Welcome to Ask Cryptography
|
|
1
|
2222
|
August 1, 2022
|
[Resource Topic] 2024/658: Information-theoretic security with asymmetries
|
|
0
|
12
|
April 29, 2024
|
[Resource Topic] 2024/657: Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs
|
|
0
|
7
|
April 29, 2024
|
[Resource Topic] 2024/656: Cryptanalytic Audit of the XHash Sponge Function and its Components
|
|
0
|
9
|
April 29, 2024
|
[Resource Topic] 2024/655: Implementation and Performance Analysis of Homomorphic Signature Schemes
|
|
0
|
11
|
April 29, 2024
|
[Resource Topic] 2024/654: Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification
|
|
0
|
13
|
April 29, 2024
|
[Resource Topic] 2024/653: Ipotane: Achieving the Best of All Worlds in Asynchronous BFT
|
|
0
|
8
|
April 29, 2024
|
[Resource Topic] 2024/652: Compact and Secure Zero-Knowledge Proofs for Quantum-Resistant Cryptography from Modular Lattice Innovations
|
|
0
|
11
|
April 29, 2024
|
[Resource Topic] 2024/651: A New Hash-based Enhanced Privacy ID Signature Scheme
|
|
0
|
10
|
April 29, 2024
|
[Resource Topic] 2024/650: Hash-based Direct Anonymous Attestation
|
|
0
|
12
|
April 29, 2024
|
[Resource Topic] 2024/649: Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
|
|
0
|
12
|
April 29, 2024
|
[Resource Topic] 2024/648: Encrypted KNN Implementation on Distributed Edge Device Network
|
|
0
|
10
|
April 29, 2024
|
[Resource Topic] 2024/647: Weightwise (almost) perfectly balanced functions based on total orders
|
|
0
|
10
|
April 29, 2024
|
[Resource Topic] 2024/646: Efficient Quantum Algorithm for SUBSET-SUM Problem
|
|
0
|
39
|
April 29, 2024
|
[Resource Topic] 2024/645: Toward Independent Key Encryption based on Q-Problem
|
|
0
|
10
|
April 29, 2024
|
[Resource Topic] 2024/644: Jumping for Bernstein-Yang Inversion
|
|
0
|
11
|
April 29, 2024
|
[Resource Topic] 2024/643: Key-Homomorphic and Aggregate Verifiable Random Functions
|
|
0
|
12
|
April 29, 2024
|
[Resource Topic] 2024/642: GraphOS: Towards Oblivious Graph Processing
|
|
0
|
11
|
April 29, 2024
|
[Resource Topic] 2024/641: Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon
|
|
0
|
11
|
April 29, 2024
|
[Resource Topic] 2024/640: On Proving Pairings
|
|
0
|
9
|
April 29, 2024
|
[Resource Topic] 2024/639: Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning
|
|
0
|
20
|
April 26, 2024
|
[Resource Topic] 2024/638: A note on ``a lightweight mutual and transitive authentication mechanism for IoT network''
|
|
0
|
17
|
April 26, 2024
|
[Resource Topic] 2024/637: Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity
|
|
0
|
14
|
April 26, 2024
|
[Resource Topic] 2024/636: Regev Factoring Beyond Fibonacci: Optimizing Prefactors
|
|
0
|
16
|
April 26, 2024
|
[Resource Topic] 2024/635: Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption
|
|
0
|
17
|
April 26, 2024
|
[Resource Topic] 2024/634: NTRU-based FHE for Larger Key and Message Space
|
|
0
|
18
|
April 26, 2024
|
[Resource Topic] 2024/633: Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields
|
|
0
|
16
|
April 26, 2024
|
[Resource Topic] 2024/632: Further Investigations on Nonlinear Complexity of Periodic Binary Sequences
|
|
0
|
16
|
April 26, 2024
|
[Resource Topic] 2024/631: BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring
|
|
0
|
16
|
April 26, 2024
|
[Resource Topic] 2024/630: Conditional disclosure of secrets with quantum resources
|
|
0
|
15
|
April 26, 2024
|