Refs
(1978) The Switch
2026-03-09
#book
#fiction
(1984) The Ark Sakura
2026-02-13
#book
#fiction
#literature
(2010) My Struggle; Book 5
2026-02-11
#book
#fiction
#literature
(2026) A Certifying Proof Assistant for Synthetic Mathematics in Lean
2026-02-08
#formal-methods
#math
#programming
(2010) La Carte et le Territoire
2026-02-01
#book
#fiction
#literature
(2010) My Struggle; Book 4
2026-01-25
#book
#fiction
#literature
(1988) O Alquimista
2026-01-22
#book
#fiction
(1927) Thérèse Desqueyroux
2026-01-22
#book
#fiction
#literature
(2009) My Struggle; Book 3
2026-01-20
#book
#fiction
#literature
(1980) So Long, See You Tomorrow
2026-01-20
#book
#fiction
#literature
(1924) Der Zauberberg
2026-01-12
#book
#fiction
#literature
(1972) The Breast
2026-01-07
#book
#fiction
#literature
(2020) Pika Parsing
2026-01-04
#compiler
#parsing
#programming-languages
(2025) On Graded Coeffect Types for Information-Flow Control
2026-01-02
#functional-programming
#linear-types
(2024) Functional Ownership through Fractional Uniqueness
2026-01-02
#functional-programming
#linear-types
(2022) Linearity and Uniqueness; An Entente Cordiale
2026-01-02
#functional-programming
#linear-types
(2021) Resourceful Program Synthesis from Graded Linear Types
2026-01-02
#functional-programming
#linear-types
(2021) Linear Exponentials as Graded Modal Types
2026-01-02
#functional-programming
#linear-types
(2021) Graded Modal Dependent Type Theory
2026-01-02
#functional-programming
#linear-types
(2021) Deriving Distributive Laws for Graded Linear Types
2026-01-02
#functional-programming
#linear-types
(2019) Quantitative Program Reasoning with Graded Modal Types
2026-01-02
#functional-programming
#linear-types
(2016) Combining Effects and Coeffects via Grading
2026-01-02
#algebraic-effects
#functional-programming
#linear-types
(2009) My Struggle; Book 2
2025-12-29
#book
#fiction
#literature
(1992) Sylvia
2025-12-29
#book
#fiction
#literature
(1949) Confessions of a Mask
2025-12-29
#book
#fiction
#literature
(2025) Flesh
2025-12-11
#book
#fiction
#literature
(1946) Nightmare Alley
2025-12-09
#book
#crime
#fiction
(2020) Boulder
2025-12-05
#book
#fiction
#literature
(1956) Seize the Day
2025-12-05
#book
#fiction
#literature
(1956) Giovanni's Room
2025-12-05
#book
#fiction
#literature
(1985) White Noise
2025-12-02
#book
#fiction
#literature
(2009) My Struggle; Book 1
2025-11-28
#book
#fiction
#literature
(2002) Days of Abandonment
2025-11-17
#book
#fiction
#literature
(2023) Yellowface
2025-11-15
#book
#fiction
(1959) Goodbye Columbus (and 5 short stories)
2025-11-14
#book
#fiction
#literature
(1929) A Farewell to Arms
2025-11-12
#book
#fiction
#literature
(1973) Crash
2025-11-05
#book
#fiction
#literature
(1963) The Ice Palace
2025-11-03
#book
#fiction
#literature
(1959) The Poorhouse Fair
2025-11-03
#book
#fiction
#literature
(1952) The Old Man and the Sea
2025-11-03
#book
#fiction
#literature
(1969) Portnoy's Complaint
2025-10-29
#book
#fiction
#literature
(1905) House of Mirth
2025-10-24
#book
#fiction
(2015) Solenoid
2025-10-18
#book
#fiction
#literature
(1960) Rabbit, Run
2025-10-09
#fiction
#literature
(1977) Unknown Man No. 89
2025-10-02
#book
#crime
#fiction
(1978) La Rue des Boutiques Obscures
2025-09-26
#book
#fiction
#literature
(1962) The Man in the High Castle
2025-09-22
#book
#fiction
#sci-fi
(2001) Atonement
2025-09-18
#book
#fiction
#literature
(2025) All the Way to the River
2025-09-15
#book
#memoir
(2006) Eat Pray Love
2025-09-15
#book
#memoir
(1963) Run River
2025-09-11
#book
#fiction
#literature
(1982) The Names
2025-09-04
#fiction
#literature
(2025) People Like Us
2025-08-29
#book
#fiction
(1976) Le Jour de Congé
2025-08-25
#book
#fiction
(1974) 52 Pickup
2025-08-25
#book
#fiction
(2022) Septology
2025-08-22
#book
#fiction
#literature
(1965) Stoner
2025-08-11
#book
#fiction
(1976) Swag
2025-08-09
#book
#crime
#fiction
(2009) Raymond Carver; A Writer's Life
2025-08-08
#biography
#book
#writing
(1976) Will You Please be Quiet, Please?
2025-08-06
#fiction
#review
#short-story
(2025) Unforgiving Places
2025-07-16
#book
#politics
#sociology
(2024) The Anxious Generation
2025-07-14
#book
#sociology
(2021) Five Decembers
2025-07-14
#book
#fiction
#review
(1989) Remains of the Day
2025-07-14
#book
#fiction
(1929) The Sound and The Fury
2025-07-05
#book
#fiction
#literature
(1971) The Lathe of Heaven
2025-06-30
#book
#fiction
#sci-fi
(2022) The Right
2025-06-29
#book
#history
#politics
(1973) Competition and Entrepreneurship
2025-06-29
#book
#economics
(1991) Searoad
2025-06-27
#book
#fiction
(1953) Go Tell It on the Mountain
2025-06-23
#fiction
(2005) The Best of the Best Science Fiction
2025-06-16
#fiction
#sci-fi
(1984) Salvador
2025-06-16
#fiction
#sci-fi
(1984) A Cabin on the Coast
2025-06-16
#fiction
#sci-fi
(1983) Blood Music
2025-06-16
#fiction
#sci-fi
(1887) A Study in Scarlet
2025-06-13
#fiction
#short-story
(2024) America América
2025-06-08
#book
#history
(2025) Why Nothing Works
2025-06-05
#book
#politics
#systems
(2025) Coming Clean
2025-06-05
#book
#philosophy
#politics
(2025) Abundance
2025-06-05
#book
#politics
(2024) Perfection
2025-06-05
#book
#fiction
(2024) On Settler Colonialism
2025-06-05
#book
#philosophy
#politics
(2024) Nuclear War; A Scenario
2025-06-05
#book
#politics
(2023) The City and its Uncertain Walls
2025-06-05
#book
#fiction
(2023) Recoding America
2025-06-05
#book
#computing
#politics
#systems
(2022) The Mexican Economy
2025-06-05
#book
#economics
(2011) Freedom Betrayed
2025-06-05
#biography
#book
#history
#politics
(2009) Capitalist Realism
2025-06-05
#book
#philosophy
#politics
(2005) La Possibilité d'une île
2025-06-05
#book
#fiction
(1992) The End of History and the Last Man
2025-06-05
#book
#philosophy
#politics
(1983) La Place
2025-06-05
#book
#fiction
(1979) The Culture of Narcissism
2025-06-04
#book
#philosophy
(2026-03) Updatable Private Set Intersection from Symmetric-Key Techniques
1970-01-01
#cryptography
#paper
(2026-03) Tweed; Adaptively Secure Lattice-Based Two-Round Threshold Signatures
1970-01-01
#cryptography
#paper
(2026-03) Threshold Traitor Tracing Revisited; Insider Attacks and Multi-Traitor Tracing
1970-01-01
#cryptography
#paper
(2026-03) The OCH Authenticated Encryption Scheme
1970-01-01
#cryptography
#paper
(2026-03) Survey of isogeny-based signature schemes resistant to Castryck–Decru attack
1970-01-01
#cryptography
#paper
(2026-03) StarHunters— Secure Hybrid Post-Quantum KEMs From IND-CCA2 PKEs
