Welcome to Ask Cryptography
|
|
1
|
1850
|
August 1, 2022
|
[Resource Topic] 2023/1882: Lattice Based Signatures with Additional Functionalities
|
|
0
|
8
|
December 7, 2023
|
[Resource Topic] 2023/1881: Blockchain Governance via Sharp Anonymous Multisignatures
|
|
0
|
8
|
December 7, 2023
|
[Resource Topic] 2023/1880: Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work
|
|
0
|
7
|
December 7, 2023
|
[Resource Topic] 2023/1879: A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem
|
|
0
|
6
|
December 7, 2023
|
[Resource Topic] 2023/1878: Predicting performance for post-quantum encrypted-file systems
|
|
0
|
6
|
December 7, 2023
|
[Resource Topic] 2023/1877: Security Analysis of an Image Encryption Scheme Based on a New Secure Variant of Hill Cipher and 1D Chaotic Maps
|
|
0
|
9
|
December 6, 2023
|
[Resource Topic] 2023/1876: Thwarting Last-Minute Voter Coercion
|
|
0
|
6
|
December 6, 2023
|
[Resource Topic] 2023/1875: The Blockwise Rank Syndrome Learning problem and its applications to cryptography
|
|
0
|
9
|
December 6, 2023
|
[Resource Topic] 2023/1874: Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map
|
|
0
|
8
|
December 6, 2023
|
[Resource Topic] 2023/1873: SoK: Post-Quantum TLS Handshake
|
|
0
|
7
|
December 6, 2023
|
[Resource Topic] 2023/1872: Integral Multiset: A Novel Framework for Integral Attacks over Finite Fields
|
|
0
|
7
|
December 6, 2023
|
[Resource Topic] 2023/1871: B2T: The Third Logical Value of a Bit
|
|
0
|
12
|
December 6, 2023
|
[Resource Topic] 2023/1870: An Improved Method for Evaluating Secret Variables and Its Application to WAGE
|
|
0
|
6
|
December 6, 2023
|
[Resource Topic] 2023/1869: Accountable Bulletin Boards: Definition and Provably Secure Implementation
|
|
0
|
8
|
December 6, 2023
|
[Resource Topic] 2023/1868: COMMON: Order Book with Privacy
|
|
0
|
6
|
December 6, 2023
|
[Resource Topic] 2023/1867: Different Flavours of HILL Pseudoentropy and Yao Incompressibility Entropy
|
|
0
|
8
|
December 6, 2023
|
[Resource Topic] 2023/1866: When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber
|
|
0
|
7
|
December 6, 2023
|
[Resource Topic] 2023/1865: Projective Space Stern Decoding and Application to SDitH
|
|
0
|
12
|
December 6, 2023
|
[Resource Topic] 2023/1864: Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses
|
|
0
|
7
|
December 6, 2023
|
[Resource Topic] 2023/1863: Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification
|
|
0
|
5
|
December 6, 2023
|
[Resource Topic] 2023/1862: Analyzing UTXO-Based Blockchain Privacy Threats
|
|
0
|
8
|
December 6, 2023
|
[Resource Topic] 2023/1861: Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
|
|
0
|
6
|
December 6, 2023
|
[Resource Topic] 2023/1860: EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis
|
|
0
|
6
|
December 6, 2023
|
[Resource Topic] 2023/1859: XorSHAP: Privacy-Preserving Explainable AI for Decision Tree Models
|
|
0
|
20
|
December 6, 2023
|
[Resource Topic] 2023/1858: A Novel Power-Sum PRG with Applications to Lattice-Based zkSNARKs
|
|
0
|
7
|
December 6, 2023
|
[Resource Topic] 2023/1857: A Simple and Efficient Framework of Proof Systems for NP
|
|
0
|
9
|
December 6, 2023
|
Constructing supersingular elliptic curves with a given endomorphism ring (example 1)
|
|
3
|
28
|
December 5, 2023
|
[Resource Topic] 2023/1856: Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model
|
|
0
|
13
|
December 4, 2023
|
[Resource Topic] 2023/1855: Demystifying DeFi MEV Activities in Flashbots Bundle
|
|
0
|
12
|
December 4, 2023
|