Welcome to Ask Cryptography
|
|
1
|
2215
|
August 1, 2022
|
[Resource Topic] 2024/639: Computational Attestations of Polynomial Integrity Towards Verifiable Machine Learning
|
|
0
|
9
|
April 26, 2024
|
[Resource Topic] 2024/638: A note on ``a lightweight mutual and transitive authentication mechanism for IoT network''
|
|
0
|
8
|
April 26, 2024
|
[Resource Topic] 2024/637: Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/636: Regev Factoring Beyond Fibonacci: Optimizing Prefactors
|
|
0
|
9
|
April 26, 2024
|
[Resource Topic] 2024/635: Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption
|
|
0
|
8
|
April 26, 2024
|
[Resource Topic] 2024/634: NTRU-based FHE for Larger Key and Message Space
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/633: Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields
|
|
0
|
9
|
April 26, 2024
|
[Resource Topic] 2024/632: Further Investigations on Nonlinear Complexity of Periodic Binary Sequences
|
|
0
|
8
|
April 26, 2024
|
[Resource Topic] 2024/631: BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring
|
|
0
|
9
|
April 26, 2024
|
[Resource Topic] 2024/630: Conditional disclosure of secrets with quantum resources
|
|
0
|
9
|
April 26, 2024
|
[Resource Topic] 2024/629: Unconditional correctness of recent quantum algorithms for factoring and computing discrete logarithms
|
|
0
|
6
|
April 26, 2024
|
[Resource Topic] 2024/628: MUSEN: Aggregatable Key-Evolving Verifiable Random Functions and Applications
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/627: Distributed & Scalable Oblivious Sorting and Shuffling
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/626: Exponential Quantum Speedup for the Traveling Salesman Problem
|
|
0
|
8
|
April 26, 2024
|
[Resource Topic] 2024/625: Interactive Threshold Mercurial Signatures and Applications
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/624: POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies
|
|
0
|
6
|
April 26, 2024
|
[Resource Topic] 2024/623: Complete group law for genus 2 Jacobians on Jacobian coordinates
|
|
0
|
8
|
April 26, 2024
|
[Resource Topic] 2024/622: Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols
|
|
0
|
8
|
April 26, 2024
|
[Resource Topic] 2024/621: How to Lose Some Weight - A Practical Template Syndrome Decoding Attack
|
|
0
|
9
|
April 26, 2024
|
[Resource Topic] 2024/620: New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/619: BPDTE: Batch Private Decision Tree Evaluation via Amortized Efficient Private Comparison
|
|
0
|
9
|
April 26, 2024
|
[Resource Topic] 2024/618: Efficient KZG-based Univariate Sum-check and Lookup Argument
|
|
0
|
8
|
April 26, 2024
|
[Resource Topic] 2024/617: Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/616: $\mathsf{Cougar}$: Cubic Root Verifier Inner Product Argument under Discrete Logarithm Assumption
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/615: Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA
|
|
0
|
7
|
April 26, 2024
|
[Resource Topic] 2024/614: Non-interactive Blind Signatures from Lattices
|
|
0
|
8
|
April 26, 2024
|
Isogeny Club - Season 4 - Talk #5: A survey on modular curves and their applications
|
|
0
|
30
|
April 24, 2024
|
[Resource Topic] 2024/613: Hadamard Product Argument from Lagrange-Based Univariate Polynomials
|
|
0
|
29
|
April 22, 2024
|
[Resource Topic] 2024/612: FHERMA: Building the Open-Source FHE Components Library for Practical Use
|
|
0
|
28
|
April 22, 2024
|