| 51 |
Access Control Encryption: Enforcing Information Flow with Cryptography
Ivan Damgård, Helene Haagh, Claudio Orlandi
|
👻
Ghosted
|
cs.CR
|
96 |
10 years ago |
| 52 |
Wendy, the Good Little Fairness Widget
Klaus Kursawe
|
👻
Ghosted
|
cs.CR
|
95 |
5 years ago |
| 53 |
Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg, Shafi Goldwasser, Prashant Nalini Vasudevan
|
👻
Ghosted
|
cs.CR
|
94 |
6 years ago |
| 54 |
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem
Ningyu He, Lei Wu, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
94 |
6 years ago |
| 55 |
A Classification Framework for Stablecoin Designs
Amani Moin, Emin Gün Sirer, Kevin Sekniqi
|
👻
Ghosted
|
q-fin.GN
|
92 |
6 years ago |
| 56 |
Towards practical key exchange from ordinary isogeny graphs
Luca De Feo, Jean Kieffer, Benjamin Smith
|
👻
Ghosted
|
cs.CR
|
92 |
7 years ago |
| 57 |
Congestion Attacks in Payment Channel Networks
Ayelet Mizrahi, Aviv Zohar
|
👻
Ghosted
|
cs.CR
|
91 |
6 years ago |
| 58 |
A New Chaos-Based Cryptosystem for Secure Transmitted Images
Abir Awad
|
👻
Ghosted
|
cs.CR
|
91 |
11 years ago |
| 59 |
Quantum Information Set Decoding Algorithms
Ghazal Kachigar, Jean-Pierre Tillich
|
👻
Ghosted
|
cs.CR
|
90 |
9 years ago |
| 60 |
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
Rishabh Poddar, Sukrit Kalra, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
89 |
5 years ago |
| 61 |
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks
Kalikinkar Mandal, Guang Gong
|
👻
Ghosted
|
cs.CR
|
86 |
5 years ago |
| 62 |
Some Bounds on Binary LCD Codes
Lucky Galvez, Jon-Lark Kim, ... (+3 more)
|
👻
Ghosted
|
cs.IT
|
86 |
9 years ago |
| 63 |
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models
Hanlin Zhang, Benjamin L. Edelman, ... (+4 more)
|
💤
Eternal Rest
|
cs.LG
|
85 |
2 years ago |
| 64 |
DEEP-FRI: Sampling outside the box improves soundness
Eli Ben-Sasson, Lior Goldberg, ... (+2 more)
|
🔮
The Ethereal
|
cs.CC
|
84 |
7 years ago |
| 65 |
Raziel: Private and Verifiable Smart Contracts on Blockchains
David Cerezo Sánchez
|
👻
Ghosted
|
cs.CR
|
84 |
7 years ago |
| 66 |
An Algebraic Attack on Rank Metric Code-Based Cryptosystems
Magali Bardet, Pierre Briaud, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
83 |
6 years ago |
| 67 |
Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources
Andrea Coladangelo, Alex Grilo, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
83 |
8 years ago |
| 68 |
Semantic Security and Indistinguishability in the Quantum World
Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner
|
👻
Ghosted
|
cs.CR
|
83 |
10 years ago |
| 69 |
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Zane Weissman, Thore Tiemann, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
82 |
6 years ago |
| 70 |
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
Mingchao Yu, Saeid Sahraei, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
82 |
6 years ago |
| 71 |
Phishing in an Academic Community: A Study of User Susceptibility and Behavior
Alejandra Diaz, Alan T. Sherman, Anupam Joshi
|
👻
Ghosted
|
cs.CR
|
82 |
7 years ago |
| 72 |
An Empirical Analysis of Privacy in the Lightning Network
George Kappos, Haaroon Yousaf, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
80 |
6 years ago |
| 73 |
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers
Madura A Shelton, Niels Samwel, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
79 |
6 years ago |
| 74 |
Compounding of Wealth in Proof-of-Stake Cryptocurrencies
Giulia Fanti, Leonid Kogan, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
78 |
7 years ago |
| 75 |
Several Classes of Permutation Trinomials From Niho Exponents
Nian Li, Tor Helleseth
|
👻
Ghosted
|
cs.IT
|
78 |
9 years ago |
| 76 |
