
IACR ePrint Updates
@IACRePrint
Followers
2K
Following
0
Media
0
Statuses
32K
An unofficial Twitter bot tracking updates of the IACR Cryptology ePrint Archive, including all new, revised and withdrawn papers.
Joined April 2012
[Revised] Balancing Quality and Efficiency in Private Clustering with Affinity Propagation (Hannah Keller and Helen Mollering and Thomas Schneider and Hossein Yalame)
eprint.iacr.org
In many machine learning applications, training data consists of sensitive information from multiple sources. Privacy-preserving machine learning using secure computation enables multiple parties to...
0
0
0
[Revised] Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact (Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu and Zhenkai Hu)
eprint.iacr.org
A universal circuit (UC) is a general-purpose circuit that can simulate arbitrary circuits (up to a certain size $n$). Valiant provides a $k$-way recursive construction of universal circuits (STOC...
0
0
0
[Revised] PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge (Ariel Gabizon and Zachary J. Williamson and Oana Ciobotaru)
eprint.iacr.org
zk-SNARK constructions that utilize an updatable universal structured reference string remove one of the main obstacles in deploying zk-SNARKs [GKMMM, Crypto 2018]. The important work of Maller et...
0
0
5
[New] Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 (Christof Beierle and Patrick Derbez and Gregor Leander and Gaetan Leurent and Havard Raddum and Yann Rotella and David Rupprecht and Lukas Stennes)
eprint.iacr.org
This paper presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, we show that the initial state of GEA-1 can be...
0
0
1
[New] Balancing Quality and Efficiency in Private Clustering with Affinity Propagation (Hannah Keller and Helen Mollering and Thomas Schneider and Hossein Yalame)
eprint.iacr.org
In many machine learning applications, training data consists of sensitive information from multiple sources. Privacy-preserving machine learning using secure computation enables multiple parties to...
0
0
0