| 201 |
New MDS Self-dual Codes over Finite Fields of Odd Characteristic
Xiaolei Fang, Khawla Lebed, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
39 |
7 years ago |
| 202 |
Solving multivariate polynomial systems and an invariant from commutative algebra
Alessio Caminata, Elisa Gorla
|
👻
Ghosted
|
cs.CR
|
39 |
8 years ago |
| 203 |
New algorithm for the discrete logarithm problem on elliptic curves
Igor Semaev
|
👻
Ghosted
|
cs.CR
|
39 |
11 years ago |
| 204 |
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Ahmet Can Mert, Aikata, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
39 |
3 years ago |
| 205 |
Secure Software Leasing from Standard Assumptions
Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
|
👻
Ghosted
|
quant-ph
|
38 |
5 years ago |
| 206 |
Theory of supports for linear codes endowed with the sum-rank metric
Umberto Martínez-Peñas
|
👻
Ghosted
|
cs.IT
|
38 |
7 years ago |
| 207 |
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations
Jean-Charles Faug`ere, Kelsey Horan, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
38 |
8 years ago |
| 208 |
AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE
Wei Ao, Vishnu Naresh Boddeti
|
👻
Ghosted
|
cs.LG
|
38 |
2 years ago |
| 209 |
Deep Neural Networks for Encrypted Inference with TFHE
Andrei Stoian, Jordan Frery, ... (+4 more)
|
👻
Ghosted
|
cs.LG
|
38 |
3 years ago |
| 210 |
Quantum Period Finding against Symmetric Primitives in Practice
Xavier Bonnetain, Samuel Jaques
|
👻
Ghosted
|
quant-ph
|
37 |
5 years ago |
| 211 |
Ramanujan graphs in cryptography
Anamaria Costache, Brooke Feigon, ... (+3 more)
|
👻
Ghosted
|
math.NT
|
37 |
7 years ago |
| 212 |
Correctness and Fairness of Tendermint-core Blockchains
Yackolley Amoussou-Guenou, Antonella Del Pozzo, ... (+2 more)
|
👻
Ghosted
|
cs.DC
|
37 |
7 years ago |
| 213 |
New Constructions of Permutation Polynomials of the Form $x^rh\left(x^{q-1}\right)$ over $\mathbb{F}_{q^2}$
Kangquan Li, Longjiang Qu, Qiang Wang
|
👻
Ghosted
|
cs.IT
|
37 |
8 years ago |
| 214 |
Order-Revealing Encryption and the Hardness of Private Learning
Mark Bun, Mark Zhandry
|
👻
Ghosted
|
cs.CR
|
37 |
11 years ago |
| 215 |
How to Construct Random Unitaries
Fermi Ma, Hsin-Yuan Huang
|
👻
Ghosted
|
quant-ph
|
37 |
1 year ago |
| 216 |
Blockchain Large Language Models
Yu Gai, Liyi Zhou, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
37 |
3 years ago |
| 217 |
Remarks on a Tropical Key Exchange System
Dylan Rudy, Chris Monico
|
👻
Ghosted
|
cs.CR
|
36 |
5 years ago |
| 218 |
Talek: Private Group Messaging with Hidden Access Patterns
Raymond Cheng, William Scott, ... (+6 more)
|
👻
Ghosted
|
cs.CR
|
36 |
6 years ago |
| 219 |
$μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Joost Renes, Peter Schwabe, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
36 |
10 years ago |
| 220 |
A new chaos-based watermarking algorithm
Jacques M. Bahi, Christophe Guyeux
|
👻
Ghosted
|
cs.MM
|
36 |
10 years ago |
| 221 |
Statistical Decoding 2.0: Reducing Decoding to LPN
Kevin Carrier, Thomas Debris-Alazard, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
36 |
3 years ago |
| 222 |
A Systematic Literature Review on Blockchain Enabled Federated Learning Framework for Internet of Vehicles
Mustain Billah, Sk. Tanzir Mehedi, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
36 |
4 years ago |
| 223 |
Fast and robust quantum state tomography from few basis measurements
Fernando G. S. L. Brandão, Richard Kueng, Daniel Stilck França
|
👻
Ghosted
|
quant-ph
|
35 |
5 years ago |
| 224 |
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes
Fabio De Gaspari, Dorjan Hitaj, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
35 |
6 years ago |
| 225 |
The supersingular isogeny problem in genus 2 and beyond
Craig Costello, Benjamin Smith
|
👻
Ghosted
|
cs.CR
|
35 |
6 years ago |
