Speeding Up Multi-scalar Multiplications for Pairing-Based zkSNARKs Xinxin FanVeronika KuchtaLei Xu Research Article 03 April 2025 Article: 21
Two Generalizations of Almost Perfect Nonlinearity Claude Carlet Research Article Open access 26 February 2025 Article: 20
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks Hongrui CuiXiao WangYu Yu Research Article Open access 26 February 2025 Article: 19
Correction to: A Complete Analysis of the BKZ Lattice Reduction Algorithm Jianwei LiPhong Q. Nguyen Publisher Correction 30 January 2025 Article: 18
Ceno: Non-uniform, Segment and Parallel Zero-Knowledge Virtual Machine Tianyi LiuZhenfei ZhangYe Zhang Research Article 22 January 2025 Article: 17
Guaranteed Output in \(O(\sqrt{n})\) Rounds for Round-Robin Sampling Protocols Ran CohenJack DoernerAbhi Shelat Research Article 13 January 2025 Article: 16
Improved Universal Thresholdizer from Iterative Shamir Secret Sharing Jung Hee CheonWonhee ChoJiseung Kim Research Article 13 January 2025 Article: 15
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them Matteo CampanelliDario FioreRosario Gennaro Research Article 09 January 2025 Article: 14
Efficient Succinct Zero-Knowledge Arguments in the CL Framework Agathe BeaugrandGuilhem CastagnosFabien Laguillaumie Research Article 03 January 2025 Article: 13
A Complete Analysis of the BKZ Lattice Reduction Algorithm Jianwei LiPhong Q. Nguyen Research Article 13 December 2024 Article: 12
Fiat–Shamir Bulletproofs are Non-malleable (in the Random Oracle Model) Chaya GaneshClaudio OrlandiDaniel Tschudi Research Article 05 December 2024 Article: 11
An Efficient ZK Compiler from SIMD Circuits to General Circuits Dung BuiHaotian ChuYu Yu Research Article Open access 05 December 2024 Article: 10
Decrypting Without Keys: The Case of the GlobalPlatform SCP02 Protocol Gildas AvoineLoïc Ferreira OriginalPaper 05 December 2024 Article: 9
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness Chris BrzuskaGeoffroy Couteau Research Article Open access 04 December 2024 Article: 8
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae Gennaro AvitabileVincenzo BottaIvan Visconti Research Article 26 November 2024 Article: 7
Lattice-Based Zero-Knowledge Proofs in Action: Applications to Electronic Voting Valeh FarzaliyevCalvin PärnJan Willemson Research Article Open access 26 November 2024 Article: 6
Achievable CCA2 Relaxation for Homomorphic Encryption Adi AkaviaCraig GentryMargarita Vald Research Article Open access 26 November 2024 Article: 5
On Soundness Notions for Interactive Oracle Proofs Alexander R. BlockAlbert GarretaMichał Zając Research Article 12 November 2024 Article: 4
SwiftEC: Shallue–van de Woestijne Indifferentiable Function To Elliptic Curves Jorge Chávez-SaabFrancisco Rodríguez-HenríquezMehdi Tibouchi Research Article 12 November 2024 Article: 3
New Representations of the AES Key Schedule Gaëtan LeurentClara Pernot Research Article 01 November 2024 Article: 2
Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more Carmit HazayMuthuramakrishnan VenkitasubramaniamMor Weiss Research Article Open access 30 October 2024 Article: 1
Full Quantum Equivalence of Group Action DLog and CDH, and More Hart MontgomeryMark Zhandry Research Article 08 October 2024 Article: 39
Zeromorph: Zero-Knowledge Multilinear-Evaluation Proofs from Homomorphic Univariate Commitments Tohru KohritaPatrick Towa Research Article 08 October 2024 Article: 38
Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves Antonio SansoYoussef El Housni Research Article 08 October 2024 Article: 37
Memory-Efficient Attacks on Small LWE Keys Andre EsserArindam MukherjeeSantanu Sarkar Research Article 20 August 2024 Article: 36
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness Akinori HosoyamadaTakashi Yamakawa Research Article 20 August 2024 Article: 35
Randomness Recoverable Secret Sharing Schemes Mohammad HajiabadiShahram KhazaeiBehzad Vahdani Research Article 20 August 2024 Article: 34
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption Mihir BellareAnna Lysyanskaya Research Article Open access 19 August 2024 Article: 33
The Retracing Boomerang Attack, with Application to Reduced-Round AES Orr DunkelmanNathan KellerAdi Shamir Research Article Open access 15 July 2024 Article: 32
Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency Giacomo FenziHossein MoghaddasNgoc Khanh Nguyen Research Article Open access 10 July 2024 Article: 31
The Price of Active Security in Cryptographic Protocols Carmit HazayMuthuramakrishnan VenkitasubramaniamMor Weiss Research Article Open access 10 July 2024 Article: 30
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes David DerlerKai SamelinDaniel Slamanig Research Article Open access 02 July 2024 Article: 29
Algebraically Structured LWE, Revisited Chris PeikertZachary Pepin Research Article 13 June 2024 Article: 28
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience Victor ShoupNigel P. Smart Research Article Open access 06 June 2024 Article: 27
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for \(\varvec{\Sigma }\)-Protocols Lior RotemGil Segev Research Article 06 June 2024 Article: 26
Simple Constructions from (Almost) Regular One-Way Functions Noam MazorJiapeng Zhang Research Article Open access 30 May 2024 Article: 25
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors Danilo FrancatiDaniele FrioloDaniele Venturi Research Article Open access 14 May 2024 Article: 24
Compact NIZKs from Standard Assumptions on Bilinear Maps Shuichi KatsumataRyo NishimakiTakashi Yamakawa Research Article 13 May 2024 Article: 23
Watermarking PRFs and PKE Against Quantum Adversaries Fuyuki KitagawaRyo Nishimaki Research Article 26 April 2024 Article: 22
Cryptographic Primitives with Hinting Property Navid AlamatiSikhar Patranabis Research Article 23 April 2024 Article: 21
Analysis of Multivariate Encryption Schemes: Application to Dob and \({C}^{*}\) Morten ØygardenPatrick FelkeHåvard Raddum Research Article 18 April 2024 Article: 20
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery Qianqian YangLing SongJian Weng Research Article 10 April 2024 Article: 19
Bitcoin as a Transaction Ledger: A Composable Treatment Christian BadertscherUeli MaurerVassilis Zikas Research Article Open access 04 April 2024 Article: 18
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates Aggelos KiayiasFeng-Hao LiuYiannis Tselekounis Research Article Open access 03 April 2024 Article: 17
Bandwidth-Hard Functions: Reductions and Lower Bounds Jeremiah BlockiPeiyuan LiuSamson Zhou Research Article 12 March 2024 Article: 16
The COLM Authenticated Encryption Scheme Elena AndreevaAndrey BogdanovKan Yasuda Research Article 07 March 2024 Article: 15
Collision Resistance from Multi-collision Resistance Ron D. RothblumPrashant Nalini Vasudevan Research Article Open access 06 March 2024 Article: 14
Entropy Computation for Oscillator-based Physical Random Number Generators David LubiczViktor Fischer Research Article Open access 29 February 2024 Article: 13
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting Dennis HofheinzJessica KochChristoph Striecks Research Article Open access 29 February 2024 Article: 12
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm Dmitrii Koshelev Research Article 27 February 2024 Article: 11