|
Welcome to Ask Cryptography
|
|
1
|
3317
|
August 1, 2022
|
|
[Resource Topic] 2025/2048: Time-Lock Encrypted Storage for Blockchains
|
|
0
|
1
|
November 6, 2025
|
|
[Resource Topic] 2025/2047: Enabling Index-free Adjacency in Oblivious Graph Processing with Delayed Duplications
|
|
0
|
2
|
November 6, 2025
|
|
[Resource Topic] 2025/2046: On Reed–Solomon Proximity Gaps Conjectures
|
|
0
|
7
|
November 5, 2025
|
|
[Resource Topic] 2025/2045: Handling Noisy Plaintext Checking Oracles with SPiRiT
|
|
0
|
5
|
November 5, 2025
|
|
[Resource Topic] 2025/2044: New Asymptotic Results on Predicting Non-linear Polynomial Congruential Generators
|
|
0
|
5
|
November 5, 2025
|
|
[Resource Topic] 2025/2043: Key-Recovery Side-Channel Attack on the Berlekamp-Massey Decoding Algorithm in the Classic McEliece KEM
|
|
0
|
3
|
November 5, 2025
|
|
[Resource Topic] 2025/2042: Threshold Anonymous Credentials with Silent Setup
|
|
0
|
6
|
November 5, 2025
|
|
[Resource Topic] 2025/2041: Sum-check Is All You Need: An Opinionated Survey on Fast Provers in SNARK Design
|
|
0
|
6
|
November 5, 2025
|
|
[Resource Topic] 2025/2040: The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
|
|
0
|
5
|
November 5, 2025
|
|
[Resource Topic] 2025/2039: Non-Delegatable Commitments
|
|
0
|
6
|
November 5, 2025
|
|
[Resource Topic] 2025/2038: Breaking and Fixing MacaKey
|
|
0
|
2
|
November 5, 2025
|
|
[Resource Topic] 2025/2037: On the Simulation-Extractability of Proof-Carrying Data
|
|
0
|
4
|
November 5, 2025
|
|
[Resource Topic] 2025/2036: On new variants of funcCPA security and related CCA-secure constructions
|
|
0
|
7
|
November 5, 2025
|
|
[Resource Topic] 2025/2035: Multivariate Commitments and Signatures with Efficient Protocols
|
|
0
|
4
|
November 5, 2025
|
|
[Resource Topic] 2025/2034: MtDB: A Decentralized Multi-Tenant Database for Secure Data Sharing
|
|
0
|
3
|
November 5, 2025
|
|
[Resource Topic] 2025/2033: Vestigial Vulnerabilities in Deployed Verifiable E-Voting Systems
|
|
0
|
4
|
November 5, 2025
|
|
[Resource Topic] 2025/2032: TrX: Encrypted Mempools in High Performance BFT Protocols
|
|
0
|
9
|
November 5, 2025
|
|
[Resource Topic] 2025/2031: A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
|
|
0
|
5
|
November 3, 2025
|
|
[Resource Topic] 2025/2030: Succinct Zero-knowledge Proofs from One-way Functions:The Blackbox Way
|
|
0
|
3
|
November 3, 2025
|
|
[Resource Topic] 2025/2029: Forging Dilithium and Falcon Signatures by Single Fault Injection
|
|
0
|
4
|
November 3, 2025
|
|
[Resource Topic] 2025/2028: Improving ML-KEM and ML-DSA on OpenTitan - Efficient Multiplication Vector Instructions for OTBN
|
|
0
|
3
|
November 3, 2025
|
|
[Resource Topic] 2025/2027: Accurate BGV Parameters Selection: Accounting for Secret and Public Key Dependencies in Average-Case Analysis
|
|
0
|
2
|
November 3, 2025
|
|
[Resource Topic] 2025/2026: Whom do you trust? PRISM: Lightweight Key Transparency for All
|
|
0
|
3
|
November 3, 2025
|
|
[Resource Topic] 2025/2025: Migration to Post-Quantum Cryptography: From ECDSA to ML-DSA
|
|
0
|
5
|
November 3, 2025
|
|
[Resource Topic] 2025/2024: A Note Comparing Three Incentive Designs Against Privacy-Targeted Collusion
|
|
0
|
3
|
November 3, 2025
|
|
[Resource Topic] 2025/2023: Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE
|
|
0
|
8
|
November 1, 2025
|
|
[Resource Topic] 2025/2022: Formal Verification of Privacy Pass
|
|
0
|
2
|
November 1, 2025
|
|
[Resource Topic] 2025/2021: TreeCast: Multi-Party Key Establishment Protocol for IoT Devices
|
|
0
|
6
|
November 1, 2025
|
|
[Resource Topic] 2025/2020: VerfCNN, Optimal Complexity zkSNARK for Convolutional Neural Networks
|
|
0
|
6
|
November 1, 2025
|