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Jelle Don, Serge Fehr, Christian Majenz
|
👻
Ghosted
|
cs.CR
|
77 |
6 years ago |
| 77 |
NFT Wash Trading: Quantifying suspicious behaviour in NFT markets
Victor von Wachter, Johannes Rude Jensen, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
77 |
4 years ago |
| 78 |
SoK: Lending Pools in Decentralized Finance
Massimo Bartoletti, James Hsin-yu Chiang, Alberto Lluch-Lafuente
|
👻
Ghosted
|
cs.CR
|
76 |
5 years ago |
| 79 |
Publicly-Detectable Watermarking for Language Models
Jaiden Fairoze, Sanjam Garg, ... (+4 more)
|
👻
Ghosted
|
cs.LG
|
76 |
2 years ago |
| 80 |
Privacy-Preserving Contact Tracing: current solutions and open questions
Qiang Tang
|
👻
Ghosted
|
cs.CR
|
75 |
5 years ago |
| 81 |
Complete Weight Enumerators of a Family of Three-Weight Linear Codes
Shudi Yang, Zheng-An Yao
|
👻
Ghosted
|
cs.IT
|
75 |
10 years ago |
| 82 |
MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes
Daitao Huang, Qin Yue, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
72 |
5 years ago |
| 83 |
Shoal: Improving DAG-BFT Latency And Robustness
Alexander Spiegelman, Balaji Arun, ... (+2 more)
|
👻
Ghosted
|
cs.DC
|
71 |
2 years ago |
| 84 |
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum
Hisham S. Galal, Amr M. Youssef
|
👻
Ghosted
|
cs.CR
|
71 |
6 years ago |
| 85 |
Differential Privacy for Eye Tracking with Temporal Correlations
Efe Bozkir, Onur Günlü, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
70 |
6 years ago |
| 86 |
Quantum Tokens for Digital Signatures
Shalev Ben-David, Or Sattath
|
👻
Ghosted
|
quant-ph
|
70 |
9 years ago |
| 87 |
A Cryptoeconomic Traffic Analysis of Bitcoin's Lightning Network
Ferenc Beres, Istvan Andras Seres, Andras A. Benczur
|
👻
Ghosted
|
cs.CR
|
69 |
6 years ago |
| 88 |
Oblivious Transfer is in MiniQCrypt
Alex B. Grilo, Huijia Lin, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
68 |
5 years ago |
| 89 |
Alert Correlation Algorithms: A Survey and Taxonomy
Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili
|
👻
Ghosted
|
cs.CR
|
68 |
7 years ago |
| 90 |
DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks
Huili Chen, Bita Darvish Rohani, Farinaz Koushanfar
|
👻
Ghosted
|
cs.CR
|
68 |
7 years ago |
| 91 |
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
Fabrice Boudot, Pierrick Gaudry, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
67 |
5 years ago |
| 92 |
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Myrto Arapinis, Mahshid Delavar, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
67 |
6 years ago |
| 93 |
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Hao Chen, Ilaria Chillotti, ... (+4 more)
|
👻
Ghosted
|
cs.DS
|
67 |
6 years ago |
| 94 |
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Lejla Batina, Shivam Bhasin, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
67 |
7 years ago |
| 95 |
On the computational hardness needed for quantum cryptography
Zvika Brakerski, Ran Canetti, Luowen Qian
|
👻
Ghosted
|
quant-ph
|
67 |
3 years ago |
| 96 |
(Pseudo) Random Quantum States with Binary Phase
Zvika Brakerski, Omri Shmueli
|
👻
Ghosted
|
quant-ph
|
66 |
6 years ago |
| 97 |
On the Genericity of Maximum Rank Distance and Gabidulin Codes
Alessandro Neri, Anna-Lena Horlemann-Trautmann, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
66 |
9 years ago |
| 98 |
Classical Cryptographic Protocols in a Quantum World
Sean Hallgren, Adam Smith, Fang Song
|
👻
Ghosted
|
quant-ph
|
66 |
10 years ago |
| 99 |
A Zero Knowledge Sumcheck and its Applications
Alessandro Chiesa, Michael A. Forbes, Nicholas Spooner
|
🔮
The Ethereal
|
cs.CC
|
65 |
8 years ago |
| 100 |
On self-dual negacirculant codes of index two and four
Minjia Shi, Qian Liqin, Patrick Sole
|
👻
Ghosted
|
cs.IT
|
65 |
8 years ago |