Tag - #cryptography
(2025) Homomorphically Encrypting CRDTs
2025-06-17
#computing
#cryptography
A Sketch of Synthetic Cryptography
2023-06-22
#category-theory
#cryptography
#foundations
Some Bits about Cait-Sith
2023-03-09
#cryptography
#mpc
Cryptography without Security
2023-02-19
#cryptography
#foundations
DKGs in Groups
2022-10-09
#cryptography
#protocols
Notes on STARK Arithmetization
2022-09-25
#cryptography
#zk-proofs
The Paper that Keeps Showing Up
2022-08-21
#cryptography
#zk-proofs
Some KEMs and Some Proofs
2022-08-14
#cryptography
#foundations
#kems
Basic Cryptography Without Fluff
2022-07-16
#cryptography
On Identifiable Aborts
2022-06-26
#cryptography
#protocols
State-Separable Proofs for the Curious Cryptographer
2022-05-28
#cryptography
#foundations
Some Cryptography Books I Like
2022-05-14
#books
#cryptography
Explaining Yao's Garbled Circuits
2022-05-01
#cryptography
#mpc
Canetti et al's Paradoxical Encryption Scheme
2022-04-23
#cryptography
On Monero's Ring Signatures
2022-03-07
#cryptography
#elliptic-curve
#signature
On The Malleability of ECDSA Signatures
2022-02-06
#cryptography
#signature
My Quick Attempt at Bluesky's Satellite Challenge
2021-09-03
#cryptography
#decentralized
#security
Taproot Signatures and BIP-32
2021-08-03
#cryptocurrency
#cryptography
#security
On Multi-Set Hashing
2021-07-25
#cryptography
#math
Signatures From Identification Schemes
2021-07-10
#cryptography
#math
#security
Introducing Nuntius
2021-07-05
#cryptography
#math
#security
End-to-End Encryption in Web Apps
2021-06-20
#cryptography
#security
#web
Introducing Nimotsu
2021-06-06
#cryptography
#math
#security
Constant-Time Big Numbers: An Introduction
2021-04-05
#cryptography
#math
#security
(2025-11) Vega - Low-Latency Zero-Knowledge Proofs over Existing Credentials
1970-01-01
#cryptography
#paper
(2025-11) Time-Lock Encrypted Storage for Blockchains
1970-01-01
#cryptography
#paper
(2025-11) QUIC-MLS - Making a Space Security Draft Standard Resilient for Disconnected Environments
1970-01-01
#cryptography
#paper
(2025-11) On Reed–Solomon Proximity Gaps Conjectures
1970-01-01
#cryptography
#paper
(2025-11) On Proximity Gaps for Reed–Solomon Codes
1970-01-01
#cryptography
#paper
(2025-11) Compact, Efficient and Non-Separable Hybrid Signatures
1970-01-01
#cryptography
#paper
(2025-11) All Polynomial Generators Preserve Distance with Mutual Correlated Agreement
1970-01-01
#cryptography
#paper
(2025-08) zip - Reducing Proof Sizes for Hash-Based SNARGs
1970-01-01
#cryptography
#paper
(2025-08) When Can We Incrementally Prove Computations of Arbitrary Depth?
