Solving LPN Using Covering Codes Qian GuoThomas JohanssonCarl Löndahl OriginalPaper Open access 15 October 2019 Pages: 1 - 33
TFHE: Fast Fully Homomorphic Encryption Over the Torus Ilaria ChillottiNicolas GamaMalika Izabachène OriginalPaper 25 April 2019 Pages: 34 - 91
Kummer for Genus One Over Prime-Order Fields Sabyasachi KaratiPalash Sarkar OriginalPaper 04 April 2019 Pages: 92 - 129
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems Steven D. GalbraithChristophe PetitJavier Silva OriginalPaper Open access 27 March 2019 Pages: 130 - 175
Topology-Hiding Computation on All Graphs Adi AkaviaRio LaVigneTal Moran OriginalPaper 15 March 2019 Pages: 176 - 227
Practical Collision Attacks against Round-Reduced SHA-3 Jian GuoGuohong LiaoLing Song OriginalPaper 13 February 2019 Pages: 228 - 270
On the Power of Secure Two-Party Computation Carmit HazayMuthuramakrishnan Venkitasubramaniam OriginalPaper 07 February 2019 Pages: 271 - 318
Locally Decodable and Updatable Non-malleable Codes and Their Applications Dana Dachman-SoledFeng-Hao LiuHong-Sheng Zhou OriginalPaper 27 November 2018 Pages: 319 - 355