Tag - #paper
(2025-11) Vega - Low-Latency Zero-Knowledge Proofs over Existing Credentials
1970-01-01
#cryptography
#paper
(2025-11) Time-Lock Encrypted Storage for Blockchains
1970-01-01
#cryptography
#paper
(2025-11) QUIC-MLS - Making a Space Security Draft Standard Resilient for Disconnected Environments
1970-01-01
#cryptography
#paper
(2025-11) On Reed–Solomon Proximity Gaps Conjectures
1970-01-01
#cryptography
#paper
(2025-11) On Proximity Gaps for Reed–Solomon Codes
1970-01-01
#cryptography
#paper
(2025-11) Compact, Efficient and Non-Separable Hybrid Signatures
1970-01-01
#cryptography
#paper
(2025-11) All Polynomial Generators Preserve Distance with Mutual Correlated Agreement
1970-01-01
#cryptography
#paper
(2025-08) zip - Reducing Proof Sizes for Hash-Based SNARGs
1970-01-01
#cryptography
#paper
(2025-08) When Can We Incrementally Prove Computations of Arbitrary Depth?
1970-01-01
#cryptography
#paper
(2025-08) VOLE-in-the-Head Signatures Based on the Linear Code Equivalence Problem
1970-01-01
#cryptography
#paper
(2025-08) Two-Tier Black-box Blockchains and Application to Instant Layer-1 Payments
1970-01-01
#cryptography
#paper
(2025-08) Towards Building Efficient SCALES Protocols
1970-01-01
#cryptography
#paper
(2025-08) The Best of Both KEMs - Securely Combining KEMs in Post-Quantum Hybrid Schemes
1970-01-01
#cryptography
#paper
(2025-08) Stateless 2PC Signatures for Internet-Scale Authentication and Authorization
1970-01-01
#cryptography
#paper
(2025-08) Starfighters — on the general applicability of X-Wing
1970-01-01
#cryptography
#paper
(2025-08) Snake Mackerel - An Isogeny-Based AKEM Leveraging Randomness Reuse
1970-01-01
#cryptography
#paper
(2025-08) Scalable Secure Multiparty Computation with Perfect Security from Preprocessing
1970-01-01
#cryptography
#paper
(2025-08) Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode
1970-01-01
#cryptography
#paper
(2025-08) Polynomial Lattices for the BIKE Cryptosystem
1970-01-01
#cryptography
#paper
(2025-08) Peeking Into the Future - MPC Resilient to Super-Rushing Adversaries
1970-01-01
#cryptography
#paper
(2025-08) Password-Hardened Encryption Revisited
1970-01-01
#cryptography
#paper
(2025-08) Optimistic Message Dissemination
1970-01-01
#cryptography
#paper
(2025-08) Note - Shared Key Recovery Attack on Cascader Key Exchange Protocol
1970-01-01
#cryptography
#paper
(2025-08) Not Easy to Prepare a Pesto - Cryptanalysis of a Multivariate Public-Key Scheme from CCZ Equivalence
1970-01-01
#cryptography
#paper
(2025-08) Naor-Reingold goes Beyond-the-Birthday-Bound
1970-01-01
#cryptography
#paper
(2025-08) LESS is Even More - Optimizing Digital Signatures from Code Equivalence
1970-01-01
#cryptography
#paper
(2025-08) Fully-Fluctuating Participation in Sleepy Consensus
1970-01-01
#cryptography
#paper
(2025-08) Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH
1970-01-01
#cryptography
#paper
(2025-08) Data Availability Sampling with Repair
1970-01-01
#cryptography
#paper
(2025-08) DOC★ - Access Control for Information-Theoretically Secure Key-Document Stores
1970-01-01
#cryptography
#paper
(2025-08) Cross-Consensus Reliable Broadcast and its Applications
1970-01-01
#cryptography
#paper
(2025-08) Coral - Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs
1970-01-01
#cryptography
#paper
(2025-08) Can we Speed up Information Set Decoding by Using Extension Field Structure?