1970-01-01
#cryptography
#paper
(2025-08) VOLE-in-the-Head Signatures Based on the Linear Code Equivalence Problem
1970-01-01
#cryptography
#paper
(2025-08) Two-Tier Black-box Blockchains and Application to Instant Layer-1 Payments
1970-01-01
#cryptography
#paper
(2025-08) Towards Building Efficient SCALES Protocols
1970-01-01
#cryptography
#paper
(2025-08) The Best of Both KEMs - Securely Combining KEMs in Post-Quantum Hybrid Schemes
1970-01-01
#cryptography
#paper
(2025-08) Stateless 2PC Signatures for Internet-Scale Authentication and Authorization
1970-01-01
#cryptography
#paper
(2025-08) Starfighters — on the general applicability of X-Wing
1970-01-01
#cryptography
#paper
(2025-08) Snake Mackerel - An Isogeny-Based AKEM Leveraging Randomness Reuse
1970-01-01
#cryptography
#paper
(2025-08) Scalable Secure Multiparty Computation with Perfect Security from Preprocessing
1970-01-01
#cryptography
#paper
(2025-08) Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode
1970-01-01
#cryptography
#paper
(2025-08) Polynomial Lattices for the BIKE Cryptosystem
1970-01-01
#cryptography
#paper
(2025-08) Peeking Into the Future - MPC Resilient to Super-Rushing Adversaries
1970-01-01
#cryptography
#paper
(2025-08) Password-Hardened Encryption Revisited
1970-01-01
#cryptography
#paper
(2025-08) Optimistic Message Dissemination
1970-01-01
#cryptography
#paper
(2025-08) Note - Shared Key Recovery Attack on Cascader Key Exchange Protocol
1970-01-01
#cryptography
#paper
(2025-08) Not Easy to Prepare a Pesto - Cryptanalysis of a Multivariate Public-Key Scheme from CCZ Equivalence
1970-01-01
#cryptography
#paper
(2025-08) Naor-Reingold goes Beyond-the-Birthday-Bound
1970-01-01
#cryptography
#paper
(2025-08) LESS is Even More - Optimizing Digital Signatures from Code Equivalence
1970-01-01
#cryptography
#paper
(2025-08) Fully-Fluctuating Participation in Sleepy Consensus
1970-01-01
#cryptography
#paper
(2025-08) Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH
1970-01-01
#cryptography
#paper
(2025-08) Data Availability Sampling with Repair
1970-01-01
#cryptography
#paper
(2025-08) DOC★ - Access Control for Information-Theoretically Secure Key-Document Stores
1970-01-01
#cryptography
#paper
(2025-08) Cross-Consensus Reliable Broadcast and its Applications
1970-01-01
#cryptography
#paper
(2025-08) Coral - Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs
1970-01-01
#cryptography
#paper
(2025-08) Can we Speed up Information Set Decoding by Using Extension Field Structure?
1970-01-01
#cryptography
#paper
(2025-08) Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes
1970-01-01
#cryptography
#paper
(2025-08) Adaptively Secure Threshold ElGamal Decryption from DDH
1970-01-01
#cryptography
#paper
(2025-08) AGB 2.0 - Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications
1970-01-01
#cryptography
#paper
(2025-08) ABEL - Perfect Asynchronous Byzantine Extension from List-Decoding
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Binding Properties of KEM Combiners
1970-01-01
#cryptography
#paper
(2025-08) A New Paradigm for Privacy-Preserving Decision Tree Evaluation
1970-01-01
#cryptography
#paper
(2025-08) A Fully-Adaptive Threshold Partially-Oblivious PRF
1970-01-01
#cryptography
#paper
(2025-07) What’s the Matter? An In-Depth Security Analysis of the Matter Protocol
1970-01-01
#cryptography
#paper
(2025-07) Tree PCPs
1970-01-01
#cryptography
#paper
(2025-07) Sota Voce - Low-Noise Sampling of Sparse Fixed-Weight Vectors
1970-01-01
#cryptography
#paper
(2025-07) SLVer Bullet - Straight-Line Verification for Bulletproofs
1970-01-01
#cryptography
#paper
(2025-07) Post-Quantum Readiness in EdDSA Chains
1970-01-01
#cryptography
#paper
(2025-07) PlasmaFold - An Efficient and Scalable Layer 2 with Client-Side Proving
1970-01-01
#cryptography
#paper
(2025-07) Opossum Attack - Application Layer Desynchronization using Opportunistic TLS
1970-01-01
#cryptography
#paper
(2025-07) On Weak NIZKs, One-way Functions and Amplification
1970-01-01
#cryptography
#paper
(2025-07) Note - Full-round distinguisher for Synergy
1970-01-01
#cryptography
#paper
(2025-07) Multi-Source Randomness Extraction and Generation in the Random-Oracle Model
1970-01-01
#cryptography
#paper
(2025-07) Linear Prover IOPs in Log Star Rounds
1970-01-01
#cryptography
#paper
(2025-07) How to Tolerate Typos in Strong Asymmetric PAKE
1970-01-01
#cryptography
#paper
