20:55 Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Ch... IACR
20:29 Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impo... IACR
17:44 An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks,... IACR
21:17 Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption IACR
25:39 Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Stor... IACR
20:36 Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers IACR
19:58 Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation? IACR
24:34 Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z IACR
25:30 Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multipart... IACR