Welcome to Ask Cryptography
|
|
1
|
3168
|
August 1, 2022
|
[Resource Topic] 2025/586: Heuristic Algorithm for Solving Restricted SVP and its Applications
|
|
0
|
1
|
April 2, 2025
|
[Resource Topic] 2025/585: Adaptively-Secure Big-Key Identity-Based Encryption
|
|
0
|
1
|
April 2, 2025
|
[Resource Topic] 2025/584: The Singularity Random Number Generator: Bridging Determinism and Unpredictability to Redefine Randomness, Secure Systems, and Adaptive Intelligence
|
|
0
|
0
|
April 2, 2025
|
[Resource Topic] 2025/583: Counter Galois Onion (CGO) for Tor: Fast Non-Malleable Onion Encryption
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/582: Release the Power of Rejected Signatures: An Efficient Side-Channel Attack on Dilithium
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/581: Reusable Dynamic Multi-Party Homomorphic Encryption
|
|
0
|
1
|
April 1, 2025
|
[Resource Topic] 2025/580: Efficient Revocable Identity-Based Encryption from Middle-Product LWE
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/579: REGKYC: Supporting Privacy and Compliance Enforcement for KYC in Blockchains
|
|
0
|
2
|
April 1, 2025
|
[Resource Topic] 2025/578: Efficient Garbled Pseudorandom Functions and Lookup Tables from Minimal Assumption
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/577: Making GCM Great Again: Toward Full Security and Longer Nonces
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/576: Pre-Constructed Publicly Verifiable Secret Sharing and Applications
|
|
0
|
1
|
April 1, 2025
|
[Resource Topic] 2025/575: Wagner's Algorithm Provably Runs in Subexponential Time for SIS$^\infty$
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/574: Buffalo: A Practical Secure Aggregation Protocol for Asynchronous Federated Learning
|
|
0
|
1
|
April 1, 2025
|
[Resource Topic] 2025/573: Forking Lemma in EasyCrypt
|
|
0
|
1
|
April 1, 2025
|
[Resource Topic] 2025/572: Zinnia: An Expressive and Efficient Tensor-Oriented Zero-Knowledge Programming Framework
|
|
0
|
0
|
April 1, 2025
|
[Resource Topic] 2025/571: Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange
|
|
0
|
1
|
April 1, 2025
|
[Resource Topic] 2025/570: Partial Key Overwrite Attacks in Microcontrollers: a Survey
|
|
0
|
1
|
April 1, 2025
|
[Resource Topic] 2025/569: Solving Data Availability Limitations in Client-Side Validation with UTxO Binding
|
|
0
|
1
|
April 1, 2025
|
[Resource Topic] 2025/568: An in-depth security evaluation of the Nintendo DSi gaming console
|
|
0
|
0
|
March 31, 2025
|
[Resource Topic] 2025/567: Starfish: A high throughput BFT protocol on uncertified DAG with linear amortized communication complexity
|
|
0
|
0
|
March 31, 2025
|
[Resource Topic] 2025/566: Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/565: Attacking soundness for an optimization of the Gemini Polynomial Commitment Scheme
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/564: Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/563: An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/562: Analysis of One Certificateless Authentication and Key Agreement Scheme for Wireless Body Area Network
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/561: ThreatLens: LLM-guided Threat Modeling and Test Plan Generation for Hardware Security Verification
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/560: Jump, It Is Easy: JumpReLU Activation Function in Deep Learning-based Side-channel Analysis
|
|
0
|
1
|
March 28, 2025
|
[Resource Topic] 2025/559: Is Your Bluetooth Chip Leaking Secrets via RF Signals?
|
|
0
|
0
|
March 28, 2025
|
[Resource Topic] 2025/558: Breaking and Fixing Content-Defined Chunking
|
|
0
|
1
|
March 28, 2025
|