Welcome to Ask Cryptography
|
|
1
|
3222
|
August 1, 2022
|
[Resource Topic] 2025/1236: Exploring Marginal Guesswork with the Theorem of Berry-Esséen
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1235: HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1234: LegoLog: A configurable transparency log
|
|
0
|
1
|
July 9, 2025
|
[Resource Topic] 2025/1233: Improved Constant-Sized Polynomial Commitment Schemes Without Trusted Setup
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1232: OMIX: Offline Mixing for Scalable Self-Tallying Elections
|
|
0
|
1
|
July 9, 2025
|
[Resource Topic] 2025/1231: Compressing steganographic payloads with LLM assistance
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1230: ABE Cubed: Advanced Benchmarking Extensions for ABE Squared
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1229: NTRU with Hints: Recovering NTRU Secret Keys from Partial Leakage
|
|
0
|
1
|
July 9, 2025
|
[Resource Topic] 2025/1228: Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1227: Improved Key-recovery Attacks on ARADI
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1226: Rational Censorship Attack: Breaking Blockchain with a Blackboard
|
|
0
|
0
|
July 9, 2025
|
[Resource Topic] 2025/1225: Lattice EPID with Efficient Revocation
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1224: An Update to ``Polynomial Hashing over Prime Order Fields''
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1223: Efficient Pseudorandom Correlation Generators over $\mathbb{Z}/p^k\mathbb{Z}$
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1222: SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1221: EWEMrl: A White-Box Secure Cipher with Longevity
|
|
0
|
1
|
July 7, 2025
|
[Resource Topic] 2025/1220: RoK and Roll – Verifier-Efficient Random Projection for $\tilde{O}(\lambda)$-size Lattice Arguments
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1219: Foundations of Single-Decryptor Encryption
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1218: Revisiting Module Lattice-based Homomorphic Encryption and Application to Secure-MPC
|
|
0
|
4
|
July 7, 2025
|
[Resource Topic] 2025/1217: Cymric: Short-tailed but Mighty
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1216: Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption
|
|
0
|
1
|
July 7, 2025
|
[Resource Topic] 2025/1215: Highly Scalable Searchable Symmetric Encryption for Boolean Queries from NTRU Lattice Trapdoors
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1214: Hobbit: Space-Efficient zkSNARK with Optimal Prover Time
|
|
0
|
1
|
July 7, 2025
|
[Resource Topic] 2025/1213: Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
|
|
0
|
0
|
July 7, 2025
|
[Resource Topic] 2025/1212: All Proof of Work But No Proof of Play
|
|
0
|
1
|
July 7, 2025
|
[Resource Topic] 2025/1211: May the Force $\textit{not}$ Be with you: Brute-Force Resistant Biometric Authentication and Key Reconstruction
|
|
0
|
2
|
July 2, 2025
|
[Resource Topic] 2025/1210: A Generalized Approach to Root-based Attacks against PLWE
|
|
0
|
0
|
July 2, 2025
|
[Resource Topic] 2025/1209: RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing
|
|
0
|
1
|
June 30, 2025
|
[Resource Topic] 2025/1208: End-to-End Encrypted Git Services
|
|
0
|
2
|
June 30, 2025
|