23:44 A subfield lattice attack on overstretched NTRU assumptions Cryptanalysis of some FHE and Graded En IACR
22:01 Adversary dependent Lossy Trapdoor Function from Hardness of Factoring Semi smooth RSA Subgroup Modu IACR
22:19 Annihilation Attacks for Multilinear Maps Cryptanalysis of Indistinguishability Obfuscation over GG IACR
22:37 Design in Type I, Run in Type III Fast and Scalable Bilinear Type Conversion using Integer Programm IACR
18:03 Efficient Zero Knowledge Proof of Algebraic and Non Algebraic Statements with Applications to Privac IACR
23:13 UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens IACR
21:58 On the Relationship between Statistical Zero Knowledge and Statistical Randomized Encodings IACR
19:03 ParTI Towards Combined Hardware Countermeasures against Side Channel and Fault Injection Attacks IACR