cronokirby
Search
Search
Dark mode
Light mode
Explorer
Tag: paper
37 items with this tag.
2025-07-15
(2024-03) The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
cryptography
paper
2025-07-15
(2024-07) A reduction from Hawk to the principal ideal problem in a quaternion algebra
cryptography
paper
2025-07-15
(2024-07) TaSSLE - Lasso for the commitment-phobic
cryptography
paper
2025-07-15
(2024-10) Blaze - Fast SNARKs from Interleaved RAA Codes
cryptography
paper
2025-07-15
(2024-11) Impossibility Results for Post-Compromise Security in Real-World Communication Systems
cryptography
paper
2025-07-15
(2024-12) BitGC - Garbled Circuits with 1 Bit per Gate
cryptography
paper
2025-07-15
(2025-03) Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix
cryptography
paper
2025-07-15
(2025-03) Improved Cryptanalysis of ChaCha - Beating PNBs with Bit Puncturing
cryptography
paper
2025-07-15
(2025-05) A Plausible Attack on the Adaptive Security of Threshold Schnorr Signatures
cryptography
paper
2025-07-15
(2025-05) Diving Deep Into UC - Uncovering and Resolving Issues in Universal Composability
cryptography
paper
2025-07-15
(2025-05) Groebner Basis Cryptanalysis of Anemoi
cryptography
paper
2025-07-15
(2025-06) A Tale of Two Worlds, a Formal Story of WireGuard Hybridization
cryptography
paper
2025-07-15
(2025-06) A search to distinguish reduction for the isomorphism problem on direct sum lattices
cryptography
paper
2025-07-15
(2025-06) Beyond LWE - a Lattice Framework for Homomorphic Encryption
cryptography
paper
2025-07-15
(2025-06) Bridging Bitcoin to Second Layers via BitVM2
cryptography
paper
2025-07-15
(2025-06) Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions
cryptography
paper
2025-07-15
(2025-06) Cryptanalysis of HiAE
cryptography
paper
2025-07-15
(2025-06) Efficient, Scalable Threshold ML-DSA Signatures - An MPC Approach
cryptography
paper
2025-07-15
(2025-06) Evaluation of Modular Polynomials from Supersingular Elliptic Curves
cryptography
paper
2025-07-15
(2025-06) Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations
cryptography
paper
2025-07-15
(2025-06) Guarding the Signal - Secure Messaging with Reverse Firewalls
cryptography
paper
2025-07-15
(2025-06) New Upper and Lower Bounds for Perfectly Secure MPC
cryptography
paper
2025-07-15
(2025-06) OnionPIRv2 - Efficient Single-Server PIR
cryptography
paper
2025-07-15
(2025-06) Simple VESS
cryptography
paper
2025-07-15
(2025-06) SmallWood - Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances
cryptography
paper
2025-07-15
(2025-06) Speeding Up Sum-Check Proving
cryptography
paper
2025-07-15
(2025-06) Threshold Signatures Reloaded - ML-DSA and Enhanced Raccoon with Identifiable Aborts
cryptography
paper
2025-07-15
(2025-06) Understanding Lasso - A Novel Lookup Argument Protocol
cryptography
paper
2025-07-15
(2025-07) Batch Decryption without Epochs and its Application to Encrypted Mempools
cryptography
paper
2025-07-15
(2025-07) Efficiently parsing existing eID documents for zero-knowledge proofs
cryptography
paper
2025-07-15
(2025-07) Linear Prover IOPs in Log Star Rounds
cryptography
paper
2025-07-15
(2025-07) Multi-Source Randomness Extraction and Generation in the Random-Oracle Model
cryptography
paper
2025-07-15
(2025-07) Note - Full-round distinguisher for Synergy
cryptography
paper
2025-07-15
(2025-07) On Weak NIZKs, One-way Functions and Amplification
cryptography
paper
2025-07-15
(2025-07) Opossum Attack - Application Layer Desynchronization using Opportunistic TLS
cryptography
paper
2025-07-15
(2025-07) Tree PCPs
cryptography
paper
2025-07-15
(2025-07) What’s the Matter? An In-Depth Security Analysis of the Matter Protocol
cryptography
paper