1970-01-01
#cryptography
#paper
(2025-08) Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes
1970-01-01
#cryptography
#paper
(2025-08) Adaptively Secure Threshold ElGamal Decryption from DDH
1970-01-01
#cryptography
#paper
(2025-08) AGB 2.0 - Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications
1970-01-01
#cryptography
#paper
(2025-08) ABEL - Perfect Asynchronous Byzantine Extension from List-Decoding
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups
1970-01-01
#cryptography
#paper
(2025-08) A Note on the Binding Properties of KEM Combiners
1970-01-01
#cryptography
#paper
(2025-08) A New Paradigm for Privacy-Preserving Decision Tree Evaluation
1970-01-01
#cryptography
#paper
(2025-08) A Fully-Adaptive Threshold Partially-Oblivious PRF
1970-01-01
#cryptography
#paper
(2025-07) What’s the Matter? An In-Depth Security Analysis of the Matter Protocol
1970-01-01
#cryptography
#paper
(2025-07) Tree PCPs
1970-01-01
#cryptography
#paper
(2025-07) Sota Voce - Low-Noise Sampling of Sparse Fixed-Weight Vectors
1970-01-01
#cryptography
#paper
(2025-07) SLVer Bullet - Straight-Line Verification for Bulletproofs
1970-01-01
#cryptography
#paper
(2025-07) Post-Quantum Readiness in EdDSA Chains
1970-01-01
#cryptography
#paper
(2025-07) PlasmaFold - An Efficient and Scalable Layer 2 with Client-Side Proving
1970-01-01
#cryptography
#paper
(2025-07) Opossum Attack - Application Layer Desynchronization using Opportunistic TLS
1970-01-01
#cryptography
#paper
(2025-07) On Weak NIZKs, One-way Functions and Amplification
1970-01-01
#cryptography
#paper
(2025-07) Note - Full-round distinguisher for Synergy
1970-01-01
#cryptography
#paper
(2025-07) Multi-Source Randomness Extraction and Generation in the Random-Oracle Model
1970-01-01
#cryptography
#paper
(2025-07) Linear Prover IOPs in Log Star Rounds
1970-01-01
#cryptography
#paper
(2025-07) How to Tolerate Typos in Strong Asymmetric PAKE
1970-01-01
#cryptography
#paper
(2025-07) Gödel in Cryptography - Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness
1970-01-01
#cryptography
#paper
(2025-07) Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security
1970-01-01
#cryptography
#paper
(2025-07) FRIttata - Distributed Proof Generation of FRI-based SNARKs
1970-01-01
#cryptography
#paper
(2025-07) Efficiently parsing existing eID documents for zero-knowledge proofs
1970-01-01
#cryptography
#paper
(2025-07) Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size
1970-01-01
#cryptography
#paper
(2025-07) Batch Decryption without Epochs and its Application to Encrypted Mempools
1970-01-01
#cryptography
#paper
(2025-07) A note on the security of the BitVM3 garbling scheme
1970-01-01
#cryptography
#paper
(2025-06) Understanding Lasso - A Novel Lookup Argument Protocol
1970-01-01
#cryptography
#paper
(2025-06) Threshold Signatures Reloaded - ML-DSA and Enhanced Raccoon with Identifiable Aborts
1970-01-01
#cryptography
#paper
(2025-06) Speeding Up Sum-Check Proving
1970-01-01
#cryptography
#paper
(2025-06) SmallWood - Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances
1970-01-01
#cryptography
#paper
(2025-06) Simple VESS
1970-01-01
#cryptography
#paper
(2025-06) OnionPIRv2 - Efficient Single-Server PIR
1970-01-01
#cryptography
#paper
(2025-06) New Upper and Lower Bounds for Perfectly Secure MPC
1970-01-01
#cryptography
#paper
(2025-06) Guarding the Signal - Secure Messaging with Reverse Firewalls
1970-01-01
#cryptography
#paper
(2025-06) Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations
1970-01-01
#cryptography
#paper
(2025-06) Evaluation of Modular Polynomials from Supersingular Elliptic Curves
1970-01-01
#cryptography
#paper
(2025-06) Efficient, Scalable Threshold ML-DSA Signatures - An MPC Approach
1970-01-01
#cryptography
#paper
(2025-06) Cryptanalysis of HiAE
1970-01-01
#cryptography
#paper
(2025-06) Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions
1970-01-01
#cryptography
#paper
(2025-06) Bridging Bitcoin to Second Layers via BitVM2
1970-01-01
#cryptography
#paper
(2025-06) Beyond LWE - a Lattice Framework for Homomorphic Encryption
1970-01-01
#cryptography
#paper
(2025-06) A search to distinguish reduction for the isomorphism problem on direct sum lattices
1970-01-01
#cryptography
#paper
(2025-06) A Tale of Two Worlds, a Formal Story of WireGuard Hybridization
1970-01-01
#cryptography
#paper
(2025-05) Groebner Basis Cryptanalysis of Anemoi
1970-01-01
#cryptography
#paper
(2025-05) Diving Deep Into UC - Uncovering and Resolving Issues in Universal Composability
1970-01-01
#cryptography
#paper
(2025-05) A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures
1970-01-01
#cryptography
#paper
(2025-03) Improved Cryptanalysis of ChaCha - Beating PNBs with Bit Puncturing
1970-01-01
#cryptography
#paper
(2025-03) Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix
1970-01-01
#cryptography
#paper
(2025-03) A Fiat–Shamir Transformation From Duplex Sponges
1970-01-01
#cryptography
#paper
(2024-12) BitGC - Garbled Circuits with 1 Bit per Gate
1970-01-01
#cryptography
#paper
(2024-11) Impossibility Results for Post-Compromise Security in Real-World Communication Systems
1970-01-01
#cryptography
#paper
(2024-10) Blaze - Fast SNARKs from Interleaved RAA Codes
1970-01-01
#cryptography
#paper
(2024-09) Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
1970-01-01
#cryptography
#paper
(2024-07) TaSSLE - Lasso for the commitment-phobic
1970-01-01
#cryptography
#paper
(2024-07) A reduction from Hawk to the principal ideal problem in a quaternion algebra
1970-01-01
#cryptography
#paper
(2024-03) The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
1970-01-01
#cryptography
#paper
(2023-08) Verifiable Verification in Cryptographic Protocols
1970-01-01
#cryptography
#paper
(2023-04) Adding more parallelism to the AEGIS authenticated encryption algorithms
1970-01-01
#cryptography
#paper
(2023-03) Simplex Consensus - A Simple and Fast Consensus Protocol
1970-01-01
#cryptography
#paper
(2022-03) Block-Cipher-Based Tree Hashing
1970-01-01
#cryptography
#paper
(2017-05) Multi-Collision Resistance - A Paradigm for Keyless Hash Functions
1970-01-01
#cryptography
#paper
(2017-01) The STROBE protocol framework
1970-01-01
#cryptography
#paper
(2017-01) Farfalle - parallel permutation-based cryptography
1970-01-01
#cryptography
#paper
(2016-08) KangarooTwelve - fast hashing based on Keccak-p
1970-01-01
#cryptography
#paper