Welcome to Ask Cryptography
|
|
1
|
1623
|
August 1, 2022
|
[Resource Topic] 2023/1463: Cascade: Leaderless State-Machine Replication with High Throughput
|
|
0
|
7
|
September 24, 2023
|
[Resource Topic] 2023/1462: High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application
|
|
0
|
6
|
September 24, 2023
|
[Resource Topic] 2023/1461: Do Private Transaction Pools Mitigate Frontrunning Risk?
|
|
0
|
6
|
September 24, 2023
|
[Resource Topic] 2023/1460: Rigorous Foundations for Dual Attacks in Coding Theory
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1459: Identity-Based Threshold Signatures from Isogenies
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1458: A Further Study of Vectorial Dual-Bent Functions
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1457: Provable Security Analysis of the Secure Remote Password Protocol
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1456: The Generating Series of Support Minors MinRank Ideals
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1455: Efficient Secure Two Party ECDSA
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1454: Scalable Off-Chain Auctions
|
|
0
|
7
|
September 24, 2023
|
[Resource Topic] 2023/1453: Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1452: Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
|
|
0
|
7
|
September 24, 2023
|
[Resource Topic] 2023/1451: Counting Unpredictable Bits: A Simple PRG from One-way Functions
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1450: Post-Quantum Fully Homomorphic Encryption with Group Ring Homomorphisms
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1449: Truncated Differential Attacks: New Insights and 10-round Attacks on QARMA
|
|
0
|
6
|
September 24, 2023
|
[Resource Topic] 2023/1448: The supersingular endomorphism ring problem given one endomorphism
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1447: Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1446: HE$^3$DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1445: HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1444: On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1443: Security with Functional Re-Encryption from CPA
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1442: Everlasting ROBOT: the Marvin Attack
|
|
0
|
7
|
September 24, 2023
|
[Resource Topic] 2023/1441: Out of the Box Testing
|
|
0
|
6
|
September 24, 2023
|
[Resource Topic] 2023/1440: Comment on Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1439: Dynamic Security Aspects of Onion Routing
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1438: Private Web Search with Tiptoe
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1437: KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates
|
|
0
|
6
|
September 24, 2023
|
[Resource Topic] 2023/1436: Cryptanalysis of Elisabeth-4
|
|
0
|
5
|
September 24, 2023
|
[Resource Topic] 2023/1435: Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions
|
|
0
|
9
|
September 24, 2023
|