1970-01-01
#cryptography
#paper
(2026-03) Short Signatures from DDH without Pairings or Random Oracles
1970-01-01
#cryptography
#paper
(2026-03) Round-Optimal Threshold Blind Signatures without Random Oracles
1970-01-01
#cryptography
#paper
(2026-03) Revisiting the Security of Sparkle
1970-01-01
#cryptography
#paper
(2026-03) Post-Quantum Security of Keyed Sum of Permutations and Its Siblings
1970-01-01
#cryptography
#paper
(2026-03) Post-Quantum Anonymous Signatures from the Lattice Isomorphism Group Action
1970-01-01
#cryptography
#paper
(2026-03) PRISM with a pinch of salt; Simple, Efficient and Strongly Unforgeable Signatures from Isogenies
1970-01-01
#cryptography
#paper
(2026-03) Interactive Proofs for Batch Polynomial Evaluation
1970-01-01
#cryptography
#paper
(2026-03) Information-Theoretic Strong Traceable Secret Sharing Schemes
1970-01-01
#cryptography
#paper
(2026-03) Implementation of a post-quantum hybrid group key exchange protocol
1970-01-01
#cryptography
#paper
(2026-03) Hermine; An Efficient Lattice-based FROST-like Threshold Signature
1970-01-01
#cryptography
#paper
(2026-03) Fuzzy Private Set Intersection for Real-World Datasets
1970-01-01
#cryptography
#paper
(2026-03) Finite Field Arithmetic for ML-KEM Using Zech's Logarithm
1970-01-01
#cryptography
#paper
(2026-03) FALCON with message recovery, a specification
1970-01-01
#cryptography
#paper
(2026-03) Efficient Single-Server Stateful PIR Using Format-Preserving Encryption
1970-01-01
#cryptography
#paper
(2026-03) Efficient Private Range Queries on Public Data
1970-01-01
#cryptography
#paper
(2026-03) Cryptanalysis of Polynomial Learning With Errors (PLWE); A Survey
1970-01-01
#cryptography
#paper
(2026-03) Coppersmith's Method for Solving Modular Inversion Hidden Number Problem via Determinant-Based Elimination
1970-01-01
#cryptography
#paper
(2026-03) Committing Security of BBB Secure MACs
1970-01-01
#cryptography
#paper
(2026-03) An attack on the CFS scheme and on TII McEliece challenges
1970-01-01
#cryptography
#paper
(2026-03) An Ultra-Robust Privacy Preserving Scheme for Federated Learning using Distributed Homomorphic Encryption
1970-01-01
#cryptography
#paper
(2026-02) gcVM; Publicly Auditable MPC via Garbled Circuits with Applications to Private EVM-Compatible Computation
1970-01-01
#cryptography
#paper
(2026-02) eVer; Universal and Automated Verification of Side-Channel Security for Additive, Inner Product, Polynomial and General Code-Based Masking
1970-01-01
#cryptography
#paper
(2026-02) eDAS; Extending Data Availability Sampling with Privacy and Compliance
1970-01-01
#cryptography
#paper
(2026-02) Zero-Knowledge Proof-Carrying Data from Accumulation Schemes
1970-01-01
#cryptography
#paper
(2026-02) Zero-Knowledge IOPPs for Constrained Interleaved Codes
1970-01-01
#cryptography
#paper
(2026-02) Zebra; Arithmetic Garbled RAM for Large Words from DCR
1970-01-01
#cryptography
#paper
(2026-02) ZKBoost; Zero-Knowledge Verifiable Training for XGBoost
1970-01-01
#cryptography
#paper
(2026-02) WillowFold; Secure Aggregation with a Lightweight Committee
1970-01-01
#cryptography
#paper
(2026-02) When Trying to Catch Cheaters Breaks the MPC (Full Version)
1970-01-01
#cryptography
#paper
(2026-02) What a Wonderful World; zkSNARKs in the Algebraic Group Model are Universally Composable
1970-01-01
#cryptography
#paper
(2026-02) Weighted Cryptography with Weight-Independent Complexity
1970-01-01
#cryptography
#paper
(2026-02) Weak Zero-Knowledge and One-Way Functions
1970-01-01
#cryptography
#paper
(2026-02) WOTS-Tree; Merkle-Optimized Winternitz Signatures for Post-Quantum Bitcoin
1970-01-01
#cryptography
#paper
(2026-02) VisualDedup; Visual Fuzzy Deduplication for Secure Batch Duplicates Detection without Server Aided
1970-01-01
#cryptography
#paper
(2026-02) VROOM; Accelerating (Almost All) Number-Theoretic Cryptography Using Vectorization and the Residue Number System
1970-01-01
#cryptography
#paper
(2026-02) Upper Bound on Information-Theoretic Security of Permutation-Based Pseudorandom Functions
1970-01-01
#cryptography
#paper
(2026-02) Understanding Multi-Query Attacks on Key-Then-Hash Functions
1970-01-01
#cryptography
#paper
(2026-02) UltraFold; Efficient Distributed BaseFold from Packed Interleaved Merkle Trees
1970-01-01
#cryptography
#paper
(2026-02) Ultra short signatures with Dragon HFE_{LL'}
1970-01-01
#cryptography
#paper
(2026-02) Two-Factor Authentication Can Harden Servers Against Offline Password Search
1970-01-01
#cryptography
#paper
(2026-02) Tripling on Hessian curves via isogeny decomposition
1970-01-01
#cryptography
#paper
(2026-02) Towards Practical Registered ABE; More Efficient, Non-monotone, and CCA-secure
1970-01-01
#cryptography
#paper
(2026-02) Towards Making Doubly-Efficient PIR Practical
1970-01-01
#cryptography
#paper
(2026-02) Towards Accountability for Anonymous Credentials
1970-01-01
#cryptography
#paper
(2026-02) Tight Reductions for SIS-with-Hints Assumptions with Applications to Anonymous Credentials
1970-01-01
#cryptography
#paper
(2026-02) Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption
1970-01-01
#cryptography
#paper
(2026-02) The Verification Theater; When Formal Methods Create False Assurance in Cryptographic Libraries
1970-01-01
#cryptography
#paper
(2026-02) The Structured Generic-Group Model
1970-01-01
#cryptography
#paper
(2026-02) The HyperFrog Cryptosystem; High-Genus Voxel Topology as a Trapdoor for Post-Quantum KEMs
1970-01-01
#cryptography
#paper
(2026-02) Syndrome Decoding with Hints
1970-01-01
#cryptography
#paper
(2026-02) Sumcheck-based zkSNARKs are Non-Malleable
1970-01-01
#cryptography
#paper
(2026-02) Succinct Arguments for BatchQMA and Friends under 6 Rounds
1970-01-01
#cryptography
#paper
(2026-02) Structural Collapse of the Amutha-Perumal Scheme Based on Duo Circulant Matrices
1970-01-01
#cryptography
#paper
(2026-02) Statistically Secure Asynchronous MPC with Linear Communication and -mathcal{O}(n^5) Additive Overhead
1970-01-01
#cryptography
#paper
(2026-02) Spinel; A Post-Quantum Signature Scheme Based on -mathrm{SL}_n(-mathbb{F}_p) Hashing
1970-01-01
#cryptography
#paper
(2026-02) Special Soundness and Binding Properties; A Framework for Tightly Secure zk-SNARKs
1970-01-01
#cryptography
#paper
(2026-02) Solving SIS in any norm via Gaussian sampling
1970-01-01
#cryptography
#paper
(2026-02) SoK; Anonymous Credentials for Digital Identity Wallets
