Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Cryptology ePrint Archive
striveceo.github.io
A
Fine-Grained
and Real-Time Functional Video
Encryption
and Sharing Scheme
eprint.iacr.org
·
37w
Privacy-Preserving Two-Party
RBF
Kernel SVM Training Based on Neat and Accurate Secure
Exponentiation
eprint.iacr.org
·
37w
PARSAN-Mix
: Packet-Aware Routing and
Shuffling
with Additional Noise for Latency Optimization in Mix Networks (Extended Version)
eprint.iacr.org
·
37w
Breaking the Layer Barrier:
Remodeling
Private Transformer Inference with Hybrid
CKKS
and MPC
eprint.iacr.org
·
37w
Trustless
Delegation
of Vector Commitment Construction in Resource-Constrained Settings
eprint.iacr.org
·
37w
AUPCH
: Auditable
Unlinkable
Payment Channel Hubs
eprint.iacr.org
·
37w
Universally
Composable Treatment of Multi-Party
Isomorphic
State Channels
eprint.iacr.org
·
38w
GoSSamer
: Lightweight and Linear-Communication Asynchronous (Dynamic
Proactive
) Secret Sharing and the Applications
eprint.iacr.org
·
38w
Privacy-Preserving Federated Inference for
Genomic
Analysis with
Homomorphic
Encryption
eprint.iacr.org
·
38w
Mosformer
:
Maliciously
Secure Three-Party Inference Framework for Large Transformers
eprint.iacr.org
·
38w
Data Matching in
Unequal
Worlds and Applications to Smart
Contracts
eprint.iacr.org
·
38w
Homomorphic
Secret Sharing with
Verifiable
Evaluation
eprint.iacr.org
·
38w
Glock
:
Garbled
Locks for Bitcoin
eprint.iacr.org
·
39w
Boosting Payment Channel Network
Liquidity
with
Topology
Optimization and Transaction Selection
eprint.iacr.org
·
39w
PicoGRAM
: Practical Garbled RAM from
Decisional
Diffie-Hellman
eprint.iacr.org
·
39w
Adaptively Secure Threshold
ElGamal
Decryption from
DDH
eprint.iacr.org
·
39w
Stateless
2PC
Signatures for Internet-Scale Authentication and Authorization
eprint.iacr.org
·
39w
Efficient Fuzzy
Labeled
PSI
from Vector Ring-OLE
eprint.iacr.org
·
39w
A Performance Comparison of the Homomorphic Encryption Schemes
CKKS
and
TFHE
eprint.iacr.org
·
39w
Not in The
Prophecies
: Practical Attacks on
Nostr
eprint.iacr.org
·
39w
« Page 20
·
Page 22 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help