Welcome to Ask Cryptography
|
|
1
|
3038
|
August 1, 2022
|
[Resource Topic] 2024/1799: Consensus Under Adversary Majority Done Right
|
|
0
|
25
|
November 4, 2024
|
[Resource Topic] 2024/1798: Quantum One-Time Protection of any Randomized Algorithm
|
|
0
|
23
|
November 4, 2024
|
[Resource Topic] 2024/1797: FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels
|
|
0
|
19
|
November 4, 2024
|
[Resource Topic] 2024/1796: Isogeny interpolation and the computation of isogenies from higher dimensional representations
|
|
0
|
21
|
November 4, 2024
|
[Resource Topic] 2024/1795: How Fast Does the Inverse Walk Approximate a Random Permutation?
|
|
0
|
22
|
November 4, 2024
|
[Resource Topic] 2024/1794: How Much Public Randomness Do Modern Consensus Protocols Need?
|
|
0
|
22
|
November 4, 2024
|
[Resource Topic] 2024/1793: On the Jordan-Gauss graphs and new multivariate public keys
|
|
0
|
20
|
November 4, 2024
|
[Resource Topic] 2024/1792: Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture
|
|
0
|
20
|
November 4, 2024
|
[Resource Topic] 2024/1791: Discrete gaussian sampling for BKZ-reduced basis
|
|
0
|
19
|
November 4, 2024
|
[Resource Topic] 2024/1790: Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing
|
|
0
|
21
|
November 4, 2024
|
[Resource Topic] 2024/1789: Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions
|
|
0
|
19
|
November 4, 2024
|
[Resource Topic] 2024/1788: Advanced Transparency System
|
|
0
|
17
|
November 4, 2024
|
[Resource Topic] 2024/1787: An Efficient and Secure Boolean Function Evaluation Protocol
|
|
0
|
15
|
November 4, 2024
|
[Resource Topic] 2024/1786: Black-Box Timed Commitments from Time-Lock Puzzles
|
|
0
|
17
|
November 4, 2024
|
[Resource Topic] 2024/1785: A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire
|
|
0
|
16
|
November 4, 2024
|
[Resource Topic] 2024/1784: Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions
|
|
0
|
16
|
November 4, 2024
|
[Resource Topic] 2024/1783: PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications
|
|
0
|
15
|
November 4, 2024
|
[Resource Topic] 2024/1782: The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
|
|
0
|
19
|
November 4, 2024
|
[Resource Topic] 2024/1781: New results in Share Conversion, with applications to evolving access structures
|
|
0
|
20
|
November 4, 2024
|
[Resource Topic] 2024/1780: ABE for Circuits with $\mathsf{poly}(\lambda)$-sized Keys from LWE
|
|
0
|
24
|
November 1, 2024
|
[Resource Topic] 2024/1779: Ciphertext-Policy ABE from Inner-Product FE
|
|
0
|
24
|
November 1, 2024
|
[Resource Topic] 2024/1778: Construction of quadratic APN functions with coefficients in $\mathbb{F}_2$ in dimensions $10$ and $11$
|
|
0
|
25
|
November 1, 2024
|
[Resource Topic] 2024/1777: Masking Gaussian Elimination at Arbitrary Order, with Application to Multivariate- and Code-Based PQC
|
|
0
|
28
|
November 1, 2024
|
[Resource Topic] 2024/1776: An efficient collision attack on Castryck-Decru-Smith’s hash function
|
|
0
|
24
|
November 1, 2024
|
[Resource Topic] 2024/1775: zkMarket : Privacy-preserving Digital Data Trade System via Blockchain
|
|
0
|
24
|
November 1, 2024
|
[Resource Topic] 2024/1774: PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting
|
|
0
|
21
|
November 1, 2024
|
[Resource Topic] 2024/1773: Universal Adaptor Signatures from Blackbox Multi-Party Computation
|
|
0
|
26
|
November 1, 2024
|
[Resource Topic] 2024/1772: Byte-wise equal property of ARADI
|
|
0
|
23
|
November 1, 2024
|
[Resource Topic] 2024/1771: PRIME: Differentially Private Distributed Mean Estimation with Malicious Security
|
|
0
|
23
|
October 30, 2024
|