23:53 Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Ap... IACR
20:04 New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator IACR
23:36 Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations IACR
22:41 Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full $$\mathsf {MO... IACR
21:23 Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Re... IACR
21:38 BEST YOUNG RESEARCHERS AWARD: Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE IACR
22:12 Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate En... IACR
23:40 Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption IACR
20:00 Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilin... IACR
25:16 Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Ps... IACR
21:25 Security in the Presence of Key Reuse: Context-Separable Interfaces and Their Applications IACR