Welcome to Ask Cryptography
|
|
1
|
3134
|
August 1, 2022
|
Bootstrapping of BV11 (2-nd Gen FHE) is not holds!
|
|
3
|
13
|
February 11, 2025
|
[Resource Topic] 2025/197: Cryptanalysis of a nonlinear filter-based stream cipher
|
|
0
|
0
|
February 11, 2025
|
[Resource Topic] 2025/196: Endomorphisms for Faster Cryptography on Elliptic Curves of Moderate CM Discriminants, II
|
|
0
|
0
|
February 11, 2025
|
[Resource Topic] 2025/195: Finding a polytope: A practical fault attack against Dilithium
|
|
0
|
1
|
February 11, 2025
|
[Resource Topic] 2025/194: AUCIL: An Inclusion List Design for Rational Parties
|
|
0
|
1
|
February 11, 2025
|
[Resource Topic] 2025/193: On the Average Random Probing Model
|
|
0
|
1
|
February 11, 2025
|
[Resource Topic] 2025/192: Practical Electromagnetic Fault Injection on Intel Neural Compute Stick 2
|
|
0
|
1
|
February 11, 2025
|
[Resource Topic] 2025/191: Adaptive Distributional Security: A Framework for Input-Adaptive Cryptography
|
|
0
|
1
|
February 11, 2025
|
[Resource Topic] 2025/190: Binary Codes for Error Detection and Correction in a Computationally Bounded World
|
|
0
|
2
|
February 10, 2025
|
[Resource Topic] 2025/189: Experimentally studying path-finding problem between conjugates in supersingular isogeny graphs: Optimizing primes and powers to speed-up cycle finding
|
|
0
|
2
|
February 10, 2025
|
[Resource Topic] 2025/188: BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup
|
|
0
|
0
|
February 10, 2025
|
[Resource Topic] 2025/187: Asymptotic improvements to provable algorithms for the code equivalence problem
|
|
0
|
1
|
February 10, 2025
|
[Resource Topic] 2025/186: Computing Quaternion Embeddings and Endomorphism rings of Supersingular Oriented Elliptic curves
|
|
0
|
2
|
February 10, 2025
|
[Resource Topic] 2025/185: AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
|
|
0
|
0
|
February 10, 2025
|
[Resource Topic] 2025/184: NodeChain: Cheap Data Integrity Without Consensus
|
|
0
|
0
|
February 10, 2025
|
[Resource Topic] 2025/183: OBLIVIATOR: Oblivious Parallel Joins and other Operators in Shared Memory Environments
|
|
0
|
3
|
February 10, 2025
|
[Resource Topic] 2025/182: Deny Whatever You Want: Dual-Deniable Public-Key Encryption
|
|
0
|
1
|
February 10, 2025
|
[Resource Topic] 2025/181: Improved NTT and CRT-based RNR Blinding for Side-Channel and Fault Resistant Kyber
|
|
0
|
1
|
February 10, 2025
|
[Resource Topic] 2025/180: On the Atomicity and Efficiency of Blockchain Payment Channels
|
|
0
|
1
|
February 10, 2025
|
[Resource Topic] 2025/179: Higher-Order Deterministic Masking with Application to Ascon
|
|
0
|
0
|
February 7, 2025
|
[Resource Topic] 2025/178: Improved Differential and Linear Cryptanalysis on Round-Reduced SIMON
|
|
0
|
0
|
February 7, 2025
|
[Resource Topic] 2025/177: On the Power of Sumcheck in Secure Multiparty Computation
|
|
0
|
1
|
February 7, 2025
|
[Resource Topic] 2025/176: HyperLoop: Rationally secure efficient cross-chain bridge
|
|
0
|
1
|
February 7, 2025
|
[Resource Topic] 2025/175: Updatable Public-Key Encryption, Revisited
|
|
0
|
4
|
February 7, 2025
|
[Resource Topic] 2025/174: VITARIT: Paying for Threshold Services on Bitcoin and Friends
|
|
0
|
2
|
February 7, 2025
|
[Resource Topic] 2025/173: A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography
|
|
0
|
2
|
February 7, 2025
|
[Resource Topic] 2025/172: SoK: Understanding zk-SNARKs: The Gap Between Research and Practice
|
|
0
|
4
|
February 7, 2025
|
[Resource Topic] 2025/171: A light white-box masking scheme using Dummy Shuffled Secure Multiplication
|
|
0
|
0
|
February 7, 2025
|
[Resource Topic] 2025/170: Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms
|
|
0
|
0
|
February 7, 2025
|