Welcome to Ask Cryptography
|
|
1
|
3095
|
August 1, 2022
|
[Resource Topic] 2024/2024: Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model
|
|
0
|
1
|
December 13, 2024
|
[Resource Topic] 2024/2023: An Abstract Multi-Forking Lemma
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2022: The Revisited Hidden Weight Bit Function
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2021: PrivQuant: Communication-Efficient Private Inference with Quantized Network/Protocol Co-Optimization
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2020: Ring Ring! Who's There? A Privacy Preserving Mobile Number Search
|
|
0
|
2
|
December 13, 2024
|
[Resource Topic] 2024/2019: Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key, Revisited: Consistency, Outsider Strong Unforgeability, and Generic Construction
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2018: On the BUFF Security of ECDSA with Key Recovery
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2017: Byzantine Consensus in Wireless Networks
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2016: The Existence of Quantum One-Way Functions
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2015: Universal SNARGs for NP from Proofs of Correctness
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2014: On the Traceability of Group Signatures: Uncorrupted User Must Exist
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2013: Crescent: Stronger Privacy for Existing Credentials
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2012: GraSS: Graph-based Similarity Search on Encrypted Query
|
|
0
|
0
|
December 13, 2024
|
[Resource Topic] 2024/2011: Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/2010: Anonymous credentials from ECDSA
|
|
0
|
1
|
December 12, 2024
|
[Resource Topic] 2024/2009: The Mis/Dis-information Problem is Hard to Solve
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/2008: PrivCirNet: Efficient Private Inference via Block Circulant Transformation
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/2007: A Combinatorial Attack on Ternary Sparse Learning with Errors (sLWE)
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/2006: Data Decryption and Analysis of Note-Taking Applications
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/2005: Post-Quantum Secure Channel Protocols for eSIMs
|
|
0
|
1
|
December 12, 2024
|
[Resource Topic] 2024/2004: Regev's attack on hyperelliptic cryptosystems
|
|
0
|
2
|
December 12, 2024
|
[Resource Topic] 2024/2003: Exploring the Optimal Differential Characteristics of SM4 (Full Version): Improving Automatic Search by Including Human Insights
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/2002: Improving Differential-Neural Distinguisher For Simeck Family
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/2001: Xiezhi: Toward Succinct Proofs of Solvency
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/2000: Evasive LWE Assumptions: Definitions, Classes, and Counterexamples
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1999: Multivariate Encryptions with LL’ perturbations - Is it possible to repair HFE in encryption? -
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1998: Impossible Differential Automation: Model Generation and New Techniques
|
|
0
|
1
|
December 12, 2024
|
[Resource Topic] 2024/1997: On format preserving encryption with nonce
|
|
0
|
0
|
December 12, 2024
|
[Resource Topic] 2024/1996: A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin
|
|
0
|
1
|
December 12, 2024
|