Welcome to Ask Cryptography
|
|
1
|
3232
|
August 1, 2022
|
[Resource Topic] 2025/1397: Starfighters $-$ on the general applicability of X-Wing
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1396: A Generalized Wiener-type Attack Against a Family RSA-like Cryptosystem
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1395: A Security Comment on ``A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid''
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1394: Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1393: Polynomial Lattices for the BIKE Cryptosystem
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1392: FLEX — Capital-Efficient Optimistic Bridges with On-Demand Security Bonds for Bitcoin
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1391: Inverse Discrete Logarithm - Post-Quantum take on a classical problem
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1390: Optimizing Backend Verification in zk-Rollup Architectures
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1389: Verification Cost Asymmetry in Cognitive Warfare: A Complexity-Theoretic Framework
|
|
0
|
0
|
August 1, 2025
|
[Resource Topic] 2025/1388: Collaborative zkSNARKs with Sublinear Prover Time and Constant Proof Size
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1387: Fast Final Exponentiation on BW and BLS Curves with Even Embedding Degrees at 128 bits security
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1386: How to Tolerate Typos in Strong Asymmetric PAKE
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1385: Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1384: Silent Threshold Encryption with One-Shot Adaptive Security
|
|
0
|
1
|
July 31, 2025
|
[Resource Topic] 2025/1383: An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1382: Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms
|
|
0
|
0
|
July 31, 2025
|
[Resource Topic] 2025/1381: Blockchain-Based Decentralized Domain Name System
|
|
0
|
1
|
July 30, 2025
|
[Resource Topic] 2025/1380: Quantum Composable and Contextual Security Infrastructure (Q2CSI) : A Modular Architecture for Legally Explainable Cryptographic Signatures
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1379: Enhancing Scale and Shift Invariance in Deep Learning-based Side-channel Attacks through Equivariant Convolutional Neural Networks
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1378: Tight Lower Bound on Witness Update Frequency in Additive Positive Accumulators
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1377: More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage Suppression
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1376: On Hull Attacks on the Module Lattice Isomorphism Problem
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1375: On the (strong) linkability of Linkable Ring Signatures
|
|
0
|
2
|
July 30, 2025
|
[Resource Topic] 2025/1374: An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and how to Avoid it
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1373: A Zero-Knowledge Proof for the Syndrome Decoding Problem in the Lee Metric
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1372: Gluon W: A Cryptocurrency Stabilization Protocol
|
|
0
|
0
|
July 30, 2025
|
[Resource Topic] 2025/1371: Securing Credential Sequence Verification
|
|
0
|
1
|
July 30, 2025
|
[Resource Topic] 2025/1370: Randomized Distributed Function Computation (RDFC): Ultra-Efficient Semantic Communication Applications to Privacy
|
|
0
|
1
|
July 28, 2025
|
[Resource Topic] 2025/1369: Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State Differences (Full Version)
|
|
0
|
0
|
July 28, 2025
|