Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Cryptology ePrint Archive
striveceo.github.io
Highly Efficient
Actively
Secure Two-Party
Computation
with One-Bit Advantage Bound
eprint.iacr.org
·
58w
Low-Latency
Rate-Distortion-Perception
Trade-off: A
Randomized
Distributed Function Computation Application
eprint.iacr.org
·
58w
Clubcards
for the
WebPKI
: smaller certificate revocation tests in theory and practice
eprint.iacr.org
·
58w
Mobile
Byzantine
Agreement in a
Trusted
World
eprint.iacr.org
·
58w
SoK: Self-Generated
Nudes
over Private Chats: How Can Technology Contribute to a Safer
Sexting
?
eprint.iacr.org
·
58w
DSM
:
Decentralized
State Machine - The Missing Trust Layer of the Internet
eprint.iacr.org
·
58w
A Place for Everyone vs Everyone in its Place:
Measuring
and
Attacking
the Ethereum Global Network
eprint.iacr.org
·
58w
Reusable
Dynamic Multi-Party
Homomorphic
Encryption
eprint.iacr.org
·
58w
REGKYC
: Supporting Privacy and Compliance Enforcement for
KYC
in Blockchains
eprint.iacr.org
·
58w
Buffalo: A Practical Secure
Aggregation
Protocol for
Asynchronous
Federated Learning
eprint.iacr.org
·
59w
Zinnia
: An
Expressive
and Efficient Tensor-Oriented Zero-Knowledge Programming Framework
eprint.iacr.org
·
59w
Solving Data Availability
Limitations
in Client-Side Validation with
UTxO
Binding
eprint.iacr.org
·
59w
ThreatLens
: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security
Verification
eprint.iacr.org
·
59w
Public Key
Accumulators
for
Revocation
of Non-Anonymous Credentials
eprint.iacr.org
·
59w
Aegis: Scalable Privacy-preserving
CBDC
Framework with Dynamic Proof of
Liabilities
eprint.iacr.org
·
59w
Efficient
Proofs
of
Possession
for Legacy Signatures
eprint.iacr.org
·
59w
VeRange
: Verification-efficient Zero-knowledge Range Arguments with
Transparent
Setup for Blockchain Applications and More
eprint.iacr.org
·
60w
SoK
:
Fully-homomorphic
encryption in smart contracts
eprint.iacr.org
·
60w
AI Agents in
Cryptoland
: Practical Attacks and No Silver
Bullet
eprint.iacr.org
·
60w
Ring
Referral
: Efficient Publicly Verifiable Ad hoc Credential Scheme with Issuer and Strong User
Anonymity
for Decentralized Identity and More
eprint.iacr.org
·
60w
« Page 32
·
Page 34 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help