1970-01-01
#cryptography
#paper
(2026-02) Smoothing the degree of regularity for polynomial systems
1970-01-01
#cryptography
#paper
(2026-02) Sliced Rényi Pufferfish Privacy; Tractable Privatization Mechanism and Private Learning with Gradient Clipping
1970-01-01
#cryptography
#paper
(2026-02) Skipping Class; Algebraic Attacks exploiting weak matrices and operation modes of Poseidon2(b)
1970-01-01
#cryptography
#paper
(2026-02) Sharing a Secret Anamorphically; Secret Shares Dressed Up as Signatures
1970-01-01
#cryptography
#paper
(2026-02) Shared and leakage free MAYO
1970-01-01
#cryptography
#paper
(2026-02) Separating Non-Interactive Classical Verification of Quantum Computation from Falsifiable Assumptions
1970-01-01
#cryptography
#paper
(2026-02) Security of the Fischlin Transform in Quantum Random Oracle Model
1970-01-01
#cryptography
#paper
(2026-02) Scytale; A Compiler Framework for Accelerating TFHE with Circuit Bootstrapping
1970-01-01
#cryptography
#paper
(2026-02) Scaling Sparse Matrix Computation for Secure Outsourced Computing
1970-01-01
#cryptography
#paper
(2026-02) SQISign on ARM
1970-01-01
#cryptography
#paper
(2026-02) SPRINT; New Isogeny Proofs of Knowledge and Isogeny-Based Signatures
1970-01-01
#cryptography
#paper
(2026-02) SCA-MQDSA; Side-Channel Analysis of Multivariate Digital Signature Implementations
1970-01-01
#cryptography
#paper
(2026-02) Rule Variant Restrictions for the Tamarin Prover
1970-01-01
#cryptography
#paper
(2026-02) Round-Optimal Identity-Based Blind Signature from Module Lattice Assumptions
1970-01-01
#cryptography
#paper
(2026-02) Round-Optimal Byzantine Agreement without Trusted Setup
1970-01-01
#cryptography
#paper
(2026-02) Round-Based Approximation of (Higher-Order) Differential-Linear Correlation
1970-01-01
#cryptography
#paper
(2026-02) Relaxed Modular PCS from Arbitrary PCS and Applications to SNARKs for Integers
1970-01-01
#cryptography
#paper
(2026-02) Reducing the Number of Qubits in Quantum Discrete Logarithms on Elliptic Curves
1970-01-01
#cryptography
#paper
(2026-02) RISQrypt; Fast, Secure and Agile Hardware-Software Co-Design for Post-Quantum Cryptography
1970-01-01
#cryptography
#paper
(2026-02) Putting the OPTI in Round Optimal IA-MPC in the Plain Model
1970-01-01
#cryptography
#paper
(2026-02) Proving Knowledge of Syndrome Decoding Problems with Soundness
1970-01-01
#cryptography
#paper
(2026-02) Post-Quantum Security of Block Cipher Constructions
1970-01-01
#cryptography
#paper
(2026-02) Post-Quantum Adaptor Signatures with Strong Security from Cryptographic Group Actions
1970-01-01
#cryptography
#paper
(2026-02) Plonk Without Random Oracles
1970-01-01
#cryptography
#paper
(2026-02) PhantomCrypt; Second-Order Deniable Encryption with Post-Quantum Security
1970-01-01
#cryptography
#paper
(2026-02) Perfectly Secure Network-Agnostic MPC Comes for Free
1970-01-01
#cryptography
#paper
(2026-02) Partially Non-Interactive Two-Round Threshold and Multi-Signatures with Tighter and Adaptive Security
1970-01-01
#cryptography
#paper
(2026-02) Pairing-based Functional Commitments for Circuits with Shorter Parameters
1970-01-01
#cryptography
#paper
(2026-02) PaCMan - Partition-Code Masking for Combined Security
1970-01-01
#cryptography
#paper
(2026-02) PANCAKE; A SNARK with Plonkish Constraints, Almost-Free Additions, No Permutation Check, and a Linear-Time Prover
1970-01-01
#cryptography
#paper
(2026-02) PAC-Private Databases
1970-01-01
#cryptography
#paper
(2026-02) Orthus; Practical Sublinear Batch-Verification of Lattice Relations from Standard Assumptions
1970-01-01
#cryptography
#paper
(2026-02) Orbit; Optimizing Rescale and Bootstrap Placement with Integer Linear Programming Techniques for Secure Inference
1970-01-01
#cryptography
#paper
(2026-02) Optimizing Differential Privacy in Federated Analytics under Known Input Distributions
1970-01-01
#cryptography
#paper
(2026-02) Optimal Best-of-Both-Worlds Consensus
1970-01-01
#cryptography
#paper
(2026-02) OpenAC; Open Design for Transparent and Lightweight Anonymous Credentials
1970-01-01
#cryptography
#paper
(2026-02) One Pair to Rule Them All; An Optimal Algorithm for Solving Code Equivalence via Codeword Search
1970-01-01
#cryptography
#paper
(2026-02) On the conversion of module representations for higher dimensional supersingular isogenies
1970-01-01
#cryptography
#paper
(2026-02) On the Use of Atkin and Weber Modular Polynomials in Isogeny Proofs of Knowledge
1970-01-01
#cryptography
#paper
(2026-02) On the Need for (Quantum) Memory with Short Outputs
1970-01-01
#cryptography
#paper
(2026-02) On the Equivalence of Forgery and Key Recovery in Key-Then-Hash Functions
1970-01-01
#cryptography
#paper
(2026-02) On the Concrete Hardness of LWR with a Power of Two Modulus
1970-01-01
#cryptography
#paper
(2026-02) On the Concrete Hardness Gap Between MLWE and LWE
1970-01-01
#cryptography
#paper
(2026-02) On the Complexity of Succinct Interactive Arguments
1970-01-01
#cryptography
#paper
(2026-02) On the Binding Security of KEMs based on RSA and DH
1970-01-01
#cryptography
#paper
(2026-02) On the Active Security of the PEARL-SCALLOP Group Action
1970-01-01
#cryptography
#paper
(2026-02) On The Spectral Theory of Isogeny Graphs and Quantum Sampling of Hard Supersingular Elliptic Curves
1970-01-01
#cryptography
#paper
(2026-02) On Lifting AGM Security to AGM with Oblivious Sampling
1970-01-01
#cryptography
#paper
(2026-02) On Compressing Non-Additive Correlations
1970-01-01
#cryptography
#paper
(2026-02) On Best-Possible One-Time Programs
1970-01-01
#cryptography
#paper
(2026-02) Oblivious Ciphertext Compression via Linear Codes
1970-01-01
#cryptography
#paper
(2026-02) Non-interactive Blind Signatures with Threshold Issuance
1970-01-01
#cryptography
#paper
(2026-02) Non-Trivial Zero-Knowledge Implies One-Way Functions
1970-01-01
#cryptography
#paper
(2026-02) Non Interactive MPC, (Quantumly) Revisited
1970-01-01
#cryptography
#paper
(2026-02) New lower bound of the r-th order nonlinearity via algebraic immunity
1970-01-01
#cryptography
#paper
(2026-02) New Techniques for Information-Theoretic Asynchronous MPC with Abort
1970-01-01
#cryptography
#paper
(2026-02) NeuralCPA; A Deep Learning Perspective on Chosen-Plaintext Attacks
1970-01-01
#cryptography
#paper
(2026-02) Nested MuSig2
1970-01-01
#cryptography
#paper
(2026-02) Neo and SuperNeo; Post-quantum folding with pay-per-bit costs over small fields
1970-01-01
#cryptography
#paper
(2026-02) Necessary and Sufficient Conditions for the Existence of Ideal Linear Secret Sharing Schemes for Arbitrary Access Structures
1970-01-01
#cryptography
#paper
(2026-02) NIROPoK-Based Post-Quantum Sidechain Design on Ethereum
1970-01-01
#cryptography
#paper
(2026-02) Multipath PA-PUFs generate all Boolean functions
1970-01-01
#cryptography
#paper
(2026-02) Multi-key Security in the Quantum World; Revisiting Tweakable Even-Mansour and FX
1970-01-01
#cryptography
#paper
(2026-02) Multi-key Fully Homomorphic Encryption with Non-Interactive Setup in the Plain Model
1970-01-01
#cryptography
#paper
(2026-02) Multi-Committee MPC; From Unanimous to Identifiable Abort
1970-01-01
#cryptography
#paper
(2026-02) Migrating Bitcoin and Ethereum Addresses to the Quantum Blockchain Era
1970-01-01
#cryptography
#paper
(2026-02) Malicious Security Comes Free in SPDZ
1970-01-01
#cryptography
#paper
(2026-02) Malicious Private Set Union with Two-Sided Output
1970-01-01
#cryptography
#paper
(2026-02) MPSpeed; Implementing and Optimizing MPC-in-the-Head Digital Signatures in Hardware
1970-01-01
#cryptography
#paper
(2026-02) Logarithmic-Depth Pseudorandom Functions from Well-Founded Code-Based Assumptions
1970-01-01
#cryptography
#paper
(2026-02) Liquid Democracy With Two Opposing Factions
1970-01-01
#cryptography
#paper
(2026-02) Lightweight PQ KEM and Hybrid MQTT Protocol for 8-bit AVR Sensor Nodes
1970-01-01
#cryptography
#paper
(2026-02) Lightning, Field-Agnostic Super-Efficient Polynomial Commitment Scheme
1970-01-01
#cryptography
#paper
(2026-02) Lighthouse; Single-Server Secure Aggregation with O(1) Server-Committee Communication at Scale
1970-01-01
#cryptography
#paper
(2026-02) Lie algebras and the security of cryptosystems based on classical varieties in disguise
1970-01-01
#cryptography
#paper
(2026-02) LazyArc; Dynamic Out-of-Order Engine for High-Throughput FHE
1970-01-01
#cryptography
#paper
(2026-02) Lattice HD Wallets; Post-Quantum BIP32 Hierarchical Deterministic Wallets from Lattice Assumptions
1970-01-01
#cryptography
#paper
(2026-02) Knowledge Soundness of Polynomial Commitments in the Algebraic Group Model Does Not Guarantee Extractability
1970-01-01
#cryptography
#paper
(2026-02) Key Recovery Attacks on UOV Using p^l-truncated Polynomial Rings
1970-01-01
#cryptography
#paper
(2026-02) Key Committing Security of HCTR2, Revisited
1970-01-01
#cryptography
#paper
(2026-02) Janus-FHE; A Side Channel Resilient Framework for High-Degree Homomorphic Encryption on GPUs
1970-01-01
#cryptography
#paper
(2026-02) Issuer-Hiding for BBS Anonymous Credentials via Randomizable Keys
1970-01-01
#cryptography
#paper
(2026-02) Isochronous Fixed-Weight Sampling in Hardware
1970-01-01
#cryptography
#paper
(2026-02) Is it Really Broken The Failure of DL-SCA Scoring Metrics under Non-Uniform Priors
1970-01-01
#cryptography
#paper
(2026-02) Is PSI Really Faster Than PSU Achieving Efficient PSU with Invertible Bloom Filters
1970-01-01
#cryptography
#paper
(2026-02) Investigating the Wedge Map on SNOVA
1970-01-01
#cryptography
#paper
(2026-02) Information-Theoretic Network-Agnostic MPC with Polynomial Communication
1970-01-01
#cryptography
#paper
(2026-02) Improved preprocessing for the Crossbred algorithm and application to the MQ problem
1970-01-01
#cryptography
#paper
(2026-02) Improved Reduction from RLWE to MP-LWE
1970-01-01
#cryptography
#paper
(2026-02) Improved Cryptanalysis of HFERP
1970-01-01
#cryptography
#paper
(2026-02) Impossibility of CPAD security for a class of FHE schemes
1970-01-01
#cryptography
#paper
(2026-02) Implementable Witness Encryption from Arithmetic Affine Determinant Programs
1970-01-01
#cryptography
#paper
(2026-02) ITSAKE; an unconditionally secure authenticated key establishment protocol
1970-01-01
#cryptography
#paper
(2026-02) Hybridization of Cryptographic Primitives; A Generalized Framework for Adaptive Security
1970-01-01
#cryptography
#paper
(2026-02) How to Classically Verify a Quantum Cat without Killing It
1970-01-01
#cryptography
#paper
(2026-02) How to Build a Short-Input Random Oracle from Public Random Permutations
1970-01-01
#cryptography
#paper
(2026-02) How To Make Delegated Payments on Bitcoin; A Question for the AI Agentic Future
1970-01-01
#cryptography
#paper
(2026-02) How (not) to Switch FHE Schemes; Framework and Attacks in the IND-CPA-D Model
1970-01-01
#cryptography
#paper
(2026-02) Highly Efficient and Round-Optimal Asymmetric PAKE
1970-01-01
#cryptography
#paper
(2026-02) High-Precision Functional Bootstrapping for CKKS from Fourier Extension
1970-01-01
#cryptography
#paper
(2026-02) Have Your CKAKE and Eat it, Too; Efficient, Composable KEM-Authenticated Key Exchange
1970-01-01
#cryptography
#paper
(2026-02) HCTR^{++} ; A Beyond Birthday Bound Secure HCTR2 Variant
1970-01-01
#cryptography
#paper
(2026-02) Group Encryption with Oblivious Traceability
1970-01-01
#cryptography
#paper
(2026-02) GG-GSW; Chosen-Ciphertext Secure Leveled FHE From Gadget Trapdoors
1970-01-01
#cryptography
#paper
(2026-02) Fuzzy Private Set Intersection from Density-Bounded Assumptions
1970-01-01
#cryptography
#paper
(2026-02) From OT to OLE with Almost-Linear Communication
1970-01-01
#cryptography
#paper
(2026-02) Forget-IT; Optimal Good-Case Latency For Information-Theoretic BFT
1970-01-01
#cryptography
#paper
(2026-02) Faster Pseudorandom Correlation Generators via Walsh-Hadamard Transform
1970-01-01
#cryptography
#paper
(2026-02) Fast cube roots in Fp2 via the algebraic torus
1970-01-01
#cryptography
#paper
(2026-02) FLiPD; Privacy-Preserving Federated Learning via Multi-Party Computation and Differential Privacy
1970-01-01
#cryptography
#paper
(2026-02) Exploiting SNOVA’s Structure in the Wedge Product Attack
1970-01-01
#cryptography
#paper
(2026-02) Exploiting PDF Obfuscation in LLMs, arXiv, and More
1970-01-01
#cryptography
#paper
(2026-02) Endomorphisms via splittings
1970-01-01
#cryptography
#paper
(2026-02) Eidolon; A Practical Post-Quantum Signature Scheme Based on k-Colorability in the Age of Graph Neural Networks
1970-01-01
#cryptography
#paper
(2026-02) Efficient, UC-secure and Publicly Auditable MPC from OLE & VOLE-in-the-head
1970-01-01
#cryptography
#paper
(2026-02) Efficient Polynomial Evaluation on Structured Space over Finite Fields
1970-01-01
#cryptography
#paper
(2026-02) Efficient Pairing-Based Batch Arguments for NP with a Constant-Size Proof
1970-01-01
#cryptography
#paper
(2026-02) ECHO; Efficient Covertly-Secure Three-party Computation with Applications to Private Machine Learning
1970-01-01
#cryptography
#paper
(2026-02) Dual-Syncopation Meet-in-the-Middle Attacks; New Results on SHA-2 and MD5
1970-01-01
#cryptography
#paper
(2026-02) Do not Mix Models; Revisiting Generic Transforms for Committing Authenticated Encryption
1970-01-01
#cryptography
#paper
(2026-02) Do Androids Dream of a Dead Internet; Interactive Watermarks for Bot Detection
1970-01-01
#cryptography
#paper
(2026-02) Distributed Monotone-Policy Encryption with Silent Setup from Lattices
1970-01-01
#cryptography
#paper
(2026-02) Distributed Monotone-Policy Encryption for DNFs from Lattices
1970-01-01
#cryptography
#paper
(2026-02) Dishonest-Majority Secure Computation via PIR-Authenticated Multiplication Triples
1970-01-01
#cryptography
#paper
(2026-02) Differential-Linear Attacks from New Distinguishers; the case of SERPENT and PRESENT
1970-01-01
#cryptography
#paper
(2026-02) Determining those Boolean functions whose restrictions to affine spaces are plateaued
1970-01-01
#cryptography
#paper
(2026-02) Defining Quantum-Secure Message Authentication
1970-01-01
#cryptography
#paper
(2026-02) Cyclo; Lightweight Lattice-based Folding via Partial Range Checks
1970-01-01
#cryptography
#paper
(2026-02) Cube and Integral Attacks on ChiLow-32
1970-01-01
#cryptography
#paper
(2026-02) Cryptokinetics
1970-01-01
#cryptography
#paper
(2026-02) Cryptanalysis of Poseidon-Based Fiat-Shamir Protocols
1970-01-01
#cryptography
#paper
(2026-02) Crossing with Confidence; Formal Analysis and Model Checking of Blockchain Bridges
1970-01-01
#cryptography
#paper
(2026-02) Conditionally Linkable Attribute-Based Signatures
1970-01-01
#cryptography
#paper
(2026-02) Composition Theorems for Zero-Knowledge IOPs
1970-01-01
#cryptography
#paper
(2026-02) Compact and Statistical NIZK Proofs of Knowledge for Disjunctions from -Sigma-Protocols
1970-01-01
#cryptography
#paper
(2026-02) Collaborative Incrementally Verifiable Computation
1970-01-01
#cryptography
#paper
(2026-02) Cavern; Efficient Honest-Majority Maliciously Secure (2+1)-PC for -mathbb{Z}_{2^n} via DPF
1970-01-01
#cryptography
#paper
(2026-02) Cavefish; Communication-Optimal Light Client Protocol for UTxO Ledgers
1970-01-01
#cryptography
#paper
(2026-02) Catalytic Tree Evaluation From Matching Vectors
1970-01-01
#cryptography
#paper
(2026-02) Careful with the Ring; Enhanced Hybrid Decoding Attacks against Module-Ring-LWE
1970-01-01
#cryptography
#paper
(2026-02) Bridging Privacy and Utility; A Verifiable Framework for Data Valuation via Zero-Knowledge Proofs
1970-01-01
#cryptography
#paper
(2026-02) Breaking digital signatures from tropical matrix semirings
1970-01-01
#cryptography
#paper
(2026-02) Bolt; Faster SNARKs from Sketched Codes
1970-01-01
#cryptography
#paper
(2026-02) Bittersweet Signatures; Bringing LWR to a Picnic for Hardware-Friendly MPC-in-the-Head
1970-01-01
#cryptography
#paper
(2026-02) Bitcoin PIPEs v2
1970-01-01
#cryptography
#paper
(2026-02) Beyond the Linear Barrier; Secret Sharing for Evolving (Weighted) Threshold Access Structures with Poly-logarithmic Share Size
1970-01-01
#cryptography
#paper
(2026-02) At-Compromise Security; The Case for Alert Blindness
1970-01-01
#cryptography
#paper
(2026-02) Anonymity of X-Wing and its Variants
1970-01-01
#cryptography
#paper
(2026-02) Anamorphic E-Voting; Coercion-Resistant Through Fake and Real Votes
1970-01-01
#cryptography
#paper
(2026-02) Analysis and Vulnerabilities in zkLogin
1970-01-01
#cryptography
#paper
(2026-02) Additions, Multiplications, and the Interaction In-Between; Optimizing MPC Protocols via Leveled Linear Secret Sharing
1970-01-01
#cryptography
#paper
(2026-02) Adams Bridge Accelerator; Bridging the Post-Quantum Transition
1970-01-01
#cryptography
#paper
(2026-02) A note on adversary running times
1970-01-01
#cryptography
#paper
(2026-02) A Visit to KAZ Attack; Finding a Minor Flaw and a Simplified Lattice Construction
1970-01-01
#cryptography
#paper
(2026-02) A Unified Hardware Architecture for Stateful and Stateless Hash-Based Key-Signature Generations
1970-01-01
#cryptography
#paper
(2026-02) A Practical Neighborhood Search Attack on Oracle MLWE
1970-01-01
#cryptography
#paper
(2026-02) A Modular Approach to Succinct Arguments for QMA
1970-01-01
#cryptography
#paper
(2026-02) A Generalized Attack on RSA and Its Variants
1970-01-01
#cryptography
#paper
(2026-02) A Generalized -chi_n-Function
1970-01-01
#cryptography
#paper
(2026-02) A Cryptographic Framework for Proof of Personhood
1970-01-01
#cryptography
#paper
(2026-02) A Comprehensive Break of the Tropical Matrix-Based Signature Scheme
1970-01-01
#cryptography
#paper
(2026-02) -phi(n)-evaluation algorithm; a novel approach for an efficient retrieval of Euler's totient of an RSA Modulus
1970-01-01
#cryptography
#paper
(2026-02) -mathsf{TalonG}; Bandwidth-Efficient Two-Round Threshold Signatures from Lattices
1970-01-01
#cryptography
#paper
(2026-02) -mathsf{Spectra}; Interval-Agnostic Vector Range Argument for Unstructured Range Assertions
1970-01-01
#cryptography
#paper
(2026-02) -mathsf{SoK}; On Cryptography for Multi-Cloud Storage
1970-01-01
#cryptography
#paper
(2026-01) qFALL – Rapid Prototyping of Lattice-based Cryptography
1970-01-01
#cryptography
#paper
(2026-01) Zero Knowledge (About) Encryption; A Comparative Security Analysis of Three Cloud-based Password Managers
1970-01-01
#cryptography
#paper
(2026-01) XM-VRF; Forward Secure, Fast and Key Updatable Hash Based Verifiable Random Function
1970-01-01
#cryptography
#paper
(2026-01) Verified non-recursive calculation of Beneš networks applied to Classic McEliece
1970-01-01
#cryptography
#paper
(2026-01) Uniform Sharing in Multiple Stages; NullFresh for Arbitrary Functions
1970-01-01
#cryptography
#paper
(2026-01) Tropical cryptography IV; Digital signatures and secret sharing with arbitrary access structure
1970-01-01
#cryptography
#paper
(2026-01) Timed Commitments and Timed Encryption; Generic Constructions and Instantiations from Isogenies
1970-01-01
#cryptography
#paper
(2026-01) The Cokernel Pairing
1970-01-01
#cryptography
#paper
(2026-01) The Billion Dollar Merkle Tree
1970-01-01
#cryptography
#paper
(2026-01) The Algebraic Isogeny Model; A General Model with Applications to SQIsign and Key Exchanges
1970-01-01
#cryptography
#paper
(2026-01) Tag-Friendly Lattice Sampler and Applications
1970-01-01
#cryptography
#paper
(2026-01) Structured Module Lattice-based Cryptography
1970-01-01
#cryptography
#paper
(2026-01) StarFortress; Hybrid Post-Quantum KEMs From SDH and IND-CCA
1970-01-01
#cryptography
#paper
(2026-01) SoK; Outsourced Private Set Intersection
1970-01-01
#cryptography
#paper
(2026-01) Secure Computation for Fixed-point and Floating-point Arithmetic
1970-01-01
#cryptography
#paper
(2026-01) Secret-Subspace Recovery in MAYO via Linearization of Errors from a Single Fault
1970-01-01
#cryptography
#paper
(2026-01) Scalable Distributed Key Generation for Blockchains
1970-01-01
#cryptography
#paper
(2026-01) SNARGs for NP and Non-Signaling PCPs, Revisited
1970-01-01
#cryptography
#paper
(2026-01) Round-Optimal Pairing-Free Blind Signatures
1970-01-01
#cryptography
#paper
(2026-01) Revisiting the Concrete Security of Falcon-type Signatures
1970-01-01
#cryptography
#paper
(2026-01) Re2creds; Reusable Anonymous Credentials from Malleable NIZK and Legacy Signatures
1970-01-01
#cryptography
#paper
(2026-01) Rank Syndrome Decoding Estimator - An Asymptotic and Concrete Analysis
1970-01-01
#cryptography
#paper
(2026-01) Rank Syndrome Decoding Estimator
1970-01-01
#cryptography
#paper
(2026-01) Qurrency; a quantum-secure, private, and auditable platform for digital assets
1970-01-01
#cryptography
#paper
(2026-01) Practical Subvector Commitments with Optimal Opening Complexity
1970-01-01
#cryptography
#paper
(2026-01) Practical SNARGs for Matrix Multiplications over Encrypted Data
1970-01-01
#cryptography
#paper
(2026-01) Policy-based Access Tokens; Privacy-Preserving Verification for Digital Identity
1970-01-01
#cryptography
#paper
(2026-01) Optimized Implementation of ML-KEM on ARMv9-A with SVE2 and SME
1970-01-01
#cryptography
#paper
(2026-01) On those Boolean functions having only one Walsh zero
1970-01-01
#cryptography
#paper
(2026-01) On the Impossibility of Round-Optimal Pairing-Free Blind Signatures in the ROM
1970-01-01
#cryptography
#paper
(2026-01) New Quantum Circuits for ECDLP; Breaking Prime Elliptic Curve Cryptography in Minutes
1970-01-01
#cryptography
#paper
(2026-01) Masked Solving of Linear Equations System and Application to UOV Signatures
1970-01-01
#cryptography
#paper
(2026-01) Low-Latency Low-Randomness OPINI Gadgets and Their Formal Verification
1970-01-01
#cryptography
#paper
(2026-01) Logarithmic density of rank -geq1 and -geq2 genus-2 Jacobians and applications to hyperelliptic curve cryptography
1970-01-01
#cryptography
#paper
(2026-01) Lether; Practical Post-Quantum Account-Based Private Blockchain Payments
1970-01-01
#cryptography
#paper
(2026-01) LatORAM; ORAMs from Lateral Stashes and Delayed Shuffling
1970-01-01
#cryptography
#paper
(2026-01) L for the Price of One; On the Benefits of Using more than t+1 Parties in Threshold Signing
1970-01-01
#cryptography
#paper
(2026-01) Jindo; Practical Lattice-Based Polynomial Commitment for Zero-Knowledge Arguments
1970-01-01
#cryptography
#paper
(2026-01) JAGUAR; Efficient and Secure Unbalanced PSI under Malicious Adversaries in the Client-Server Setting
1970-01-01
#cryptography
#paper
(2026-01) Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks
1970-01-01
#cryptography
#paper
(2026-01) Incremental Single-Server Private Information Retrieval
1970-01-01
#cryptography
#paper
(2026-01) IND-CCA Lattice Threshold KEM under 30 KiB
1970-01-01
#cryptography
#paper
(2026-01) How to Steal Oblivious Transfer from Minicrypt
1970-01-01
#cryptography
#paper
(2026-01) Heli; Heavy-Light Private Aggregation
1970-01-01
#cryptography
#paper
(2026-01) Hardware-Friendly Robust Threshold ECDSA in an Asymmetric Model
1970-01-01
#cryptography
#paper
(2026-01) HYPERSHIELD; Protecting the Hypercube MPC-in-the-Head Framework Against Differential Probing Adversaries without Masking
1970-01-01
#cryptography
#paper
(2026-01) HIC is all you need; Practical Post-Quantum Password-Authenticated Public Key Encryption
1970-01-01
#cryptography
#paper
(2026-01) Generating Falcon Trapdoors via Gibbs Sampler
1970-01-01
#cryptography
#paper
(2026-01) Generalization of the Class Elimination Attack to Block Ciphers
1970-01-01
#cryptography
#paper
(2026-01) Functional Decomposition of Multivariate Polynomials; Revisit and New Improvements
1970-01-01
#cryptography
#paper
(2026-01) Fully Secure DKG Protocols for Discrete Logarithm Revisited
1970-01-01
#cryptography
#paper
(2026-01) Fully Dynamic Verifiable Secret Sharing and its Application to DPSS
1970-01-01
#cryptography
#paper
(2026-01) From -textsf{TS-SUF-2} to -textsf{TS-SUF-4}; Practical Security Enhancements for -textsf{FROST2} Threshold Signatures
1970-01-01
#cryptography
#paper
(2026-01) Formalizing Privacy in Decentralized Identity; A Provably Secure Framework with Minimal Disclosure
1970-01-01
#cryptography
#paper
(2026-01) Faster Than Ever; A New Lightweight Private Set Intersection and Its Variants
1970-01-01
#cryptography
#paper
(2026-01) Faster Short Pairing-Based NIZK Proofs for Ring LWE Ciphertexts
1970-01-01
#cryptography
#paper
(2026-01) Fast Unbalanced Private Computation on Set Intersection from Permuted Multi-Query Private Membership Test
1970-01-01
#cryptography
#paper
(2026-01) Extending RISC-V to Support Flexible-Radix Multiply-Accumulate Operations
1970-01-01
#cryptography
#paper
(2026-01) Equivalent computational problems for superspecial abelian surfaces
1970-01-01
#cryptography
#paper
(2026-01) Efficient Threshold ML-DSA
1970-01-01
#cryptography
#paper
(2026-01) Efficient Polynomial Evaluation over Structured Space and Application to Polynomial Method
1970-01-01
#cryptography
#paper
(2026-01) Deal out oblivious correlations; 2-depth HSS circuit for silent V-OLE generation
1970-01-01
#cryptography
#paper
(2026-01) Concretely Efficient Blind Signatures Based on VOLE-in-the-Head Proofs and the MAYO Trapdoor
1970-01-01
#cryptography
#paper
(2026-01) Complete Characterization of Randomness Extraction from DAG-Correlated Sources
1970-01-01
#cryptography
#paper
(2026-01) Chasing Rabbits Through Hypercubes; Better algorithms for higher dimensional 2-isogeny computations
1970-01-01
#cryptography
#paper
(2026-01) Breaking the Myth of MPCitH Inefficiency; Optimizing MQOM for Embedded Platforms
1970-01-01
#cryptography
#paper
(2026-01) Breaking the KAZ Suite; Practical Key Recovery Attacks on MySEAL 2.0’s Post-Quantum Candidates
