Welcome to Ask Cryptography
|
|
1
|
3271
|
August 1, 2022
|
[Resource Topic] 2025/1667: Persistence of Hourglass(-like) Structure: Improved Differential-Linear Distinguishers for Several ARX Ciphers
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1666: Trout: Two-Round Threshold ECDSA from Class Groups
|
|
0
|
1
|
September 17, 2025
|
[Resource Topic] 2025/1665: Threshold Public-Key Encryption: Definitions, Relations and Constructions
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1664: Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1663: IVC in the Open-and-sign Random Oracle Model
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1662: The Affine One-Wayness (AOW): A Transparent Post-Quantum Temporal Verification via Polynomial Iteration
|
|
0
|
1
|
September 17, 2025
|
[Resource Topic] 2025/1661: A Note on the Goppa Code Distinguishing Problem
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1660: Dory: Streaming PCG with Small Memory
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1659: Hurricane Mixer: The Eye in the Storm—Embedding Regulatory Oversight into Cryptocurrency Mixing Services
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1658: High-Throughput EdDSA Verification on Intel Processors with Advanced Vector Extensions
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1657: ORQ: Complex Analytics on Private Data with Strong Security Guarantees
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1656: Forgetful Encryption
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1655: Lattice-based Multi-message Multi-recipient KEM/PKE with Malicious Security
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1654: Security without Trusted Third Parties: VRF-based Authentication with Short Authenticated Strings
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1653: Distributed SNARK via folding schemes
|
|
0
|
0
|
September 17, 2025
|
[Resource Topic] 2025/1652: Computing Pairings on Elliptic Curves with Embedding Degree Two via Biextensions
|
|
0
|
7
|
September 12, 2025
|
[Resource Topic] 2025/1651: On the Cardinality of the Walsh Support of a Boolean Function
|
|
0
|
2
|
September 12, 2025
|
[Resource Topic] 2025/1650: WISCH: Efficient data signing via correlated signatures
|
|
0
|
1
|
September 12, 2025
|
[Resource Topic] 2025/1649: SQIsign with Fixed-Precision Integer Arithmetic
|
|
0
|
1
|
September 12, 2025
|
[Resource Topic] 2025/1648: Breaking Full ChiLow-32
|
|
0
|
0
|
September 12, 2025
|
[Resource Topic] 2025/1647: Universally Composable Password-Hardened Encryption
|
|
0
|
1
|
September 12, 2025
|
[Resource Topic] 2025/1646: Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning
|
|
0
|
4
|
September 12, 2025
|
[Resource Topic] 2025/1645: Hardened CTIDH: Dummy-Free and Deterministic CTIDH
|
|
0
|
0
|
September 12, 2025
|
[Resource Topic] 2025/1644: Fast Pseudorandom Correlation Functions from Sparse LPN
|
|
0
|
1
|
September 12, 2025
|
[Resource Topic] 2025/1643: SCA-GPT: Generation-Plan-Tool Assisted LLM Agent for Full-Automated Side-Channel Analysis on Cryptosystems
|
|
0
|
0
|
September 12, 2025
|
[Resource Topic] 2025/1642: Mixed Arithmetic-Binary Circuits in Fluid MPC Against Honest Majority of 4-Party and Its Applications Against Semi-Honest Adversary
|
|
0
|
0
|
September 12, 2025
|
[Resource Topic] 2025/1641: Fujisaki-Okamoto Transformation under Average-Case Decryption Error: Tighter and More General Proofs with Applications to PQC
|
|
0
|
2
|
September 12, 2025
|
[Resource Topic] 2025/1640: On the construction of Barnes-Wall lattices and their application in cryptography
|
|
0
|
0
|
September 12, 2025
|
[Resource Topic] 2025/1639: Rayls: A Novel Design for CBDCs
|
|
0
|
1
|
September 12, 2025
|