Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Simple
Original
Articles about
Cryptology Applications
Quasi-Optimal Permutation Ranking and Applications to PERK
6 March 2024 by
Slim Bettaieb
and
others
Cryptography and Security
,
Cryptology
Nebula: A Privacy-First Platform for Data Backhaul
5 March 2024 by
Jean-luc Watson
and
others
Cryptography and Security
,
Cryptology
Modular Indexer: Fully User-Verified Execution Layer for Meta-Protocols on Bitcoin
5 March 2024 by
Hongbo Wen
and
others
Cryptography and Security
,
Cryptology
Aura: private voting with reduced trust on tallying authorities
4 March 2024 by
Aram Jivanyan
and
Aaron Feickert
Cryptography and Security
,
Cryptology
DARE to agree: Byzantine Agreement with Optimal Resilience and Adaptive Communication
4 March 2024 by
Pierre Civit
and
others
Cryptography and Security
,
Cryptology
Interactive Authentication
29 February 2024 by
Deepak Maram
and
others
Cryptography and Security
,
Cryptology
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing
29 February 2024 by
Saba Eskandarian
Cryptography and Security
,
Cryptology
Strong PUF Security Metrics: Sensitivity of Responses to Single Challenge Bit Flips
28 February 2024 by
Wolfgang Stefani
and
others
Cryptography and Security
,
Cryptology
Eureka: A General Framework for Black-box Differential Privacy Estimators
26 February 2024 by
Yun Lu
and
others
Cryptography and Security
,
Cryptology
ORTOA: One Round Trip Oblivious Access
25 February 2024 by
Sujaya Maiyya
and
others
Cryptography and Security
,
Cryptology
Recommendations for the Design and Validation of a Physical True Random Number Generator Integrated in an Electronic Device
21 February 2024 by
David Lubicz
and
Viktor Fischer
Cryptography and Security
,
Cryptology
IDEA-DAC: Integrity-Driven Editing for Accountable Decentralized Anonymous Credentials via ZK-JSON
20 February 2024 by
Shuhao Zheng
and
others
Cryptography and Security
,
Cryptology
Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption
18 February 2024 by
Heewon Chung
and
others
Cryptography and Security
,
Cryptology
Understanding User-Perceived Security Risks and Mitigation Strategies in the Web3 Ecosystem
18 February 2024 by
Janice Jianing Si
and
others
Cryptography and Security
,
Cryptology
LightDAG: A Low-latency DAG-based BFT Consensus through Lightweight Broadcast
16 February 2024 by
Xiaohai Dai
and
others
Cryptography and Security
,
Cryptology
zkPi: Proving Lean Theorems in Zero-Knowledge
15 February 2024 by
Eric Laufer
and
others
at
Stanford University
Cryptography and Security
,
Cryptology
Spats: confidential assets and non-fungible tokens
13 February 2024 by
Aaron Feickert
and
Aram Jivanyan
Cryptography and Security
,
Cryptology
Divide and Funnel: a Scaling Technique for Mix-Networks
12 February 2024 by
Debajyoti Das
and
others
at
Purdue University
Cryptography and Security
,
Cryptology
Programmable Payment Channels
11 February 2024 by
Yibin Yang
and
others
Cryptography and Security
,
Cryptology
INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems
10 February 2024 by
Tao Zhang
and
others
Cryptography and Security
,
Cryptology
ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution
7 February 2024 by
Haoqian Zhang
and
others
Cryptography and Security
,
Cryptology
On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial
6 February 2024 by
Horia Druliac
and
others
Cryptography and Security
,
Cryptology
FileDES: A Secure, Scalable and Succinct Decentralized Encrypted Storage Network
6 February 2024 by
Minghui Xu
and
others
Cryptography and Security
,
Cryptology
Delphi: sharing assessments of cryptographic assumptions
5 February 2024 by
Jeroen Van De Graaf
and
Arjen Lenstra
Cryptography and Security
,
Cryptology
GradedDAG: An Asynchronous DAG-based BFT Consensus with Lower Latency
31 January 2024 by
Xiaohai Dai
and
others
Cryptography and Security
,
Cryptology
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path
29 January 2024 by
Xiaohai Dai
and
others
Cryptography and Security
,
Cryptology
SimpleFT: A Simple Byzantine Fault Tolerant Consensus
29 January 2024 by
Rui Hao
and
others
Cryptography and Security
,
Cryptology
Transaction Fairness in Blockchains, Revisited
26 January 2024 by
Rujia Li
and
others
Cryptography and Security
,
Cryptology
Djed: A Formally Verified Crypto-Backed Pegged Algorithmic Stablecoin
25 January 2024 by
Joachim Zahnentferner
and
others
Cryptography and Security
,
Cryptology
Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption
25 January 2024 by
Charles Gouert
and
Nektarios Georgios Tsoutsos
Cryptography and Security
,
Cryptology
Load more