15 | -- | 0 | Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Daniel Genkin, Yehuda Lindell, Ariel Nof. Fast Large-Scale Honest-Majority MPC for Malicious Adversaries |
16 | -- | 0 | Ananya Appan, Anirudh Chandramouli, Ashish Choudhury. Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries |
17 | -- | 0 | Cyril Bouvier, Guilhem Castagnos, Laurent Imbert, Fabien Laguillaumie. I Want to Ride My BICYCL : BICYCL Implements CryptographY in CLass Groups |
18 | -- | 0 | Murilo Coutinho, Iago Passos, Juan C. Grados Vásquez, Santanu Sarkar 0001, Fábio L. L. Mendonça, Rafael Timóteo de Sousa Jr., Fábio Borges. Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró |
19 | -- | 0 | Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, Pallab Dasgupta. Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning |
20 | -- | 0 | Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubácek. Must the Communication Graph of MPC Protocols be an Expander? |
21 | -- | 0 | Jun Furukawa 0001, Yehuda Lindell, Ariel Nof, Or Weinstein. High-Throughput Secure Three-Party Computation with an Honest Majority |
22 | -- | 0 | Nishat Koti, Shravani Mahesh Patil, Arpita Patra, Ajith Suresh. MPClan: Protocol Suite for Privacy-Conscious Computations |
23 | -- | 0 | Benoît Libert, San Ling, Khoa Nguyen 0002, Huaxiong Wang. Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors |
24 | -- | 0 | Bar Alon, Eran Omri. Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious |
25 | -- | 0 | Bar Alon, Ran Cohen, Eran Omri, Tom Suad. On the Power of an Honest Majority in Three-Party Computation Without Broadcast |
26 | -- | 0 | Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model |
27 | -- | 0 | Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta. Candidate iO from Homomorphic Encryption Schemes |
28 | -- | 0 | Loris Bergerat, Anas Boudi, Quentin Bourgerie, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap. Parameter Optimization and Larger Precision for (T)FHE |
29 | -- | 0 | Uddipana Dowerah, Subhranil Dutta, Aikaterini Mitrokotsa, Sayantan Mukherjee, Tapas Pal. Unbounded Predicate Inner Product Functional Encryption from Pairings |
31 | -- | 0 | Mariya Georgieva Belorgey, Sergiu Carpov, Kevin Deforth, Dimitar Jetchev, Abson Sae-Tang, Marius Vuille, Nicolas Gama, Jonathan Katz, Iraklis Leontiadis, Mohsen Mohammadi. Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic |