Refs
(2010) My Struggle; Book 4
2026-01-25
#book
#fiction
#literature
(1988) O Alquimista
2026-01-22
#book
#fiction
(1927) Thérèse Desqueyroux
2026-01-22
#book
#fiction
#literature
(2009) My Struggle; Book 3
2026-01-20
#book
#fiction
#literature
(1980) So Long, See You Tomorrow
2026-01-20
#book
#fiction
#literature
(1924) Der Zauberberg
2026-01-12
#book
#fiction
#literature
(1972) The Breast
2026-01-07
#book
#fiction
#literature
(2020) Pika Parsing
2026-01-04
#compiler
#parsing
#programming-languages
(2025) On Graded Coeffect Types for Information-Flow Control
2026-01-02
#functional-programming
#linear-types
(2024) Functional Ownership through Fractional Uniqueness
2026-01-02
#functional-programming
#linear-types
(2022) Linearity and Uniqueness; An Entente Cordiale
2026-01-02
#functional-programming
#linear-types
(2021) Resourceful Program Synthesis from Graded Linear Types
2026-01-02
#functional-programming
#linear-types
(2021) Linear Exponentials as Graded Modal Types
2026-01-02
#functional-programming
#linear-types
(2021) Graded Modal Dependent Type Theory
2026-01-02
#functional-programming
#linear-types
(2021) Deriving Distributive Laws for Graded Linear Types
2026-01-02
#functional-programming
#linear-types
(2019) Quantitative Program Reasoning with Graded Modal Types
2026-01-02
#functional-programming
#linear-types
(2016) Combining Effects and Coeffects via Grading
2026-01-02
#algebraic-effects
#functional-programming
#linear-types
(2009) My Struggle; Book 2
2025-12-29
#book
#fiction
#literature
(1992) Sylvia
2025-12-29
#book
#fiction
#literature
(1949) Confessions of a Mask
2025-12-29
#book
#fiction
#literature
(2025) Flesh
2025-12-11
#book
#fiction
#literature
(1946) Nightmare Alley
2025-12-09
#book
#crime
#fiction
(2020) Boulder
2025-12-05
#book
#fiction
#literature
(1956) Seize the Day
2025-12-05
#book
#fiction
#literature
(1956) Giovanni's Room
2025-12-05
#book
#fiction
#literature
(1985) White Noise
2025-12-02
#book
#fiction
#literature
(2009) My Struggle; Book 1
2025-11-28
#book
#fiction
#literature
(2002) Days of Abandonment
2025-11-17
#book
#fiction
#literature
(2023) Yellowface
2025-11-15
#book
#fiction
(1959) Goodbye Columbus (and 5 short stories)
2025-11-14
#book
#fiction
#literature
(1929) A Farewell to Arms
2025-11-12
#book
#fiction
#literature
(1973) Crash
2025-11-05
#book
#fiction
#literature
(1963) The Ice Palace
2025-11-03
#book
#fiction
#literature
(1959) The Poorhouse Fair
2025-11-03
#book
#fiction
#literature
(1952) The Old Man and the Sea
2025-11-03
#book
#fiction
#literature
(1969) Portnoy's Complaint
2025-10-29
#book
#fiction
#literature
(1905) House of Mirth
2025-10-24
#book
#fiction
(2015) Solenoid
2025-10-18
#book
#fiction
#literature
(1960) Rabbit, Run
2025-10-09
#fiction
#literature
(1977) Unknown Man No. 89
2025-10-02
#book
#crime
#fiction
(1978) La Rue des Boutiques Obscures
2025-09-26
#book
#fiction
#literature
(1962) The Man in the High Castle
2025-09-22
#book
#fiction
#sci-fi
(2001) Atonement
2025-09-18
#book
#fiction
#literature
(2025) All the Way to the River
2025-09-15
#book
#memoir
(2006) Eat Pray Love
2025-09-15
#book
#memoir
(1963) Run River
2025-09-11
#book
#fiction
#literature
(1982) The Names
2025-09-04
#fiction
#literature
(2025) People Like Us
2025-08-29
#book
#fiction
(1976) Le Jour de Congé
2025-08-25
#book
#fiction
(1974) 52 Pickup
2025-08-25
#book
#fiction
(2022) Septology
2025-08-22
#book
#fiction
#literature
(1965) Stoner
2025-08-11
#book
#fiction
(1976) Swag
2025-08-09
#book
#crime
#fiction
(2009) Raymond Carver; A Writer's Life
2025-08-08
#biography
#book
#writing
(1976) Will You Please be Quiet, Please?
2025-08-06
#fiction
#review
#short-story
(2025) Unforgiving Places
2025-07-16
#book
#politics
#sociology
(2024) The Anxious Generation
2025-07-14
#book
#sociology
(2021) Five Decembers
2025-07-14
#book
#fiction
#review
(1989) Remains of the Day
2025-07-14
#book
#fiction
(1929) The Sound and The Fury
2025-07-05
#book
#fiction
#literature
(1971) The Lathe of Heaven
2025-06-30
#book
#fiction
#sci-fi
(2022) The Right
2025-06-29
#book
#history
#politics
(1973) Competition and Entrepreneurship
2025-06-29
#book
#economics
(1991) Searoad
2025-06-27
#book
#fiction
(1953) Go Tell It on the Mountain
2025-06-23
#fiction
(2005) The Best of the Best Science Fiction
2025-06-16
#fiction
#sci-fi
(1984) Salvador
2025-06-16
#fiction
#sci-fi
(1984) A Cabin on the Coast
2025-06-16
#fiction
#sci-fi
(1983) Blood Music
2025-06-16
#fiction
#sci-fi
(1887) A Study in Scarlet
2025-06-13
#fiction
#short-story
(2024) America América
2025-06-08
#book
#history
(2025) Why Nothing Works
2025-06-05
#book
#politics
#systems
(2025) Coming Clean
2025-06-05
#book
#philosophy
#politics
(2025) Abundance
2025-06-05
#book
#politics
(2024) Perfection
2025-06-05
#book
#fiction
(2024) On Settler Colonialism
2025-06-05
#book
#philosophy
#politics
(2024) Nuclear War; A Scenario
2025-06-05
#book
#politics
(2023) The City and its Uncertain Walls
2025-06-05
#book
#fiction
(2023) Recoding America
2025-06-05
#book
#computing
#politics
#systems
(2022) The Mexican Economy
2025-06-05
#book
#economics
(2011) Freedom Betrayed
2025-06-05
#biography
#book
#history
#politics
(2009) Capitalist Realism
2025-06-05
#book
#philosophy
#politics
(2005) La Possibilité d'une île
2025-06-05
#book
#fiction
(1992) The End of History and the Last Man
2025-06-05
#book
#philosophy
#politics
(1983) La Place
2025-06-05
#book
#fiction
(1979) The Culture of Narcissism
2025-06-04
#book
#philosophy
(2026-01) qFALL – Rapid Prototyping of Lattice-based Cryptography
1970-01-01
#cryptography
#paper
(2026-01) Zero Knowledge (About) Encryption; A Comparative Security Analysis of Three Cloud-based Password Managers
1970-01-01
#cryptography
#paper
(2026-01) XM-VRF; Forward Secure, Fast and Key Updatable Hash Based Verifiable Random Function
1970-01-01
#cryptography
#paper
(2026-01) Verified non-recursive calculation of Beneš networks applied to Classic McEliece
1970-01-01
#cryptography
#paper
(2026-01) Uniform Sharing in Multiple Stages; NullFresh for Arbitrary Functions
1970-01-01
#cryptography
#paper
(2026-01) Tropical cryptography IV; Digital signatures and secret sharing with arbitrary access structure
1970-01-01
#cryptography
#paper
(2026-01) Timed Commitments and Timed Encryption; Generic Constructions and Instantiations from Isogenies
1970-01-01
#cryptography
#paper
(2026-01) The Cokernel Pairing
1970-01-01
#cryptography
#paper
(2026-01) The Billion Dollar Merkle Tree
1970-01-01
#cryptography
#paper
(2026-01) The Algebraic Isogeny Model; A General Model with Applications to SQIsign and Key Exchanges
1970-01-01
#cryptography
#paper
(2026-01) Tag-Friendly Lattice Sampler and Applications
1970-01-01
#cryptography
#paper
(2026-01) Structured Module Lattice-based Cryptography
1970-01-01
#cryptography
#paper
(2026-01) StarFortress; Hybrid Post-Quantum KEMs From SDH and IND-CCA
1970-01-01
#cryptography
#paper
(2026-01) SoK; Outsourced Private Set Intersection
1970-01-01
#cryptography
#paper
(2026-01) Secure Computation for Fixed-point and Floating-point Arithmetic
1970-01-01
#cryptography
#paper
(2026-01) Secret-Subspace Recovery in MAYO via Linearization of Errors from a Single Fault
1970-01-01
#cryptography
#paper
(2026-01) Scalable Distributed Key Generation for Blockchains
1970-01-01
#cryptography
#paper
(2026-01) SNARGs for NP and Non-Signaling PCPs, Revisited
1970-01-01
#cryptography
#paper
(2026-01) Round-Optimal Pairing-Free Blind Signatures
1970-01-01
#cryptography
#paper
(2026-01) Revisiting the Concrete Security of Falcon-type Signatures
1970-01-01
#cryptography
#paper
(2026-01) Re2creds; Reusable Anonymous Credentials from Malleable NIZK and Legacy Signatures
1970-01-01
#cryptography
#paper
(2026-01) Rank Syndrome Decoding Estimator - An Asymptotic and Concrete Analysis
1970-01-01
#cryptography
#paper
(2026-01) Rank Syndrome Decoding Estimator
1970-01-01
#cryptography
#paper
(2026-01) Qurrency; a quantum-secure, private, and auditable platform for digital assets
1970-01-01
#cryptography
#paper
(2026-01) Practical Subvector Commitments with Optimal Opening Complexity
1970-01-01
#cryptography
#paper
(2026-01) Practical SNARGs for Matrix Multiplications over Encrypted Data
1970-01-01
#cryptography
#paper
(2026-01) Policy-based Access Tokens; Privacy-Preserving Verification for Digital Identity
1970-01-01
#cryptography
#paper
(2026-01) Optimized Implementation of ML-KEM on ARMv9-A with SVE2 and SME
1970-01-01
#cryptography
#paper
(2026-01) On those Boolean functions having only one Walsh zero
1970-01-01
#cryptography
#paper
(2026-01) On the Impossibility of Round-Optimal Pairing-Free Blind Signatures in the ROM
1970-01-01
#cryptography
#paper
(2026-01) New Quantum Circuits for ECDLP; Breaking Prime Elliptic Curve Cryptography in Minutes
1970-01-01
#cryptography
#paper
(2026-01) Masked Solving of Linear Equations System and Application to UOV Signatures
1970-01-01
#cryptography
#paper
(2026-01) Low-Latency Low-Randomness OPINI Gadgets and Their Formal Verification
1970-01-01
#cryptography
#paper
(2026-01) Logarithmic density of rank -geq1 and -geq2 genus-2 Jacobians and applications to hyperelliptic curve cryptography
1970-01-01
#cryptography
#paper
(2026-01) Lether; Practical Post-Quantum Account-Based Private Blockchain Payments
1970-01-01
#cryptography
#paper
(2026-01) LatORAM; ORAMs from Lateral Stashes and Delayed Shuffling
1970-01-01
#cryptography
#paper
(2026-01) L for the Price of One; On the Benefits of Using more than t+1 Parties in Threshold Signing
1970-01-01
#cryptography
#paper
(2026-01) Jindo; Practical Lattice-Based Polynomial Commitment for Zero-Knowledge Arguments
1970-01-01
#cryptography
#paper
(2026-01) JAGUAR; Efficient and Secure Unbalanced PSI under Malicious Adversaries in the Client-Server Setting
1970-01-01
#cryptography
#paper
(2026-01) Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks
1970-01-01
#cryptography
#paper
(2026-01) Incremental Single-Server Private Information Retrieval
1970-01-01
#cryptography
#paper
(2026-01) IND-CCA Lattice Threshold KEM under 30 KiB
1970-01-01
#cryptography
#paper
(2026-01) How to Steal Oblivious Transfer from Minicrypt
1970-01-01
#cryptography
#paper
(2026-01) Heli; Heavy-Light Private Aggregation
1970-01-01
#cryptography
#paper
(2026-01) Hardware-Friendly Robust Threshold ECDSA in an Asymmetric Model
1970-01-01
#cryptography
#paper
(2026-01) HYPERSHIELD; Protecting the Hypercube MPC-in-the-Head Framework Against Differential Probing Adversaries without Masking
1970-01-01
#cryptography
#paper
(2026-01) HIC is all you need; Practical Post-Quantum Password-Authenticated Public Key Encryption
1970-01-01
#cryptography
#paper
(2026-01) Generating Falcon Trapdoors via Gibbs Sampler
1970-01-01
#cryptography
#paper
(2026-01) Generalization of the Class Elimination Attack to Block Ciphers
1970-01-01
#cryptography
#paper
(2026-01) Functional Decomposition of Multivariate Polynomials; Revisit and New Improvements
1970-01-01
#cryptography
#paper
(2026-01) Fully Secure DKG Protocols for Discrete Logarithm Revisited
1970-01-01
#cryptography
#paper
(2026-01) Fully Dynamic Verifiable Secret Sharing and its Application to DPSS
1970-01-01
#cryptography
#paper
(2026-01) From -textsf{TS-SUF-2} to -textsf{TS-SUF-4}; Practical Security Enhancements for -textsf{FROST2} Threshold Signatures
1970-01-01
#cryptography
#paper
(2026-01) Formalizing Privacy in Decentralized Identity; A Provably Secure Framework with Minimal Disclosure
1970-01-01
#cryptography
#paper
(2026-01) Faster Than Ever; A New Lightweight Private Set Intersection and Its Variants
1970-01-01
#cryptography
#paper
(2026-01) Faster Short Pairing-Based NIZK Proofs for Ring LWE Ciphertexts
1970-01-01
#cryptography
#paper
(2026-01) Fast Unbalanced Private Computation on Set Intersection from Permuted Multi-Query Private Membership Test
1970-01-01
#cryptography
#paper
(2026-01) Extending RISC-V to Support Flexible-Radix Multiply-Accumulate Operations
1970-01-01
#cryptography
#paper
(2026-01) Equivalent computational problems for superspecial abelian surfaces
1970-01-01
#cryptography
#paper
(2026-01) Efficient Threshold ML-DSA
1970-01-01
#cryptography
#paper
(2026-01) Efficient Polynomial Evaluation over Structured Space and Application to Polynomial Method
1970-01-01
#cryptography
#paper
(2026-01) Deal out oblivious correlations; 2-depth HSS circuit for silent V-OLE generation
1970-01-01
#cryptography
#paper
(2026-01) Concretely Efficient Blind Signatures Based on VOLE-in-the-Head Proofs and the MAYO Trapdoor
1970-01-01
#cryptography
#paper
(2026-01) Complete Characterization of Randomness Extraction from DAG-Correlated Sources
1970-01-01
#cryptography
#paper
(2026-01) Chasing Rabbits Through Hypercubes; Better algorithms for higher dimensional 2-isogeny computations
1970-01-01
#cryptography
#paper
(2026-01) Breaking the Myth of MPCitH Inefficiency; Optimizing MQOM for Embedded Platforms
1970-01-01
#cryptography
#paper
(2026-01) Breaking the KAZ Suite; Practical Key Recovery Attacks on MySEAL 2.0’s Post-Quantum Candidates
1970-01-01
#cryptography
#paper
(2026-01) Blind Adaptor Signatures, Revisited; Stronger Security Definitions and Their Construction toward Practical Applications
1970-01-01
#cryptography
#paper
(2026-01) Benchmarking of the Amortized Post Quantum Combiner for MLS
1970-01-01
#cryptography
#paper
(2026-01) Batch Arguments with Optimal Communication
1970-01-01
#cryptography
#paper
(2026-01) BREAKMEIFYOUCAN!; Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies
1970-01-01
#cryptography
#paper
(2026-01) BLISK; Boolean circuit Logic Integrated into the Single Key
1970-01-01
#cryptography
#paper
(2026-01) BABE; Verifying Proofs on Bitcoin Made 1000x Cheaper
1970-01-01
#cryptography
#paper
(2026-01) Augmenting BBS with Conventional Signatures
1970-01-01
#cryptography
#paper
(2026-01) Arithmetic autocorrelation of binary half--ell-sequences with connection integer p^{r}q^{s}
1970-01-01
#cryptography
#paper
(2026-01) Argo MAC; Garbling with Elliptic Curve MACs
1970-01-01
#cryptography
#paper
(2026-01) Analysis and Attacks on the Reputation System of Nym
1970-01-01
#cryptography
#paper
(2026-01) An improved random AKS-class primality proving algorithm
1970-01-01
#cryptography
#paper
(2026-01) Adaptive NIKE for Unbounded Parties
1970-01-01
#cryptography
#paper
(2026-01) Aborting Random Oracles; How to Build them, How to Use them
1970-01-01
#cryptography
#paper
(2026-01) Abelian surfaces in Hesse form and explicit isogeny formulas
1970-01-01
#cryptography
#paper
(2026-01) AKE Protocol Combining PQC and QKD
1970-01-01
#cryptography
#paper
(2026-01) A SNARK for (Non-)Subsequences with Text-Sub-Linear Proving Time
1970-01-01
#cryptography
#paper
(2026-01) A General Randomness Reuse Framework for First-Order Secure Masking and Applications on AES Design Using Randomness Solely for Input Encoding
1970-01-01
#cryptography
#paper
(2026-01) A Certified Framework for Deterministic Navigation in Higher-Genus p-Isogeny Graphs
1970-01-01
#cryptography
#paper
(2026-01) 2PC Memory-Manipulating Programs with Constant Overhead
1970-01-01
#cryptography
#paper
(2025-12) d-v-CLSAG; Extension for Concise Linkable Spontaneous Anonymous Group Signatures
1970-01-01
#cryptography
#paper
(2025-12) Verifiable Aggregate Receipts with Applications to User Engagement Auditing
1970-01-01
#cryptography
#paper
(2025-12) UFOs; An Ultra-fast Toolkit for Multiparty Computation of Small Elements
1970-01-01
#cryptography
#paper
(2025-12) Transparent and Post-Quantum Distributed SNARK with Linear Prover Time
1970-01-01
#cryptography
#paper
(2025-12) Succinct Garbled Circuits with Low-Depth Garbling Algorithms
1970-01-01
#cryptography
#paper
(2025-12) Streaming Function Secret Sharing and Its Applications
1970-01-01
#cryptography
#paper
(2025-12) SoK; Verifiable Federated Learning
1970-01-01
#cryptography
#paper
(2025-12) SoK; Approximate Agreement
1970-01-01
#cryptography
#paper
(2025-12) SUMSIG; Compact Code-Based Signatures from Sum-Check Protocols
1970-01-01
#cryptography
#paper
(2025-12) SNARGs for NP via Fiat--Shamir in the Plain Model
1970-01-01
#cryptography
#paper
(2025-12) Pseudorandom Correlation Functions for Garbled Circuits
1970-01-01
#cryptography
#paper
(2025-12) On the representation of self-orthogonal codes and applications to cryptography
1970-01-01
#cryptography
#paper
(2025-12) On Delegation of Verifiable Presentations from mdoc and BBS Credentials
1970-01-01
#cryptography
#paper
(2025-12) OOPS; One-time Oblivious Polynomial Signatures
1970-01-01
#cryptography
#paper
(2025-12) OHMG; One hot modular garbling
1970-01-01
#cryptography
#paper
(2025-12) New Constructions of Multiplicative Secret Sharing Schemes
1970-01-01
#cryptography
#paper
(2025-12) Nested YOSO MPC; Near Optimal Resilience Without an MPC Setup
1970-01-01
#cryptography
#paper
(2025-12) Moving a Step of ChaCha in Syncopated Rhythm (Extended Version)
1970-01-01
#cryptography
#paper
(2025-12) ML-DSA-OSH; An Efficient, Open-Source Hardware Implementation of ML-DSA
1970-01-01
#cryptography
#paper
(2025-12) Leakage-Resilient Multi-Party Computation; Protecting the Evaluator in Circuits Garbling
1970-01-01
#cryptography
#paper
(2025-12) InstantOMR; Oblivious Message Retrieval with Low Latency and Optimal Parallelizability
1970-01-01
#cryptography
#paper
(2025-12) High-Performance SIMD Software for Spielman Codes in Zero-Knowledge Proofs
1970-01-01
#cryptography
#paper
(2025-12) HHGS; Forward-secure Dynamic Group Signatures from Symmetric Primitives
1970-01-01
#cryptography
#paper
(2025-12) Fully Distributed Multi-Point Functions for PCGs and Beyond
1970-01-01
#cryptography
#paper
(2025-12) FRIVail; A Data Availability Scheme based on FRI Binius
1970-01-01
#cryptography
#paper
(2025-12) Efficiently Provable Approximations for Non-Polynomial Functions
1970-01-01
#cryptography
#paper
(2025-12) DNS-Anchored zk-SNARK Proofs; A Stateless Alternative to ACME Challenge-Response for Domain Control Validation
1970-01-01
#cryptography
#paper
(2025-12) Conditionally Input-Revealing 2PC and Fuzzy Password-Authenticated Key Exchange
1970-01-01
#cryptography
#paper
(2025-12) Analysis of Diffusion Properties in Generalized Feistel Ciphers under Multidimensional Linear Cryptanalysis
1970-01-01
#cryptography
#paper
(2025-12) An Ideal Linear Secret Sharing Scheme for Complete t-Partite k-Uniform Hypergraph Access Structures
1970-01-01
#cryptography
#paper
(2025-12) Accelerating FrodoKEM in Hardware
1970-01-01
#cryptography
#paper
(2025-12) A note on ''a fully dynamic multi-secret sharing scheme with redundant authorization''
1970-01-01
#cryptography
#paper
(2025-12) A New Approach to Large Party Beaver-Style MPC with Small Computational Overhead
1970-01-01
#cryptography
#paper
(2025-11) Vega
1970-01-01
#cryptography
#paper
(2025-11) Time-Lock Encrypted Storage for Blockchains
1970-01-01
#cryptography
#paper
(2025-11) QUIC-MLS
1970-01-01
#cryptography
#paper
(2025-11) On Reed–Solomon Proximity Gaps Conjectures
1970-01-01
#cryptography
#paper
(2025-11) On Proximity Gaps for Reed–Solomon Codes
1970-01-01
#cryptography
#paper
(2025-11) Compact, Efficient and Non-Separable Hybrid Signatures
1970-01-01
#cryptography
#paper
(2025-11) All Polynomial Generators Preserve Distance with Mutual Correlated Agreement
1970-01-01
#cryptography
#paper
(2025-08) zip
1970-01-01
#cryptography
#paper
(2025-08) When Can We Incrementally Prove Computations of Arbitrary Depth?
1970-01-01
#cryptography
#paper
(2025-08) VOLE-in-the-Head Signatures Based on the Linear Code Equivalence Problem
1970-01-01
#cryptography
#paper
(2025-08) Two-Tier Black-box Blockchains and Application to Instant Layer-1 Payments
1970-01-01
#cryptography
#paper
(2025-08) Towards Building Efficient SCALES Protocols
1970-01-01
#cryptography
#paper
(2025-08) The Best of Both KEMs
1970-01-01
#cryptography
#paper
(2025-08) Stateless 2PC Signatures for Internet-Scale Authentication and Authorization
1970-01-01
#cryptography
#paper
(2025-08) Starfighters — on the general applicability of X-Wing
1970-01-01
#cryptography
#paper
(2025-08) Snake Mackerel
1970-01-01
#cryptography
#paper
(2025-08) Scalable Secure Multiparty Computation with Perfect Security from Preprocessing
1970-01-01
#cryptography
#paper
(2025-08) Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode
1970-01-01
#cryptography
#paper
(2025-08) Polynomial Lattices for the BIKE Cryptosystem
1970-01-01
#cryptography
#paper
(2025-08) Peeking Into the Future
1970-01-01
#cryptography
#paper
(2025-08) Password-Hardened Encryption Revisited
1970-01-01
#cryptography
#paper
(2025-08) Optimistic Message Dissemination
1970-01-01
#cryptography
#paper
(2025-08) Note
1970-01-01
#cryptography
#paper
(2025-08) Not Easy to Prepare a Pesto
1970-01-01
#cryptography
#paper
(2025-08) Naor-Reingold goes Beyond-the-Birthday-Bound
1970-01-01
#cryptography
#paper
(2025-08) LESS is Even More
1970-01-01
#cryptography
#paper
(2025-08) Fully-Fluctuating Participation in Sleepy Consensus
1970-01-01
#cryptography
#paper
(2025-08) Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH
1970-01-01
#cryptography
#paper
(2025-08) Data Availability Sampling with Repair
1970-01-01
#cryptography
#paper
(2025-08) DOC★
1970-01-01
#cryptography
#paper
(2025-08) Cross-Consensus Reliable Broadcast and its Applications
1970-01-01
#cryptography
#paper
(2025-08) Coral
1970-01-01
#cryptography
#paper
(2025-08) Can we Speed up Information Set Decoding by Using Extension Field Structure?
1970-01-01
#cryptography
#paper
(2025-08) Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes
1970-01-01
#cryptography
#paper
(2025-08) Adaptively Secure Threshold ElGamal Decryption from DDH
1970-01-01
#cryptography
#paper
(2025-08) AGB 2.0
1970-01-01
#cryptography
#paper
(2025-08) ABEL
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Binding Properties of KEM Combiners
1970-01-01
#cryptography
#paper
(2025-08) A New Paradigm for Privacy-Preserving Decision Tree Evaluation
1970-01-01
#cryptography
#paper
(2025-08) A Fully-Adaptive Threshold Partially-Oblivious PRF
1970-01-01
#cryptography
#paper
(2025-07) What’s the Matter? An In-Depth Security Analysis of the Matter Protocol
1970-01-01
#cryptography
#paper
(2025-07) Tree PCPs
1970-01-01
#cryptography
#paper
(2025-07) Sota Voce
1970-01-01
#cryptography
#paper
(2025-07) SLVer Bullet
1970-01-01
#cryptography
#paper
(2025-07) Post-Quantum Readiness in EdDSA Chains
1970-01-01
#cryptography
#paper
(2025-07) PlasmaFold
1970-01-01
#cryptography
#paper
(2025-07) Opossum Attack
1970-01-01
#cryptography
#paper
(2025-07) On Weak NIZKs, One-way Functions and Amplification
1970-01-01
#cryptography
#paper
(2025-07) Note
1970-01-01
#cryptography
#paper
(2025-07) Multi-Source Randomness Extraction and Generation in the Random-Oracle Model
1970-01-01
#cryptography
#paper
(2025-07) Linear Prover IOPs in Log Star Rounds
1970-01-01
#cryptography
#paper
(2025-07) How to Tolerate Typos in Strong Asymmetric PAKE
1970-01-01
#cryptography
#paper
(2025-07) Gödel in Cryptography
1970-01-01
#cryptography
#paper
