20:41 One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols IACR
18:12 Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for ... IACR
23:02 High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomia... IACR
31:02 Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techn... IACR
20:44 A 2^{n/2}-Time Algorithm for \sqrt{n}-SVP and \sqrt{n}-Hermite SVP, and an Improved Time-Approx... IACR
21:53 New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption – Strong... IACR
21:10 On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work IACR
18:28 The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Fre... IACR
19:46 The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Si... IACR
28:43 Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems o... IACR
21:19 Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptio... IACR
24:35 On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle ... IACR
30:53 "Bifurcated Cryptography" Folding Competing Cryptosystems into a Single Scheme: On Accountabili... IACR