1970-01-01
#cryptography
#paper
(2026-01) Blind Adaptor Signatures, Revisited; Stronger Security Definitions and Their Construction toward Practical Applications
1970-01-01
#cryptography
#paper
(2026-01) Benchmarking of the Amortized Post Quantum Combiner for MLS
1970-01-01
#cryptography
#paper
(2026-01) Batch Arguments with Optimal Communication
1970-01-01
#cryptography
#paper
(2026-01) BREAKMEIFYOUCAN!; Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies
1970-01-01
#cryptography
#paper
(2026-01) BLISK; Boolean circuit Logic Integrated into the Single Key
1970-01-01
#cryptography
#paper
(2026-01) BABE; Verifying Proofs on Bitcoin Made 1000x Cheaper
1970-01-01
#cryptography
#paper
(2026-01) Augmenting BBS with Conventional Signatures
1970-01-01
#cryptography
#paper
(2026-01) Arithmetic autocorrelation of binary half--ell-sequences with connection integer p^{r}q^{s}
1970-01-01
#cryptography
#paper
(2026-01) Argo MAC; Garbling with Elliptic Curve MACs
1970-01-01
#cryptography
#paper
(2026-01) Analysis and Attacks on the Reputation System of Nym
1970-01-01
#cryptography
#paper
(2026-01) An improved random AKS-class primality proving algorithm
1970-01-01
#cryptography
#paper
(2026-01) Adaptive NIKE for Unbounded Parties
1970-01-01
#cryptography
#paper
(2026-01) Aborting Random Oracles; How to Build them, How to Use them
1970-01-01
#cryptography
#paper
(2026-01) Abelian surfaces in Hesse form and explicit isogeny formulas
1970-01-01
#cryptography
#paper
(2026-01) AKE Protocol Combining PQC and QKD
1970-01-01
#cryptography
#paper
(2026-01) A SNARK for (Non-)Subsequences with Text-Sub-Linear Proving Time
1970-01-01
#cryptography
#paper
(2026-01) A General Randomness Reuse Framework for First-Order Secure Masking and Applications on AES Design Using Randomness Solely for Input Encoding
1970-01-01
#cryptography
#paper
(2026-01) A Certified Framework for Deterministic Navigation in Higher-Genus p-Isogeny Graphs
1970-01-01
#cryptography
#paper
(2026-01) 2PC Memory-Manipulating Programs with Constant Overhead
1970-01-01
#cryptography
#paper
(2025-12) d-v-CLSAG; Extension for Concise Linkable Spontaneous Anonymous Group Signatures
1970-01-01
#cryptography
#paper
(2025-12) Verifiable Aggregate Receipts with Applications to User Engagement Auditing
1970-01-01
#cryptography
#paper
(2025-12) UFOs; An Ultra-fast Toolkit for Multiparty Computation of Small Elements
1970-01-01
#cryptography
#paper
(2025-12) Transparent and Post-Quantum Distributed SNARK with Linear Prover Time
1970-01-01
#cryptography
#paper
(2025-12) Succinct Garbled Circuits with Low-Depth Garbling Algorithms
1970-01-01
#cryptography
#paper
(2025-12) Streaming Function Secret Sharing and Its Applications
1970-01-01
#cryptography
#paper
(2025-12) SoK; Verifiable Federated Learning
1970-01-01
#cryptography
#paper
(2025-12) SoK; Approximate Agreement
1970-01-01
#cryptography
#paper
(2025-12) SUMSIG; Compact Code-Based Signatures from Sum-Check Protocols
1970-01-01
#cryptography
#paper
(2025-12) SNARGs for NP via Fiat--Shamir in the Plain Model
1970-01-01
#cryptography
#paper
(2025-12) Pseudorandom Correlation Functions for Garbled Circuits
1970-01-01
#cryptography
#paper
(2025-12) On the representation of self-orthogonal codes and applications to cryptography
1970-01-01
#cryptography
#paper
(2025-12) On Delegation of Verifiable Presentations from mdoc and BBS Credentials
1970-01-01
#cryptography
#paper
(2025-12) OOPS; One-time Oblivious Polynomial Signatures
1970-01-01
#cryptography
#paper
(2025-12) OHMG; One hot modular garbling
1970-01-01
#cryptography
#paper
(2025-12) New Constructions of Multiplicative Secret Sharing Schemes
1970-01-01
#cryptography
#paper
(2025-12) Nested YOSO MPC; Near Optimal Resilience Without an MPC Setup
1970-01-01
#cryptography
#paper
(2025-12) Moving a Step of ChaCha in Syncopated Rhythm (Extended Version)
1970-01-01
#cryptography
#paper
(2025-12) ML-DSA-OSH; An Efficient, Open-Source Hardware Implementation of ML-DSA
1970-01-01
#cryptography
#paper
(2025-12) Leakage-Resilient Multi-Party Computation; Protecting the Evaluator in Circuits Garbling
1970-01-01
#cryptography
#paper
(2025-12) InstantOMR; Oblivious Message Retrieval with Low Latency and Optimal Parallelizability
1970-01-01
#cryptography
#paper
(2025-12) High-Performance SIMD Software for Spielman Codes in Zero-Knowledge Proofs
1970-01-01
#cryptography
#paper
(2025-12) HHGS; Forward-secure Dynamic Group Signatures from Symmetric Primitives
1970-01-01
#cryptography
#paper
(2025-12) Fully Distributed Multi-Point Functions for PCGs and Beyond
1970-01-01
#cryptography
#paper
(2025-12) FRIVail; A Data Availability Scheme based on FRI Binius
1970-01-01
#cryptography
#paper
(2025-12) Efficiently Provable Approximations for Non-Polynomial Functions
1970-01-01
#cryptography
#paper
(2025-12) DNS-Anchored zk-SNARK Proofs; A Stateless Alternative to ACME Challenge-Response for Domain Control Validation
1970-01-01
#cryptography
#paper
(2025-12) Conditionally Input-Revealing 2PC and Fuzzy Password-Authenticated Key Exchange
1970-01-01
#cryptography
#paper
(2025-12) Analysis of Diffusion Properties in Generalized Feistel Ciphers under Multidimensional Linear Cryptanalysis
1970-01-01
#cryptography
#paper
(2025-12) An Ideal Linear Secret Sharing Scheme for Complete t-Partite k-Uniform Hypergraph Access Structures
1970-01-01
#cryptography
#paper
(2025-12) Accelerating FrodoKEM in Hardware
1970-01-01
#cryptography
#paper
(2025-12) A note on ''a fully dynamic multi-secret sharing scheme with redundant authorization''
1970-01-01
#cryptography
#paper
(2025-12) A New Approach to Large Party Beaver-Style MPC with Small Computational Overhead
1970-01-01
#cryptography
#paper
(2025-11) Vega
1970-01-01
#cryptography
#paper
(2025-11) Time-Lock Encrypted Storage for Blockchains
1970-01-01
#cryptography
#paper
(2025-11) QUIC-MLS
1970-01-01
#cryptography
#paper
(2025-11) On Reed–Solomon Proximity Gaps Conjectures
1970-01-01
#cryptography
#paper
(2025-11) On Proximity Gaps for Reed–Solomon Codes
1970-01-01
#cryptography
#paper
(2025-11) Compact, Efficient and Non-Separable Hybrid Signatures
1970-01-01
#cryptography
#paper
(2025-11) All Polynomial Generators Preserve Distance with Mutual Correlated Agreement
1970-01-01
#cryptography
#paper
(2025-08) zip
1970-01-01
#cryptography
#paper
(2025-08) When Can We Incrementally Prove Computations of Arbitrary Depth?
