Welcome to Ask Cryptography
|
|
1
|
2972
|
August 1, 2022
|
[Resource Topic] 2024/1720: Pseudorandom Multi-Input Functional Encryption and Applications
|
|
0
|
15
|
October 21, 2024
|
[Resource Topic] 2024/1719: Compact Pseudorandom Functional Encryption from Evasive LWE
|
|
0
|
14
|
October 21, 2024
|
[Resource Topic] 2024/1718: Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes
|
|
0
|
11
|
October 21, 2024
|
[Resource Topic] 2024/1717: Practical Asynchronous MPC from Lightweight Cryptography
|
|
0
|
16
|
October 21, 2024
|
[Resource Topic] 2024/1716: Rate-1 Statistical Non-Interactive Zero-Knowledge
|
|
0
|
16
|
October 21, 2024
|
[Resource Topic] 2024/1715: OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
|
|
0
|
12
|
October 21, 2024
|
[Resource Topic] 2024/1714: Theoretical Approaches to Solving the Shortest Vector Problem in NP-Hard Lattice-Based Cryptography with Post-SUSY Theories of Quantum Gravity in Polynomial Time
|
|
0
|
15
|
October 21, 2024
|
[Resource Topic] 2024/1713: Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler
|
|
0
|
14
|
October 21, 2024
|
[Resource Topic] 2024/1712: Low-Communication Updatable PSI from Asymmetric PSI and PSU
|
|
0
|
17
|
October 21, 2024
|
[Resource Topic] 2024/1711: Good things come to those who wait: Dishonest-Majority Coin-Flipping Requires Delay Functions
|
|
0
|
15
|
October 21, 2024
|
[Resource Topic] 2024/1710: $\widetilde{\mbox{O}}$ptimal Adaptively Secure Hash-based Asynchronous Common Subset
|
|
0
|
14
|
October 21, 2024
|
[Resource Topic] 2024/1709: Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences
|
|
0
|
12
|
October 21, 2024
|
[Resource Topic] 2024/1708: Subliminal Encrypted Multi-Maps and Black-Box Leakage Absorption
|
|
0
|
17
|
October 21, 2024
|
[Resource Topic] 2024/1707: CountCrypt: Quantum Cryptography between QCMA and PP
|
|
0
|
16
|
October 21, 2024
|
[Resource Topic] 2024/1706: State of the art of HFE variants Is it possible to repair HFE with appropriate perturbations?
|
|
0
|
14
|
October 21, 2024
|
[Resource Topic] 2024/1705: Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience
|
|
0
|
15
|
October 21, 2024
|
[Resource Topic] 2024/1704: From One-Time to Two-Round Reusable Multi-Signatures without Nested Forking
|
|
0
|
15
|
October 21, 2024
|
[Resource Topic] 2024/1703: Free-XOR Gate Bootstrapping
|
|
0
|
17
|
October 21, 2024
|
[Resource Topic] 2024/1702: Secure and efficient transciphering for FHE-based MPC
|
|
0
|
16
|
October 21, 2024
|
[Resource Topic] 2024/1701: Secure Computation with Parallel Calls to 2-ary Functions
|
|
0
|
16
|
October 21, 2024
|
[Resource Topic] 2024/1700: Does quantum lattice sieving require quantum RAM?
|
|
0
|
18
|
October 21, 2024
|
[Resource Topic] 2024/1699: HADES: Range-Filtered Private Aggregation on Public Data
|
|
0
|
25
|
October 18, 2024
|
[Resource Topic] 2024/1698: Computational Analysis of Plausibly Post-Quantum-Secure Recursive Arguments of Knowledge
|
|
0
|
22
|
October 18, 2024
|
[Resource Topic] 2024/1697: On pairing-friendly 2-cycles and SNARK-friendly 2-chains of elliptic curves containing a curve from a prime-order family
|
|
0
|
22
|
October 18, 2024
|
[Resource Topic] 2024/1696: Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security
|
|
0
|
21
|
October 18, 2024
|
[Resource Topic] 2024/1695: Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians
|
|
0
|
20
|
October 18, 2024
|
[Resource Topic] 2024/1694: Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
|
|
0
|
19
|
October 18, 2024
|
[Resource Topic] 2024/1693: A notion on S-boxes for a partial resistance to some integral attacks
|
|
0
|
24
|
October 18, 2024
|
[Resource Topic] 2024/1692: On the practicality of quantum sieving algorithms for the shortest vector problem
|
|
0
|
22
|
October 18, 2024
|