cronokirby
Search
Search
Dark mode
Light mode
Explorer
Tag: paper
92 items with this tag.
2025-08-27
(2016-08) KangarooTwelve - fast hashing based on Keccak-p
cryptography
paper
2025-08-27
(2017-01) Farfalle - parallel permutation-based cryptography
cryptography
paper
2025-08-27
(2017-01) The STROBE protocol framework
cryptography
paper
2025-08-27
(2017-05) Multi-Collision Resistance - A Paradigm for Keyless Hash Functions
cryptography
paper
2025-08-27
(2022-03) Block-Cipher-Based Tree Hashing
cryptography
paper
2025-08-27
(2023-03) Simplex Consensus - A Simple and Fast Consensus Protocol
cryptography
paper
2025-08-27
(2023-04) Adding more parallelism to the AEGIS authenticated encryption algorithms
cryptography
paper
2025-08-27
(2023-08) Verifiable Verification in Cryptographic Protocols
cryptography
paper
2025-08-27
(2024-03) The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
cryptography
paper
2025-08-27
(2024-07) A reduction from Hawk to the principal ideal problem in a quaternion algebra
cryptography
paper
2025-08-27
(2024-07) TaSSLE - Lasso for the commitment-phobic
cryptography
paper
2025-08-27
(2024-09) Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
cryptography
paper
2025-08-27
(2024-10) Blaze - Fast SNARKs from Interleaved RAA Codes
cryptography
paper
2025-08-27
(2024-11) Impossibility Results for Post-Compromise Security in Real-World Communication Systems
cryptography
paper
2025-08-27
(2024-12) BitGC - Garbled Circuits with 1 Bit per Gate
cryptography
paper
2025-08-27
(2025-03) A Fiat–Shamir Transformation From Duplex Sponges
cryptography
paper
2025-08-27
(2025-03) Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix
cryptography
paper
2025-08-27
(2025-03) Improved Cryptanalysis of ChaCha - Beating PNBs with Bit Puncturing
cryptography
paper
2025-08-27
(2025-05) A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures
cryptography
paper
2025-08-27
(2025-05) Diving Deep Into UC - Uncovering and Resolving Issues in Universal Composability
cryptography
paper
2025-08-27
(2025-05) Groebner Basis Cryptanalysis of Anemoi
cryptography
paper
2025-08-27
(2025-06) A Tale of Two Worlds, a Formal Story of WireGuard Hybridization
cryptography
paper
2025-08-27
(2025-06) A search to distinguish reduction for the isomorphism problem on direct sum lattices
cryptography
paper
2025-08-27
(2025-06) Beyond LWE - a Lattice Framework for Homomorphic Encryption
cryptography
paper
2025-08-27
(2025-06) Bridging Bitcoin to Second Layers via BitVM2
cryptography
paper
2025-08-27
(2025-06) Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions
cryptography
paper
2025-08-27
(2025-06) Cryptanalysis of HiAE
cryptography
paper
2025-08-27
(2025-06) Efficient, Scalable Threshold ML-DSA Signatures - An MPC Approach
cryptography
paper
2025-08-27
(2025-06) Evaluation of Modular Polynomials from Supersingular Elliptic Curves
cryptography
paper
2025-08-27
(2025-06) Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations
cryptography
paper
2025-08-27
(2025-06) Guarding the Signal - Secure Messaging with Reverse Firewalls
cryptography
paper
2025-08-27
(2025-06) New Upper and Lower Bounds for Perfectly Secure MPC
cryptography
paper
2025-08-27
(2025-06) OnionPIRv2 - Efficient Single-Server PIR
cryptography
paper
2025-08-27
(2025-06) Simple VESS
cryptography
paper
2025-08-27
(2025-06) SmallWood - Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances
cryptography
paper
2025-08-27
(2025-06) Speeding Up Sum-Check Proving
cryptography
paper
2025-08-27
(2025-06) Threshold Signatures Reloaded - ML-DSA and Enhanced Raccoon with Identifiable Aborts
cryptography
paper
2025-08-27
(2025-06) Understanding Lasso - A Novel Lookup Argument Protocol
cryptography
paper
2025-08-27
(2025-07) A note on the security of the BitVM3 garbling scheme
cryptography
paper
2025-08-27
(2025-07) Batch Decryption without Epochs and its Application to Encrypted Mempools
cryptography
paper
2025-08-27
(2025-07) Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size
cryptography
paper
2025-08-27
(2025-07) Efficiently parsing existing eID documents for zero-knowledge proofs
cryptography
paper
2025-08-27
(2025-07) FRIttata - Distributed Proof Generation of FRI-based SNARKs
cryptography
paper
2025-08-27
(2025-07) Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security
cryptography
paper
2025-08-27
(2025-07) Gödel in Cryptography - Effectively Zero-Knowledge Proofs for NP with No Interaction, No Setup, and Perfect Soundness
cryptography
paper
2025-08-27
(2025-07) How to Tolerate Typos in Strong Asymmetric PAKE
cryptography
paper
2025-08-27
(2025-07) Linear Prover IOPs in Log Star Rounds