| 226 |
Generalized Gabidulin codes over fields of any characteristic
Daniel Augot, Pierre Loidreau, Gwezheneg Robert
|
👻
Ghosted
|
cs.IT
|
35 |
9 years ago |
| 227 |
On New Quantum Codes From Matrix Product Codes
Xiusheng Liu, Hualu Liu, Long Yu
|
👻
Ghosted
|
cs.IT
|
35 |
10 years ago |
| 228 |
Evaluation of the Hamming weights of a class of linear codes based on Gauss sums
Ziling Heng, Qin Yue
|
👻
Ghosted
|
cs.IT
|
35 |
10 years ago |
| 229 |
Partial Spread and Vectorial Generalized Bent Functions
Thor Martinsen, Wilfried Meidl, Pantelimon Stanica
|
👻
Ghosted
|
cs.IT
|
35 |
10 years ago |
| 230 |
What Can Cryptography Do For Decentralized Mechanism Design
Elaine Shi, Hao Chung, Ke Wu
|
👻
Ghosted
|
cs.GT
|
35 |
3 years ago |
| 231 |
Secure and Reliable Key Agreement with Physical Unclonable Functions
Onur Günlü, Tasnad Kernetzky, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
34 |
6 years ago |
| 232 |
Distance Distributions of Cyclic Orbit Codes
Heide Gluesing-Luerssen, Hunter Lehmann
|
👻
Ghosted
|
cs.IT
|
34 |
6 years ago |
| 233 |
Cryptographically Strong Permutations from the Butterfly Structure
Kangquan Li, Chunlei Li, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
34 |
6 years ago |
| 234 |
Polynomial-Time Key Recovery Attack on the Faure-Loidreau Scheme based on Gabidulin Codes
Philippe Gaborit, Ayoub Otmani, Hervé Talé Kalachi
|
👻
Ghosted
|
cs.CR
|
34 |
9 years ago |
| 235 |
Correcting Subverted Random Oracles
Alexander Russell, Qiang Tang, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
34 |
2 years ago |
| 236 |
Cryptography with Certified Deletion
James Bartusek, Dakshita Khurana
|
👻
Ghosted
|
quant-ph
|
34 |
3 years ago |
| 237 |
Failing to hash into supersingular isogeny graphs
Jeremy Booher, Ross Bowden, ... (+13 more)
|
👻
Ghosted
|
math.NT
|
34 |
4 years ago |
| 238 |
Lic-Sec: an enhanced AppArmor Docker security profile generator
Hui Zhu, Christian Gehrmann
|
👻
Ghosted
|
cs.CR
|
33 |
5 years ago |
| 239 |
Reparo: Publicly Verifiable Layer to Repair Blockchains
Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
33 |
6 years ago |
| 240 |
Hamming and simplex codes for the sum-rank metric
Umberto Martínez-Peñas
|
👻
Ghosted
|
cs.IT
|
33 |
6 years ago |
| 241 |
A one-query lower bound for unitary synthesis and breaking quantum cryptography
Alex Lombardi, Fermi Ma, John Wright
|
👻
Ghosted
|
quant-ph
|
33 |
2 years ago |
| 242 |
SEV-Step: A Single-Stepping Framework for AMD-SEV
Luca Wilke, Jan Wichelmann, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
33 |
2 years ago |
| 243 |
Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem
Magali Bardet, Pierre Briaud, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
33 |
3 years ago |
| 244 |
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Robin Geelen, Michiel Van Beirendonck, ... (+9 more)
|
👻
Ghosted
|
cs.CR
|
33 |
3 years ago |
| 245 |
Centralization in Block Building and Proposer-Builder Separation
Maryam Bahrani, Pranav Garimidi, Tim Roughgarden
|
👻
Ghosted
|
cs.GT
|
32 |
2 years ago |
| 246 |
New Galois Hulls of GRS Codes and Application to EAQECCs
Xiaolei Fang, Renjie Jin, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
32 |
5 years ago |
| 247 |
Conditionals in Homomorphic Encryption and Machine Learning Applications
Diego Chialva, Ann Dooms
|
👻
Ghosted
|
cs.CR
|
32 |
7 years ago |
| 248 |
On the Feasibility of Decentralized Derivatives Markets
Shayan Eskandari, Jeremy Clark, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
32 |
8 years ago |
| 249 |
On self-dual and LCD double circulant and double negacirculant codes over $\mathbb{F}_q + u\mathbb{F}_q$
Minjia Shi, Hongwei Zhu, ... (+3 more)
|
👻
Ghosted
|
cs.IT
|
32 |
7 years ago |
| 250 |
Commitments from Quantum One-Wayness
Dakshita Khurana, Kabir Tomer
|
👻
Ghosted
|
quant-ph
|
32 |
2 years ago |