Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Articles by Alexander R. Block | Synthical
Claim page
Alexander R. Block
Follow
Activity
Upvotes
Folders
Articles
12
Fiat-Shamir Security of FRI and Related SNARKs
4 March 2024 by
Alexander Block
and
others
Cryptography and Security
,
Cryptographic Protocols
On Soundness Notions for Interactive Oracle Proofs
4 March 2024 by
Alexander Block
and
others
at
Georgetown University
Cryptography and Security
,
Cryptographic Protocols
Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads
11 November 2023 by
Alexander Block
and
others
Cryptography and Security
,
Cryptographic Protocols
Computationally Relaxed Locally Decodable Codes, Revisited
4 September 2023 by
Alexander Block
and
Jeremiah Blocki
at
Georgetown University
Information Theory
,
Cryptography and Security
Honest Majority Multi-Prover Interactive Arguments
6 October 2022 by
Alexander Block
and
Christina Garman
Cryptography and Security
,
Cryptographic Protocols
Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes
1 May 2022 by
Mohammmad Hassan Ameri
and
others
Cryptography and Security
,
Cryptology Foundations
Time- and Space-Efficient Arguments from Groups of Unknown Order
20 September 2021 by
Alexander Block
and
others
Cryptography and Security
,
Cryptographic Protocols
Private and Resource-Bounded Locally Decodable Codes for Insertions and Deletions
29 March 2021 by
Alexander Block
and
Jeremiah Blocki
at
Purdue University
Information Theory
,
Cryptography and Security
P_4
-free Partition and Cover Numbers and Application
1 March 2021 by
Alexander Block
and
others
Cryptography and Security
,
Cryptology
Locally Decodable/Correctable Codes for Insertions and Deletions
19 November 2020 by
Alexander Block
and
others
at
Purdue University
Information Theory
Secure Computation with Constant Communication Overhead using Multiplication Embeddings
9 December 2018 by
Alexander Block
and
others
Cryptography and Security
,
Cryptology
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)
9 December 2018 by
Alexander Block
and
others
Cryptography and Security
,
Cryptology
Topics
Cryptography and Security
Cryptology
Information Theory
Cryptographic Protocols
Cryptology Foundations