Welcome to Ask Cryptography
|
|
1
|
3085
|
August 1, 2022
|
[Resource Topic] 2024/1878: Tighter Security for Group Key Agreement in the Random Oracle Model
|
|
0
|
20
|
November 18, 2024
|
[Resource Topic] 2024/1877: On the Black-Box Complexity of Private-Key Inner-Product Functional Encryption
|
|
0
|
17
|
November 18, 2024
|
[Resource Topic] 2024/1876: Unbounded Leakage-Resilient Encryption and Signatures
|
|
0
|
16
|
November 18, 2024
|
[Resource Topic] 2024/1875: mUOV: Masking the Unbalanced Oil and Vinegar Digital Sigital Signature Scheme at First- and Higher-Order
|
|
0
|
17
|
November 18, 2024
|
[Resource Topic] 2024/1874: Multi-Holder Anonymous Credentials from BBS Signatures
|
|
0
|
14
|
November 18, 2024
|
[Resource Topic] 2024/1873: $\mathsf{Cirrus}$: Performant and Accountable Distributed SNARK
|
|
0
|
15
|
November 18, 2024
|
[Resource Topic] 2024/1872: Amigo: Secure Group Mesh Messaging in Realistic Protest Settings
|
|
0
|
20
|
November 18, 2024
|
[Resource Topic] 2024/1871: Field-Agnostic SNARKs from Expand-Accumulate Codes
|
|
0
|
20
|
November 18, 2024
|
[Resource Topic] 2024/1870: A Hard-Label Cryptanalytic Extraction of Non-Fully Connected Deep Neural Networks using Side-Channel Attacks
|
|
0
|
17
|
November 18, 2024
|
[Resource Topic] 2024/1869: Black-box Collision Attacks on the NeuralHash Perceptual Hash Function
|
|
0
|
16
|
November 18, 2024
|
[Resource Topic] 2024/1868: IMOK: A compact connector for non-prohibition proofs to privacy-preserving applications
|
|
0
|
18
|
November 18, 2024
|
[Resource Topic] 2024/1867: Symmetric Twin Column Parity Mixers and their Applications
|
|
0
|
28
|
November 15, 2024
|
[Resource Topic] 2024/1866: ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors
|
|
0
|
25
|
November 15, 2024
|
[Resource Topic] 2024/1865: Tightly-Secure Group Key Exchange with Perfect Forward Secrecy
|
|
0
|
26
|
November 15, 2024
|
[Resource Topic] 2024/1864: Tweakable ForkCipher from Ideal Block Cipher
|
|
0
|
27
|
November 15, 2024
|
[Resource Topic] 2024/1863: Carbon Footprint Traction System Incorporated as Blockchain
|
|
0
|
28
|
November 15, 2024
|
[Resource Topic] 2024/1862: BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs
|
|
0
|
26
|
November 15, 2024
|
[Resource Topic] 2024/1861: Another Lattice Attack Against an RSA-like Cryptosystem
|
|
0
|
26
|
November 15, 2024
|
[Resource Topic] 2024/1860: Constructions of self-orthogonal codes and LCD codes from functions over finite fields
|
|
0
|
27
|
November 15, 2024
|
[Resource Topic] 2024/1859: Fully Encrypted Machine Learning Protocol using Functional Encryption
|
|
0
|
25
|
November 15, 2024
|
[Resource Topic] 2024/1858: (In)Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing
|
|
0
|
23
|
November 15, 2024
|
[Resource Topic] 2024/1857: Access-Controlled Inner Product Function-Revealing Encryption
|
|
0
|
21
|
November 15, 2024
|
[Resource Topic] 2024/1856: "There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting
|
|
0
|
22
|
November 15, 2024
|
[Resource Topic] 2024/1855: Lova: A Novel Framework for Verifying Mathematical Proofs with Incrementally Verifiable Computation
|
|
0
|
25
|
November 15, 2024
|
[Resource Topic] 2024/1854: A Zero-Knowledge PCP Theorem
|
|
0
|
24
|
November 15, 2024
|
[Resource Topic] 2024/1853: Giant Does NOT Mean Strong: Cryptanalysis of BQTRU
|
|
0
|
22
|
November 15, 2024
|
[Resource Topic] 2024/1852: Faster algorithms for isogeny computations over extensions of finite fields
|
|
0
|
24
|
November 15, 2024
|
[Resource Topic] 2024/1851: Secure Transformer-Based Neural Network Inference for Protein Sequence Classification
|
|
0
|
24
|
November 15, 2024
|
[Resource Topic] 2024/1850: Single-trace side-channel attacks on MAYO exploiting leaky modular multiplication
|
|
0
|
24
|
November 15, 2024
|