Welcome to Ask Cryptography
|
|
1
|
3221
|
August 1, 2022
|
[Resource Topic] 2025/1216: Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1215: Highly Scalable Searchable Symmetric Encryption for Boolean Queries from NTRU Lattice Trapdoors
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1214: Hobbit: Space-Efficient zkSNARK with Optimal Prover Time
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1213: Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1212: All Proof of Work But No Proof of Play
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1211: May the Force $\textit{not}$ Be with you: Brute-Force Resistant Biometric Authentication and Key Reconstruction
|
|
0
|
2
|
July 2, 2025
|
[Resource Topic] 2025/1210: A Generalized Approach to Root-based Attacks against PLWE
|
|
0
|
0
|
July 2, 2025
|
[Resource Topic] 2025/1209: RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing
|
|
0
|
1
|
June 30, 2025
|
[Resource Topic] 2025/1208: End-to-End Encrypted Git Services
|
|
0
|
1
|
June 30, 2025
|
[Resource Topic] 2025/1207: Copy-Protection from UPO, Revisited
|
|
0
|
1
|
June 30, 2025
|
[Resource Topic] 2025/1206: New Upper and Lower Bounds for Perfectly Secure MPC
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1205: Generic Construction of Threshold Ring Signatures and Lattice-based Instantiations
|
|
0
|
1
|
June 30, 2025
|
[Resource Topic] 2025/1204: A search to distinguish reduction for the isomorphism problem on direct sum lattices
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1203: Breaking The Authenticated Encryption scheme HiAE
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1202: t-Probing (In-)Security - Pitfalls on Noise Assumptions
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1201: BitBatSPIR: Efficient Batch Symmetric Private Information Retrieval from PSI
|
|
0
|
1
|
June 30, 2025
|
[Resource Topic] 2025/1200: Tricycle: Private Transformer Inference with Tricyclic Encodings
|
|
0
|
4
|
June 30, 2025
|
[Resource Topic] 2025/1199: HypSCA: A Hyperbolic Embedding Method for Enhanced Side-channel Attack
|
|
0
|
2
|
June 30, 2025
|
[Resource Topic] 2025/1198: Brief Comments on Rijndael-256 and the Standard RISC-V Cryptography Extensions
|
|
0
|
1
|
June 30, 2025
|
[Resource Topic] 2025/1197: How to Copy-Protect All Puncturable Functionalities Without Conjectures: A Unified Solution to Quantum Protection
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1196: Limits on the Power of Private Constrained PRFs
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1195: On symbolic computations and Post Quantum Cryptography with Lie Geometries
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1194: Private coins extension with verifiable encryption
|
|
0
|
0
|
June 30, 2025
|
[Resource Topic] 2025/1193: Non-Homomorphic Key Blinding from Symmetric Primitives
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1192: PrivacyGo: Privacy-Preserving Ad Measurement with Multidimensional Intersection
|
|
0
|
1
|
June 27, 2025
|
[Resource Topic] 2025/1191: A Polynomial Public-Key Cryptosystem Based on Jacobian-Preserving Composition
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1190: Towards AI-driven Optimization of Robust Probing Model-compliant Masked Hardware Gadgets Using Evolutionary Algorithms
|
|
0
|
0
|
June 27, 2025
|
[Resource Topic] 2025/1189: Performance and Privacy: A Low-Latency Secure Anonymous Authentication Protocol with OPRF
|
|
0
|
1
|
June 27, 2025
|
[Resource Topic] 2025/1188: Depth-Optimized Quantum Implementation of CHAM
|
|
0
|
3
|
June 27, 2025
|