Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Simple
Original
Articles about
Cryptology
A Refined Hardness Estimation of LWE in Two-step Mode
8 March 2024 by
Wenwen Xia
and
others
at
Shanghai Jiaotong University
Cryptography and Security
,
Cryptology
Under What Conditions Is Encrypted Key Exchange Actually Secure?
8 March 2024 by
Jake Januzelli
and
others
at
Oregon State University
Cryptography and Security
,
Cryptographic Protocols
Circuit Privacy for FHEW/TFHE-Style Fully Homomorphic Encryption in Practice
7 March 2024 by
Kamil Kluczniak
Cryptography and Security
,
Cryptology
Entropy Suffices for Guessing Most Keys
7 March 2024 by
Timo Glaser
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
An optimization of the addition gate count in Plonkish circuits
7 March 2024 by
Steve Thakur
Cryptography and Security
,
Cryptographic Protocols
Improved Circuit Synthesis with Amortized Bootstrapping for FHEW-like Schemes
7 March 2024 by
Johannes Mono
and
others
Cryptography and Security
,
Cryptology
The supersingular Endomorphism Ring and One Endomorphism problems are equivalent
7 March 2024 by
Aurel Page
and
Benjamin Wesolowski
Cryptography and Security
,
Attacks and Cryptanalysis
CCA Security with Short AEAD Tags
7 March 2024 by
Mustafa Khairallah
at
Lund University
Cryptography and Security
,
Cryptology
Asymptotically Optimal Message Dissemination with Applications to Blockchains
6 March 2024 by
Chen-Da Liu-Zhang
and
others
Cryptography and Security
,
Cryptographic Protocols
Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions
6 March 2024 by
Yashvanth Kondi
and
others
Cryptography and Security
,
Cryptographic Protocols
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience
6 March 2024 by
Victor Shoup
and
Nigel Smart
Cryptography and Security
,
Cryptographic Protocols
PRAC: Round-Efficient 3-Party MPC for Dynamic Data Structures
6 March 2024 by
Sajin Sasy
and
others
Cryptography and Security
,
Cryptographic Protocols
The Planck Constant and Quantum Fourier Transformation
6 March 2024 by
Zhengjun Cao
and
Zhenfu Cao
Cryptography and Security
,
Cryptology Foundations
Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
6 March 2024 by
Kelsey Jackson
and
others
Cryptography and Security
,
Cryptology
Don’t Use It Twice! Solving Relaxed Linear Code Equivalence Problems
6 March 2024 by
Alessandro Budroni
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Column-wise Garbling, and How to Go Beyond the Linear Model
6 March 2024 by
Lei Fan
and
others
Cryptography and Security
,
Cryptographic Protocols
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations
6 March 2024 by
Jacques Carolan
and
Alexander Poremba
at
MIT
Cryptography and Security
,
Cryptology Foundations
Bent functions construction using extended Maiorana-McFarland’s class
6 March 2024 by
Juan Carlos Ku-Cauich
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Quasi-Optimal Permutation Ranking and Applications to PERK
6 March 2024 by
Slim Bettaieb
and
others
Cryptography and Security
,
Cryptology
Polytopes in the Fiat-Shamir with Aborts Paradigm
6 March 2024 by
Henry Bambury
and
others
Cryptography and Security
,
Cryptology
Recent Progress in Quantum Computing Relevant to Internet Security
6 March 2024 by
Hilarie Orman
Cryptography and Security
,
Attacks and Cryptanalysis
Notus: Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators
6 March 2024 by
Jiajun Xin
and
others
Cryptography and Security
,
Cryptographic Protocols
STIR: Reed–Solomon Proximity Testing with Fewer Queries
6 March 2024 by
Gal Arnon
and
others
Cryptography and Security
,
Cryptographic Protocols
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem
6 March 2024 by
Lars Ran
and
others
Cryptography and Security
,
Attacks and Cryptanalysis
Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval
5 March 2024 by
Meng Hao
and
others
Cryptography and Security
,
Cryptographic Protocols
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery
5 March 2024 by
Shiyu Li
and
others
Cryptography and Security
,
Cryptographic Protocols
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems
5 March 2024 by
Dan Boneh
and
Binyi Chen
Cryptography and Security
,
Cryptographic Protocols
Nebula: A Privacy-First Platform for Data Backhaul
5 March 2024 by
Jean-luc Watson
and
others
Cryptography and Security
,
Cryptology
Modular Indexer: Fully User-Verified Execution Layer for Meta-Protocols on Bitcoin
5 March 2024 by
Hongbo Wen
and
others
Cryptography and Security
,
Cryptology
Permutation-Based Hashing Beyond the Birthday Bound
5 March 2024 by
Charlotte Lefevre
and
Bart Mennink
Cryptography and Security
,
Cryptology
Load more