1970-01-01
#cryptography
#paper
(2025-08) VOLE-in-the-Head Signatures Based on the Linear Code Equivalence Problem
1970-01-01
#cryptography
#paper
(2025-08) Two-Tier Black-box Blockchains and Application to Instant Layer-1 Payments
1970-01-01
#cryptography
#paper
(2025-08) Towards Building Efficient SCALES Protocols
1970-01-01
#cryptography
#paper
(2025-08) The Best of Both KEMs
1970-01-01
#cryptography
#paper
(2025-08) Stateless 2PC Signatures for Internet-Scale Authentication and Authorization
1970-01-01
#cryptography
#paper
(2025-08) Starfighters — on the general applicability of X-Wing
1970-01-01
#cryptography
#paper
(2025-08) Snake Mackerel
1970-01-01
#cryptography
#paper
(2025-08) Scalable Secure Multiparty Computation with Perfect Security from Preprocessing
1970-01-01
#cryptography
#paper
(2025-08) Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode
1970-01-01
#cryptography
#paper
(2025-08) Polynomial Lattices for the BIKE Cryptosystem
1970-01-01
#cryptography
#paper
(2025-08) Peeking Into the Future
1970-01-01
#cryptography
#paper
(2025-08) Password-Hardened Encryption Revisited
1970-01-01
#cryptography
#paper
(2025-08) Optimistic Message Dissemination
1970-01-01
#cryptography
#paper
(2025-08) Note
1970-01-01
#cryptography
#paper
(2025-08) Not Easy to Prepare a Pesto
1970-01-01
#cryptography
#paper
(2025-08) Naor-Reingold goes Beyond-the-Birthday-Bound
1970-01-01
#cryptography
#paper
(2025-08) LESS is Even More
1970-01-01
#cryptography
#paper
(2025-08) Fully-Fluctuating Participation in Sleepy Consensus
1970-01-01
#cryptography
#paper
(2025-08) Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH
1970-01-01
#cryptography
#paper
(2025-08) Data Availability Sampling with Repair
1970-01-01
#cryptography
#paper
(2025-08) DOC★
1970-01-01
#cryptography
#paper
(2025-08) Cross-Consensus Reliable Broadcast and its Applications
1970-01-01
#cryptography
#paper
(2025-08) Coral
1970-01-01
#cryptography
#paper
(2025-08) Can we Speed up Information Set Decoding by Using Extension Field Structure?
1970-01-01
#cryptography
#paper
(2025-08) Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes
1970-01-01
#cryptography
#paper
(2025-08) Adaptively Secure Threshold ElGamal Decryption from DDH
1970-01-01
#cryptography
#paper
(2025-08) AGB 2.0
1970-01-01
#cryptography
#paper
(2025-08) ABEL
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Binding Properties of KEM Combiners
1970-01-01
#cryptography
#paper
(2025-08) A New Paradigm for Privacy-Preserving Decision Tree Evaluation
1970-01-01
#cryptography
#paper
(2025-08) A Fully-Adaptive Threshold Partially-Oblivious PRF
1970-01-01
#cryptography
#paper
(2025-07) What’s the Matter? An In-Depth Security Analysis of the Matter Protocol
1970-01-01
#cryptography
#paper
(2025-07) Tree PCPs
1970-01-01
#cryptography
#paper
(2025-07) Sota Voce
1970-01-01
#cryptography
#paper
(2025-07) SLVer Bullet
1970-01-01
#cryptography
#paper
(2025-07) Post-Quantum Readiness in EdDSA Chains
1970-01-01
#cryptography
#paper
(2025-07) PlasmaFold
1970-01-01
#cryptography
#paper
(2025-07) Opossum Attack
1970-01-01
#cryptography
#paper
(2025-07) On Weak NIZKs, One-way Functions and Amplification
1970-01-01
#cryptography
#paper
(2025-07) Note
1970-01-01
#cryptography
#paper
(2025-07) Multi-Source Randomness Extraction and Generation in the Random-Oracle Model
1970-01-01
#cryptography
#paper
(2025-07) Linear Prover IOPs in Log Star Rounds
1970-01-01
#cryptography
#paper
(2025-07) How to Tolerate Typos in Strong Asymmetric PAKE
1970-01-01
#cryptography
#paper
(2025-07) Gödel in Cryptography
1970-01-01
#cryptography
#paper
(2025-07) Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security
1970-01-01
#cryptography
#paper
(2025-07) FRIttata
1970-01-01
#cryptography
#paper
(2025-07) Efficiently parsing existing eID documents for zero-knowledge proofs
1970-01-01
#cryptography
#paper
(2025-07) Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size
1970-01-01
#cryptography
#paper
(2025-07) Batch Decryption without Epochs and its Application to Encrypted Mempools
1970-01-01
#cryptography
#paper
(2025-07) A note on the security of the BitVM3 garbling scheme
1970-01-01
#cryptography
#paper
(2025-06) Understanding Lasso
1970-01-01
#cryptography
#paper
(2025-06) Threshold Signatures Reloaded
1970-01-01
#cryptography
#paper
(2025-06) Speeding Up Sum-Check Proving
1970-01-01
#cryptography
#paper
(2025-06) SmallWood
1970-01-01
#cryptography
#paper
(2025-06) Simple VESS
1970-01-01
#cryptography
#paper
(2025-06) OnionPIRv2
1970-01-01
#cryptography
#paper
(2025-06) New Upper and Lower Bounds for Perfectly Secure MPC
1970-01-01
#cryptography
#paper
(2025-06) Guarding the Signal
1970-01-01
#cryptography
#paper
(2025-06) Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations
1970-01-01
#cryptography
#paper
(2025-06) Evaluation of Modular Polynomials from Supersingular Elliptic Curves
1970-01-01
#cryptography
#paper
(2025-06) Efficient, Scalable Threshold ML-DSA Signatures
1970-01-01
#cryptography
#paper
(2025-06) Cryptanalysis of HiAE
1970-01-01
#cryptography
#paper
(2025-06) Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions
1970-01-01
#cryptography
#paper
(2025-06) Bridging Bitcoin to Second Layers via BitVM2
1970-01-01
#cryptography
#paper
(2025-06) Beyond LWE
1970-01-01
#cryptography
#paper
(2025-06) A search to distinguish reduction for the isomorphism problem on direct sum lattices
1970-01-01
#cryptography
#paper
(2025-06) A Tale of Two Worlds, a Formal Story of WireGuard Hybridization
1970-01-01
#cryptography
#paper
(2025-05) Groebner Basis Cryptanalysis of Anemoi
1970-01-01
#cryptography
#paper
(2025-05) Diving Deep Into UC
1970-01-01
#cryptography
#paper
(2025-05) A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures
1970-01-01
#cryptography
#paper
(2025-03) Improved Cryptanalysis of ChaCha
1970-01-01
#cryptography
#paper
(2025-03) Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix
1970-01-01
#cryptography
#paper
(2025-03) A Fiat–Shamir Transformation From Duplex Sponges
1970-01-01
#cryptography
#paper
(2024-12) BitGC
1970-01-01
#cryptography
#paper
(2024-11) Impossibility Results for Post-Compromise Security in Real-World Communication Systems
1970-01-01
#cryptography
#paper
(2024-10) Blaze
1970-01-01
#cryptography
#paper
(2024-09) Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
1970-01-01
#cryptography
#paper
(2024-07) TaSSLE
1970-01-01
#cryptography
#paper
(2024-07) A reduction from Hawk to the principal ideal problem in a quaternion algebra
1970-01-01
#cryptography
#paper
(2024-03) The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
1970-01-01
#cryptography
#paper
(2023-08) Verifiable Verification in Cryptographic Protocols
1970-01-01
#cryptography
#paper
(2023-04) Adding more parallelism to the AEGIS authenticated encryption algorithms
1970-01-01
#cryptography
#paper
(2023-03) Simplex Consensus
1970-01-01
#cryptography
#paper
(2022-03) Block-Cipher-Based Tree Hashing
1970-01-01
#cryptography
#paper
(2017-05) Multi-Collision Resistance
1970-01-01
#cryptography
#paper
(2017-01) The STROBE protocol framework
1970-01-01
#cryptography
#paper
(2017-01) Farfalle
1970-01-01
#cryptography
#paper
(2016-08) KangarooTwelve
1970-01-01
#cryptography
#paper