Welcome to Ask Cryptography
|
|
1
|
2955
|
August 1, 2022
|
[Resource Topic] 2024/1651: One-Shot Native Proofs of Non-Native Operations in Incrementally Verifiable Computations
|
|
0
|
26
|
October 14, 2024
|
[Resource Topic] 2024/1650: Towards Practical Oblivious Map
|
|
0
|
24
|
October 14, 2024
|
[Resource Topic] 2024/1649: Multiplying Polynomials without Powerful Multiplication Instructions (Long Paper)
|
|
0
|
21
|
October 14, 2024
|
[Resource Topic] 2024/1648: SIMD-style Sorting of Integer Sequence in RLWE Ciphertext
|
|
0
|
25
|
October 14, 2024
|
[Resource Topic] 2024/1647: Curve Forests: Transparent Zero-Knowledge Set Membership with Batching and Strong Security
|
|
0
|
24
|
October 14, 2024
|
[Resource Topic] 2024/1646: Transaction Execution Mechanisms
|
|
0
|
24
|
October 14, 2024
|
[Resource Topic] 2024/1645: Fiat Shamir Goes Rational
|
|
0
|
21
|
October 14, 2024
|
[Resource Topic] 2024/1644: A Tight Lower Bound on the TdScrypt Trapdoor Memory-Hard Function
|
|
0
|
23
|
October 14, 2024
|
[Resource Topic] 2024/1643: Optimizing Liveness for Blockchain-Based Sealed-Bid Auctions in Rational Settings
|
|
0
|
25
|
October 14, 2024
|
[Resource Topic] 2024/1642: Fuzzy PSI via Oblivious Protocol Routing
|
|
0
|
23
|
October 14, 2024
|
[Resource Topic] 2024/1641: Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid
|
|
0
|
23
|
October 14, 2024
|
[Resource Topic] 2024/1640: Maximizing the Utility of Cryptographic Setups: Secure PAKEs, with either functional RO or CRS
|
|
0
|
19
|
October 14, 2024
|
[Resource Topic] 2024/1639: Efficient Quantum Pseudorandomness from Hamiltonian Phase States
|
|
0
|
21
|
October 14, 2024
|
[Resource Topic] 2024/1638: Modular Reduction in CKKS
|
|
0
|
26
|
October 14, 2024
|
[Resource Topic] 2024/1637: Bootstrapping Small Integers With CKKS
|
|
0
|
39
|
October 14, 2024
|
[Resource Topic] 2024/1636: Quantum State Group Actions
|
|
0
|
22
|
October 14, 2024
|
[Resource Topic] 2024/1635: RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs
|
|
0
|
24
|
October 14, 2024
|
[Resource Topic] 2024/1634: On Constructing Pseudorandom Involutions: Feistel variants using a single round function
|
|
0
|
21
|
October 14, 2024
|
[Resource Topic] 2024/1633: Efficient Boolean-to-Arithmetic Mask Conversion in Hardware
|
|
0
|
26
|
October 14, 2024
|
[Resource Topic] 2024/1632: Fully Secure Searchable Encryption from PRFs, Pairings, and Lattices
|
|
0
|
21
|
October 14, 2024
|
[Resource Topic] 2024/1631: Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees
|
|
0
|
27
|
October 14, 2024
|
[Resource Topic] 2024/1630: Hybrid Password Authentication Key Exchange in the UC Framework
|
|
0
|
20
|
October 14, 2024
|
[Resource Topic] 2024/1629: Efficient Key-Switching for Word-Type FHE and GPU Acceleration
|
|
0
|
25
|
October 14, 2024
|
[Resource Topic] 2024/1628: Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security
|
|
0
|
21
|
October 14, 2024
|
[Resource Topic] 2024/1627: Lollipops of pairing-friendly elliptic curves for composition of proof systems
|
|
0
|
32
|
October 11, 2024
|
[Resource Topic] 2024/1626: Faster Proofs and VRFs from Isogenies
|
|
0
|
33
|
October 11, 2024
|
[Resource Topic] 2024/1625: On the Tight Security of the Double Ratchet
|
|
0
|
35
|
October 11, 2024
|
[Resource Topic] 2024/1624: Double-Matrix: Complete Diffusion in a Single Round with (small) MDS Matrices
|
|
0
|
27
|
October 11, 2024
|
[Resource Topic] 2024/1623: General Functional Bootstrapping using CKKS
|
|
0
|
33
|
October 11, 2024
|