Welcome to Ask Cryptography
|
|
1
|
2211
|
August 1, 2022
|
Isogeny Club - Season 4 - Talk #5: A survey on modular curves and their applications
|
|
0
|
24
|
April 24, 2024
|
[Resource Topic] 2024/613: Hadamard Product Argument from Lagrange-Based Univariate Polynomials
|
|
0
|
25
|
April 22, 2024
|
[Resource Topic] 2024/612: FHERMA: Building the Open-Source FHE Components Library for Practical Use
|
|
0
|
26
|
April 22, 2024
|
[Resource Topic] 2024/611: A Security Analysis of Restricted Syndrome Decoding Problems
|
|
0
|
23
|
April 22, 2024
|
[Resource Topic] 2024/610: Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation
|
|
0
|
23
|
April 22, 2024
|
[Resource Topic] 2024/609: New Security Proofs and Techniques for Hash-and-Sign with Retry Signature Schemes
|
|
0
|
21
|
April 22, 2024
|
[Resource Topic] 2024/608: The Practical Advantage of RSA over ECC and Pairings
|
|
0
|
27
|
April 22, 2024
|
[Resource Topic] 2024/607: Low-latency Secure Integrated Sensing and Communication with Transmitter Actions
|
|
0
|
21
|
April 22, 2024
|
[Resource Topic] 2024/606: Classical Commitments to Quantum States
|
|
0
|
27
|
April 22, 2024
|
[Resource Topic] 2024/605: Security Analysis of XHASH8/12
|
|
0
|
19
|
April 22, 2024
|
[Resource Topic] 2024/604: Generic MitM Attack Frameworks on Sponge Constructions
|
|
0
|
22
|
April 22, 2024
|
[Resource Topic] 2024/603: Worst-Case to Average-Case Hardness of LWE: A Simple and Practical Perspective
|
|
0
|
24
|
April 22, 2024
|
[Resource Topic] 2024/602: Secret-Sharing Schemes for High Slices
|
|
0
|
22
|
April 22, 2024
|
[Resource Topic] 2024/601: Improved Provable Reduction of NTRU and Hypercubic Lattices
|
|
0
|
21
|
April 22, 2024
|
[Resource Topic] 2024/600: A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-
|
|
0
|
19
|
April 22, 2024
|
A bug has been found
|
|
0
|
52
|
April 19, 2024
|
[Resource Topic] 2024/599: Probabilistically Checkable Arguments for all NP
|
|
0
|
28
|
April 18, 2024
|
[Resource Topic] 2024/598: A Characterization of AE Robustness as Decryption Leakage Indistinguishability
|
|
0
|
23
|
April 18, 2024
|
[Resource Topic] 2024/597: Blockchain-based decentralized identity system: Design and security analysis
|
|
0
|
23
|
April 18, 2024
|
[Resource Topic] 2024/596: Cryptanalysis of signature schemes based on the root extraction problem over braid group
|
|
0
|
29
|
April 18, 2024
|
[Resource Topic] 2024/595: Analysis of Multivariate Encryption Schemes: Application to Dob and C*
|
|
0
|
20
|
April 18, 2024
|
[Resource Topic] 2024/555: Quantum Algorithms for Lattice Problems
|
|
1
|
287
|
April 16, 2024
|
Collection of X/Twitter Discussions
|
|
0
|
155
|
April 16, 2024
|
How does 2024/583 relate to the current result?
|
|
1
|
176
|
April 16, 2024
|
[Resource Topic] 2024/594: Greco: Fast Zero-Knowledge Proofs for Valid FHE RLWE Ciphertexts Formation
|
|
0
|
32
|
April 16, 2024
|
[Resource Topic] 2024/593: The Case of Small Prime Numbers Versus the Okamoto-Uchiyama Cryptosystem
|
|
0
|
30
|
April 16, 2024
|
[Resource Topic] 2024/592: Asymptotics for the standard block size in primal lattice attacks: second order, formally verified
|
|
0
|
28
|
April 16, 2024
|
[Resource Topic] 2024/591: Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures
|
|
0
|
27
|
April 16, 2024
|
[Resource Topic] 2024/590: Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks
|
|
0
|
29
|
April 16, 2024
|