Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Claim page
Carsten Baum
Follow
Activity
Upvotes
Folders
Articles
39
A system capable of verifiably and privately screening global DNA synthesis
10 September 2024 by
Carsten Baum
and
others
at
MIT
Cryptography and Security
SARS-CoV-2 specific cellular and humoral immunity after bivalent BA.4/5 COVID-19 vaccination in previously infected and non-infected individuals
9 April 2024 by
R. Urschel
and
others
at
Saarland University
Infectious Diseases
Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs
16 February 2024 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions
15 October 2023 by
Diego Aranha
and
others
Cryptography and Security
,
Cryptographic Protocols
Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs
31 July 2023 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Publicly Verifiable Zero-Knowledge and Post-Quantum Signatures From VOLE-in-the-Head
25 June 2023 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
SoK: Privacy-Enhancing Technologies in Finance
15 June 2023 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptology
SoK: Vector OLE-Based Zero-Knowledge Protocols
6 June 2023 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
CaSCaDE: (Time-Based) Cryptography from Space Communications DElay
20 March 2023 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptology
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
12 February 2023 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Moz
\mathbb{Z}_{2^k}
arella: Efficient Vector-OLE and Zero-Knowledge Proofs Over
\mathbb{Z}_{2^k}
20 October 2022 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Eagle: Efficient Privacy Preserving Smart Contracts
20 October 2022 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
SoK: Mitigation of Front-running in Decentralized Finance
18 July 2022 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptology
Lattice-Based Proof of Shuffle and Applications to Electronic Voting
21 May 2022 by
Diego Aranha
and
others
Cryptography and Security
,
Cryptographic Protocols
Reassembling a cannon in the DNA defense arsenal: genetics of StySA, a BREX phage exclusion system in Salmonella lab strains
4 April 2022 by
J. Zaworski
and
others
Genetics
Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and
\mathbb{Z}_{2^k}
23 March 2022 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Rapid Identification of Methylase Specificity (RIMS-seq) jointly identifies methylated motifs and generates shotgun sequencing of bacterial genomes
20 August 2021 by
Carsten Baum
and
others
Genomics
TARDIS: A Foundation of Time-Lock Puzzles in UC
7 August 2021 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
25 July 2021 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
(Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge
13 June 2021 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
8 April 2021 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Fairness in the Eyes of the Data: Certifying Machine-Learning Models
8 April 2021 by
Shahar Segal
and
others
Artificial Intelligence
,
Cryptography and Security
Banquet: Short and Fast Signatures from AES
3 March 2021 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptology
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server
15 November 2020 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
17 August 2020 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptology
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
23 June 2020 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ
18 March 2020 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Insured MPC: Efficient Secure Computation with Financial Penalties
4 March 2020 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptographic Protocols
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
15 February 2020 by
Carsten Baum
and
Ariel Nof
Cryptography and Security
,
Cryptographic Protocols
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
29 January 2019 by
Carsten Baum
and
others
Cryptography and Security
,
Cryptology
Load more
This is an AI-generated summary
Key points
Topics
Cryptography and Security
Cryptology
Cryptographic Protocols
Machine Learning
Cryptology Applications
Public-key Cryptography
Infectious Diseases
Genetics
Genomics
Artificial Intelligence