Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Cryptology ePrint Archive
striveceo.github.io
On the Security and Privacy of
CKKS-based
Homomorphic
Evaluation Protocols
eprint.iacr.org
·
63w
Functional
Oblivious
Transfer with Applications in
Privacy-Preserving
Machine Learning
eprint.iacr.org
·
63w
Higher
Residuosity
Attacks on Small RSA
Subgroup
Decision Problems
eprint.iacr.org
·
63w
Polynomial Secret Sharing Schemes and
Algebraic
Matroids
eprint.iacr.org
·
63w
Traitor Tracing in Multi-sender Setting ($\
textsf
{
TMCFE
}$: Traceable Multi-client Functional Encryption)
eprint.iacr.org
·
63w
Stronger Security for
Threshold
Blind
Signatures
eprint.iacr.org
·
63w
Helix
: Scalable Multi-Party Machine Learning Inference against Malicious
Adversaries
eprint.iacr.org
·
63w
Publicly
Verifiable
Threshold Proxy Re-encryption and Its Application in Data Rights
Confirmation
eprint.iacr.org
·
63w
Publicly
Verifiable
Generalized Secret Sharing and Its Application in Building Decentralized Exchange
eprint.iacr.org
·
63w
CCA-Secure
Traceable
Threshold (ID-based) Encryption and Application
eprint.iacr.org
·
63w
Privacy-Preserving Multi-Signatures: Generic Techniques and
Constructions
Without
Pairings
eprint.iacr.org
·
63w
How to Share an
NP
Statement or
Combiners
for Zero-Knowledge Proofs
eprint.iacr.org
·
63w
Leap: A Fast, Lattice-based
OPRF
With Application to Private Set
Intersection
eprint.iacr.org
·
63w
Private Multi-Party Neural Network Training over $\
mathbb
{Z}_{2^k}$ via
Galois
Rings
eprint.iacr.org
·
63w
Partial and Fully
Homomorphic
Matching of IP Addresses Against
Blacklists
for Threat Analysis
eprint.iacr.org
·
64w
Committing
Authenticated
Encryption: Generic Transforms with Hash Functions
eprint.iacr.org
·
64w
Malleable
SNARKs
and Their Applications
eprint.iacr.org
·
64w
Practical Zero-Trust
Threshold
Signatures in Large-Scale Dynamic
Asynchronous
Networks
eprint.iacr.org
·
64w
Anamorphic-Resistant
Encryption; Or Why the Encryption Debate is Still Alive
eprint.iacr.org
·
64w
Dynamic Decentralized Functional Encryption:
Generic
Constructions
with Strong Security
eprint.iacr.org
·
64w
« Page 35
·
Page 37 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help