Value Extraction
Conor McMenamin, Vanesa Daza, ... (+2 more)
|
👻
Ghosted
|
cs.GT
|
54 |
4 years ago |
| 129 |
New security notions and feasibility results for authentication of quantum data
Sumegha Garg, Henry Yuen, Mark Zhandry
|
👻
Ghosted
|
cs.CR
|
53 |
9 years ago |
| 130 |
On the c-differential uniformity of certain maps over finite fields
Sartaj Ul Hasan, Mohit Pal, ... (+2 more)
|
🔮
The Ethereal
|
math.CO
|
52 |
6 years ago |
| 131 |
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji, Youming Qiao, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
52 |
6 years ago |
| 132 |
Detecting Token Systems on Ethereum
Michael Fröwis, Andreas Fuchs, Rainer Böhme
|
👻
Ghosted
|
cs.CR
|
52 |
7 years ago |
| 133 |
New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic
Nian Li, Tor Helleseth
|
👻
Ghosted
|
cs.IT
|
52 |
9 years ago |
| 134 |
Tight adaptive reprogramming in the QROM
Alex B. Grilo, Kathrin Hövelmanns, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
51 |
5 years ago |
| 135 |
Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain, Rémi Bricout, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
51 |
6 years ago |
| 136 |
Post-quantum Zero Knowledge in Constant Rounds
Nir Bitansky, Omri Shmueli
|
👻
Ghosted
|
quant-ph
|
51 |
6 years ago |
| 137 |
Quantum Fully Homomorphic Encryption With Verification
Gorjan Alagic, Yfke Dulek, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
51 |
8 years ago |
| 138 |
New Constructions of MDS Symbol-Pair Codes
Baokun Ding, Gennian Ge, ... (+3 more)
|
👻
Ghosted
|
cs.IT
|
51 |
9 years ago |
| 139 |
Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Julien Lavauzelle, Julian Renner
|
👻
Ghosted
|
cs.IT
|
50 |
7 years ago |
| 140 |
Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Huiqin Xie, Li Yang
|
👻
Ghosted
|
quant-ph
|
50 |
8 years ago |
| 141 |
Pseudorandom States, Non-Cloning Theorems and Quantum Money
Zhengfeng Ji, Yi-Kai Liu, Fang Song
|
👻
Ghosted
|
quant-ph
|
50 |
8 years ago |
| 142 |
Constructions of cyclic constant dimension codes
Bocong Chen, Hongwei Liu
|
👻
Ghosted
|
cs.IT
|
50 |
8 years ago |
| 143 |
SALSA: Attacking Lattice Cryptography with Transformers
Emily Wenger, Mingjie Chen, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
50 |
3 years ago |
| 144 |
Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck, Thomas Decru, Benjamin Smith
|
👻
Ghosted
|
cs.CR
|
49 |
7 years ago |
| 145 |
A general private information retrieval scheme for MDS coded databases with colluding servers
Yiwei Zhang, Gennian Ge
|
👻
Ghosted
|
cs.IT
|
49 |
9 years ago |
| 146 |
A Note on Quantum-Secure PRPs
Mark Zhandry
|
👻
Ghosted
|
cs.CR
|
49 |
9 years ago |
| 147 |
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model
Andrea Coladangelo, Christian Majenz, Alexander Poremba
|
👻
Ghosted
|
quant-ph
|
48 |
5 years ago |
| 148 |
Semi-Quantum Money
Roy Radian, Or Sattath
|
👻
Ghosted
|
quant-ph
|
48 |
6 years ago |
| 149 |
Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
Devin Reich, Ariel Todoki, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
48 |
6 years ago |
| 150 |
Still Wrong Use of Pairings in Cryptography
Mehmet Sabir Kiraz, Osmanbey Uzunkol
|
👻
Ghosted
|
cs.CR
|
48 |
10 years ago |