cryptography
paper
2025-08-27
(2025-07) Multi-Source Randomness Extraction and Generation in the Random-Oracle Model
cryptography
paper
2025-08-27
(2025-07) Note - Full-round distinguisher for Synergy
cryptography
paper
2025-08-27
(2025-07) On Weak NIZKs, One-way Functions and Amplification
cryptography
paper
2025-08-27
(2025-07) Opossum Attack - Application Layer Desynchronization using Opportunistic TLS
cryptography
paper
2025-08-27
(2025-07) PlasmaFold - An Efficient and Scalable Layer 2 with Client-Side Proving
cryptography
paper
2025-08-27
(2025-07) Post-Quantum Readiness in EdDSA Chains
cryptography
paper
2025-08-27
(2025-07) SLVer Bullet - Straight-Line Verification for Bulletproofs
cryptography
paper
2025-08-27
(2025-07) Sota Voce - Low-Noise Sampling of Sparse Fixed-Weight Vectors
cryptography
paper
2025-08-27
(2025-07) Tree PCPs
cryptography
paper
2025-08-27
(2025-07) What’s the Matter? An In-Depth Security Analysis of the Matter Protocol
cryptography
paper
2025-08-27
(2025-08) A Fully-Adaptive Threshold Partially-Oblivious PRF
cryptography
paper
2025-08-27
(2025-08) A New Paradigm for Privacy-Preserving Decision Tree Evaluation
cryptography
paper
2025-08-27
(2025-08) A Note on the Binding Properties of KEM Combiners
cryptography
paper
2025-08-27
(2025-08) A Note on the Post-Quantum Security of Identity-Based Encryption on Isogenous Pairing Groups
cryptography
paper
2025-08-27
(2025-08) A Note on the Post-Quantum Security of the Inverse Discrete Logarithm Problem
cryptography
paper
2025-08-27
(2025-08) ABEL - Perfect Asynchronous Byzantine Extension from List-Decoding
cryptography
paper
2025-08-27
(2025-08) AGB 2.0 - Refined Algebraic Attack against Regular Syndrome Decoding for PCG Applications
cryptography
paper
2025-08-27
(2025-08) Adaptively Secure Threshold ElGamal Decryption from DDH
cryptography
paper
2025-08-27
(2025-08) Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes
cryptography
paper
2025-08-27
(2025-08) Can we Speed up Information Set Decoding by Using Extension Field Structure?
cryptography
paper
2025-08-27
(2025-08) Coral - Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs
cryptography
paper
2025-08-27
(2025-08) Cross-Consensus Reliable Broadcast and its Applications
cryptography
paper
2025-08-27
(2025-08) DOC★ - Access Control for Information-Theoretically Secure Key-Document Stores
cryptography
paper
2025-08-27
(2025-08) Data Availability Sampling with Repair
cryptography
paper
2025-08-27
(2025-08) Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH
cryptography
paper
2025-08-27
(2025-08) Fully-Fluctuating Participation in Sleepy Consensus
cryptography
paper
2025-08-27
(2025-08) LESS is Even More - Optimizing Digital Signatures from Code Equivalence
cryptography
paper
2025-08-27
(2025-08) Naor-Reingold goes Beyond-the-Birthday-Bound
cryptography
paper
2025-08-27
(2025-08) Not Easy to Prepare a Pesto - Cryptanalysis of a Multivariate Public-Key Scheme from CCZ Equivalence
cryptography
paper
2025-08-27
(2025-08) Note - Shared Key Recovery Attack on Cascader Key Exchange Protocol
cryptography
paper
2025-08-27
(2025-08) Optimistic Message Dissemination
cryptography
paper
2025-08-27
(2025-08) Password-Hardened Encryption Revisited
cryptography
paper
2025-08-27
(2025-08) Peeking Into the Future - MPC Resilient to Super-Rushing Adversaries
cryptography
paper
2025-08-27
(2025-08) Polynomial Lattices for the BIKE Cryptosystem
cryptography
paper
2025-08-27
(2025-08) Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode
cryptography
paper
2025-08-27
(2025-08) Scalable Secure Multiparty Computation with Perfect Security from Preprocessing
cryptography
paper
2025-08-27
(2025-08) Snake Mackerel - An Isogeny-Based AKEM Leveraging Randomness Reuse
cryptography
paper
2025-08-27
(2025-08) Starfighters — on the general applicability of X-Wing
cryptography
paper
2025-08-27
(2025-08) Stateless 2PC Signatures for Internet-Scale Authentication and Authorization
cryptography
paper
2025-08-27
(2025-08) The Best of Both KEMs - Securely Combining KEMs in Post-Quantum Hybrid Schemes
cryptography
paper
2025-08-27
(2025-08) Towards Building Efficient SCALES Protocols
cryptography
paper
2025-08-27
(2025-08) Two-Tier Black-box Blockchains and Application to Instant Layer-1 Payments
cryptography
paper
2025-08-27
(2025-08) VOLE-in-the-Head Signatures Based on the Linear Code Equivalence Problem
cryptography
paper
2025-08-27
(2025-08) When Can We Incrementally Prove Computations of Arbitrary Depth?
cryptography
paper
2025-08-27
(2025-08) zip - Reducing Proof Sizes for Hash-Based SNARGs
cryptography
paper