Welcome to Ask Cryptography
|
|
1
|
3209
|
August 1, 2022
|
[Resource Topic] 2025/1113: Computational Attestations of Polynomial Integrity Towards Verifiable Back-Propagation
|
|
0
|
1
|
June 13, 2025
|
[Resource Topic] 2025/1112: Hydrangea: Optimistic Two-Round Partial Synchrony with One-Third Fault Resilience
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1111: SEAF: Secure Evaluation on Activation Functions with Dynamic Precision for Secure Two-Party Inference
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1110: A Framework for Compiling Custom Languages as Efficiently Verifiable Virtual Machines
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1109: Kahrobaei--Koupparis DSS: universal forgery
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1108: Laconic PSI on Authenticated Inputs and Applications
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1107: Early Stopping is Cheap
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1106: b4M: Holistic Benchmarking for MPC
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1105: Low-cost anonymous reputation update for IoT applications
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1104: Better GBFV Bootstrapping and Faster Encrypted Edit Distance Computation
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1103: Universally Composable Succinct Vector Commitments and Applications
|
|
0
|
1
|
June 13, 2025
|
[Resource Topic] 2025/1102: TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1101: A Note on One Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1100: Tanuki: New Frameworks for (Concurrently Secure) Blind Signatures from Post-Quantum Groups Actions
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1099: Lattice-Based Accumulator and Application to Anonymous Credential Revocation
|
|
0
|
0
|
June 13, 2025
|
[Resource Topic] 2025/1098: Isogeny-based key exchange from orientations of large discriminant
|
|
0
|
2
|
June 12, 2025
|
[Resource Topic] 2025/1097: Oracle-Based Multistep Strategy for Solving Polynomial Systems Over Finite Fields and Algebraic Cryptanalysis of the Aradi Cipher
|
|
0
|
0
|
June 12, 2025
|
[Resource Topic] 2025/1096: CuFDFB: Fast and Private Computation on Non-Linear Functions Using FHE
|
|
0
|
1
|
June 12, 2025
|
[Resource Topic] 2025/1095: Ideally HAWKward: How Not to Break Module-LIP
|
|
0
|
0
|
June 12, 2025
|
[Resource Topic] 2025/1094: Key Updatable Identity-Based-Signature Schemes
|
|
0
|
3
|
June 12, 2025
|
[Resource Topic] 2025/1093: On the Concrete Security of BBS/BBS+ Signatures
|
|
0
|
0
|
June 12, 2025
|
[Resource Topic] 2025/1092: OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries
|
|
0
|
0
|
June 12, 2025
|
[Resource Topic] 2025/1091: Quantum Computing without the Linear Algebra
|
|
0
|
0
|
June 12, 2025
|
[Resource Topic] 2025/1090: Concrete Treatment of Signal Handshake’s Deniability: Efficient Post-Quantum Deniable Ring Signature
|
|
0
|
0
|
June 12, 2025
|
[Resource Topic] 2025/1089: Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security
|
|
0
|
0
|
June 12, 2025
|
[Resource Topic] 2025/1088: Homomorphic Field Trace Revisited : Breaking the Cubic Noise Barrier
|
|
0
|
0
|
June 12, 2025
|
[Resource Topic] 2024/2010: Anonymous credentials from ECDSA
|
|
1
|
11
|
June 11, 2025
|
[Resource Topic] 2025/1087: Cryptography meets worst-case complexity: Optimal security and more from iO and worst-case assumptions
|
|
0
|
1
|
June 10, 2025
|
[Resource Topic] 2025/1086: Fairness in the Wild: Secure Atomic Swap with External Incentives
|
|
0
|
1
|
June 10, 2025
|