(2025-07) Gödel in Cryptography - Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness
1970-01-01
#cryptography
#paper
(2025-07) Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security
1970-01-01
#cryptography
#paper
(2025-07) FRIttata - Distributed Proof Generation of FRI-based SNARKs
1970-01-01
#cryptography
#paper
(2025-07) Efficiently parsing existing eID documents for zero-knowledge proofs
1970-01-01
#cryptography
#paper
(2025-07) Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size
1970-01-01
#cryptography
#paper
(2025-07) Batch Decryption without Epochs and its Application to Encrypted Mempools
1970-01-01
#cryptography
#paper
(2025-07) A note on the security of the BitVM3 garbling scheme
1970-01-01
#cryptography
#paper
(2025-06) Understanding Lasso - A Novel Lookup Argument Protocol
1970-01-01
#cryptography
#paper
(2025-06) Threshold Signatures Reloaded - ML-DSA and Enhanced Raccoon with Identifiable Aborts
1970-01-01
#cryptography
#paper
(2025-06) Speeding Up Sum-Check Proving
1970-01-01
#cryptography
#paper
(2025-06) SmallWood - Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances
1970-01-01
#cryptography
#paper
(2025-06) Simple VESS
1970-01-01
#cryptography
#paper
(2025-06) OnionPIRv2 - Efficient Single-Server PIR
1970-01-01
#cryptography
#paper
(2025-06) New Upper and Lower Bounds for Perfectly Secure MPC
1970-01-01
#cryptography
#paper
(2025-06) Guarding the Signal - Secure Messaging with Reverse Firewalls
1970-01-01
#cryptography
#paper
(2025-06) Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations
1970-01-01
#cryptography
#paper
(2025-06) Evaluation of Modular Polynomials from Supersingular Elliptic Curves
1970-01-01
#cryptography
#paper
(2025-06) Efficient, Scalable Threshold ML-DSA Signatures - An MPC Approach
1970-01-01
#cryptography
#paper
(2025-06) Cryptanalysis of HiAE
1970-01-01
#cryptography
#paper
(2025-06) Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions
1970-01-01
#cryptography
#paper
(2025-06) Bridging Bitcoin to Second Layers via BitVM2
1970-01-01
#cryptography
#paper
(2025-06) Beyond LWE - a Lattice Framework for Homomorphic Encryption
1970-01-01
#cryptography
#paper
(2025-06) A search to distinguish reduction for the isomorphism problem on direct sum lattices
1970-01-01
#cryptography
#paper
(2025-06) A Tale of Two Worlds, a Formal Story of WireGuard Hybridization
1970-01-01
#cryptography
#paper
(2025-05) Groebner Basis Cryptanalysis of Anemoi
1970-01-01
#cryptography
#paper
(2025-05) Diving Deep Into UC - Uncovering and Resolving Issues in Universal Composability
1970-01-01
#cryptography
#paper
(2025-05) A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures
1970-01-01
#cryptography
#paper
(2025-03) Improved Cryptanalysis of ChaCha - Beating PNBs with Bit Puncturing
1970-01-01
#cryptography
#paper
(2025-03) Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix
1970-01-01
#cryptography
#paper
(2025-03) A Fiat–Shamir Transformation From Duplex Sponges
1970-01-01
#cryptography
#paper
(2024-12) BitGC - Garbled Circuits with 1 Bit per Gate
1970-01-01
#cryptography
#paper
(2024-11) Impossibility Results for Post-Compromise Security in Real-World Communication Systems
1970-01-01
#cryptography
#paper
(2024-10) Blaze - Fast SNARKs from Interleaved RAA Codes
1970-01-01
#cryptography
#paper
(2024-09) Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
1970-01-01
#cryptography
#paper
(2024-07) TaSSLE - Lasso for the commitment-phobic
1970-01-01
#cryptography
#paper
(2024-07) A reduction from Hawk to the principal ideal problem in a quaternion algebra
1970-01-01
#cryptography
#paper
(2024-03) The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
1970-01-01
#cryptography
#paper
(2023-08) Verifiable Verification in Cryptographic Protocols
1970-01-01
#cryptography
#paper
(2023-04) Adding more parallelism to the AEGIS authenticated encryption algorithms
1970-01-01
#cryptography
#paper
(2023-03) Simplex Consensus - A Simple and Fast Consensus Protocol
1970-01-01
#cryptography
#paper
(2022-03) Block-Cipher-Based Tree Hashing
1970-01-01
#cryptography
#paper
(2017-05) Multi-Collision Resistance - A Paradigm for Keyless Hash Functions
1970-01-01
#cryptography
#paper
(2017-01) The STROBE protocol framework
1970-01-01
#cryptography
#paper
(2017-01) Farfalle - parallel permutation-based cryptography
1970-01-01
#cryptography
#paper
(2016-08) KangarooTwelve - fast hashing based on Keccak-p
1970-01-01
#cryptography
#paper