Welcome to Ask Cryptography
|
|
1
|
3175
|
August 1, 2022
|
[Resource Topic] 2025/705: Breaking ECDSA with Two Affinely Related Nonces
|
|
0
|
2
|
April 18, 2025
|
[Resource Topic] 2025/704: Reducing Honest Re-Encryption Attack to Chosen Ciphertext Attack
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/703: Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/702: Two Party Secret Shared Joins
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/701: Hermes: Efficient and Secure Multi-Writer Encrypted Database
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/700: Fherret: Proof of FHE Correct-and-Honest Evaluation with Circuit Privacy from MPCitH
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/699: Threshold (Fully) Homomorphic Encryption
|
|
0
|
1
|
April 18, 2025
|
[Resource Topic] 2025/698: Mind the Grammar: Side-Channel Analysis driven by Grammatical Evolution
|
|
0
|
1
|
April 17, 2025
|
[Resource Topic] 2025/697: A Multi-Differential Approach to Enhance Related-Key Neural Distinguishers
|
|
0
|
0
|
April 17, 2025
|
[Resource Topic] 2025/696: Faster amortized bootstrapping using the incomplete NTT for free
|
|
0
|
0
|
April 17, 2025
|
[Resource Topic] 2025/695: Efficient Foreign-Field Arithmetic in PLONK
|
|
0
|
1
|
April 17, 2025
|
[Resource Topic] 2025/694: A Formal Security Analysis of Hyperledger AnonCreds
|
|
0
|
0
|
April 17, 2025
|
[Resource Topic] 2025/693: Accountable Liveness
|
|
0
|
1
|
April 17, 2025
|
[Resource Topic] 2025/692: DahLIAS: Discrete Logarithm-Based Interactive Aggregate Signatures
|
|
0
|
2
|
April 16, 2025
|
[Resource Topic] 2025/691: Let us walk on the 3-isogeny graph: efficient, fast, and simple
|
|
0
|
2
|
April 16, 2025
|
[Resource Topic] 2025/690: Zero-Knowledge Protocol for Knowledge of Known Discrete Logarithms: Applications to Ring Confidential Transactions and Anonymous Zether
|
|
0
|
1
|
April 16, 2025
|
[Resource Topic] 2025/689: Neural network design options for RNG's verification
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/688: Uncertainty Estimation in Neural Network-enabled Side-channel Analysis and Links to Explainability
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/687: Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging
|
|
0
|
1
|
April 16, 2025
|
[Resource Topic] 2025/686: Fast amortized bootstrapping with small keys and polynomial noise overhead
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/685: Proofs of Useful Work from Arbitrary Matrix Multiplication
|
|
0
|
3
|
April 16, 2025
|
[Resource Topic] 2025/684: Post-quantum Cryptographic Analysis of SSH
|
|
0
|
1
|
April 16, 2025
|
[Resource Topic] 2025/683: On the Definition of Malicious Private Information Retrieval
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/682: SUMAC: an Efficient Administrated-CGKA Using Multicast Key Agreement
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/681: Quantum Periodic Distinguisher Construction: Symbolization Method and Automated Tool
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/680: Pirouette: Query Efficient Single-Server PIR
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/679: Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/678: Recovering S-Box Design Structures and Quantifying Distances between S-Boxes using Deep Learning
|
|
0
|
0
|
April 16, 2025
|
[Resource Topic] 2025/677: Impossible Differential Attack on SAND-128
|
|
0
|
0
|
April 16, 2025
|