(2025-07) Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security
1970-01-01
#cryptography
#paper
(2025-07) FRIttata
1970-01-01
#cryptography
#paper
(2025-07) Efficiently parsing existing eID documents for zero-knowledge proofs
1970-01-01
#cryptography
#paper
(2025-07) Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size
1970-01-01
#cryptography
#paper
(2025-07) Batch Decryption without Epochs and its Application to Encrypted Mempools
1970-01-01
#cryptography
#paper
(2025-07) A note on the security of the BitVM3 garbling scheme
1970-01-01
#cryptography
#paper
(2025-06) Understanding Lasso
1970-01-01
#cryptography
#paper
(2025-06) Threshold Signatures Reloaded
1970-01-01
#cryptography
#paper
(2025-06) Speeding Up Sum-Check Proving
1970-01-01
#cryptography
#paper
(2025-06) SmallWood
1970-01-01
#cryptography
#paper
(2025-06) Simple VESS
1970-01-01
#cryptography
#paper
(2025-06) OnionPIRv2
1970-01-01
#cryptography
#paper
(2025-06) New Upper and Lower Bounds for Perfectly Secure MPC
1970-01-01
#cryptography
#paper
(2025-06) Guarding the Signal
1970-01-01
#cryptography
#paper
(2025-06) Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations
1970-01-01
#cryptography
#paper
(2025-06) Evaluation of Modular Polynomials from Supersingular Elliptic Curves
1970-01-01
#cryptography
#paper
(2025-06) Efficient, Scalable Threshold ML-DSA Signatures
1970-01-01
#cryptography
#paper
(2025-06) Cryptanalysis of HiAE
1970-01-01
#cryptography
#paper
(2025-06) Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions
1970-01-01
#cryptography
#paper
(2025-06) Bridging Bitcoin to Second Layers via BitVM2
1970-01-01
#cryptography
#paper
(2025-06) Beyond LWE
1970-01-01
#cryptography
#paper
(2025-06) A search to distinguish reduction for the isomorphism problem on direct sum lattices
1970-01-01
#cryptography
#paper
(2025-06) A Tale of Two Worlds, a Formal Story of WireGuard Hybridization
1970-01-01
#cryptography
#paper
(2025-05) Groebner Basis Cryptanalysis of Anemoi
1970-01-01
#cryptography
#paper
(2025-05) Diving Deep Into UC
1970-01-01
#cryptography
#paper
(2025-05) A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures
1970-01-01
#cryptography
#paper
(2025-03) Improved Cryptanalysis of ChaCha
1970-01-01
#cryptography
#paper
(2025-03) Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix
1970-01-01
#cryptography
#paper
(2025-03) A Fiat–Shamir Transformation From Duplex Sponges
1970-01-01
#cryptography
#paper
(2024-12) BitGC
1970-01-01
#cryptography
#paper
(2024-11) Impossibility Results for Post-Compromise Security in Real-World Communication Systems
1970-01-01
#cryptography
#paper
(2024-10) Blaze
1970-01-01
#cryptography
#paper
(2024-09) Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
1970-01-01
#cryptography
#paper
(2024-07) TaSSLE
1970-01-01
#cryptography
#paper
(2024-07) A reduction from Hawk to the principal ideal problem in a quaternion algebra
1970-01-01
#cryptography
#paper
(2024-03) The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
1970-01-01
#cryptography
#paper
(2023-08) Verifiable Verification in Cryptographic Protocols
1970-01-01
#cryptography
#paper
(2023-04) Adding more parallelism to the AEGIS authenticated encryption algorithms
1970-01-01
#cryptography
#paper
(2023-03) Simplex Consensus
1970-01-01
#cryptography
#paper
(2022-03) Block-Cipher-Based Tree Hashing
1970-01-01
#cryptography
#paper
(2017-05) Multi-Collision Resistance
1970-01-01
#cryptography
#paper
(2017-01) The STROBE protocol framework
1970-01-01
#cryptography
#paper
(2017-01) Farfalle
1970-01-01
#cryptography
#paper
(2016-08) KangarooTwelve
1970-01-01
#cryptography
#paper