Linked e-resources

Details

Symmetric-Key Cryptography
On the Algebraic Immunity of Weightwise Perfectly Balanced Functions
ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for High-order Avalanche Tests
Multi-Party Computation
On Fully-Secure Honest Majority MPC without nˆ2 Round Overhead
Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels
Isogeny-Based Cryptography
Effective Pairings in Isogeny-based Cryptography
Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields
Towards a Quantum-resistant Weak Verifiable Delay Function
Discrete Logarithm Problem
Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable
On the Discrete Logarithm Problem in the Ideal Class Group of Multiquadratic Fields
Cryptographic Protocols
Stronger Lower Bounds for Leakage-Resilient Secret Sharing
Folding Schemes with Selective Verification
Composable Oblivious Pseudo-Random Functions via Garbled Circuits
Real-World Cryptography
Quotable Signatures for Authenticating Shared Quotes
Post-Quantum Hybrid KEMTLS Performance in Simulated and Real Network Environments
Zero-Knowledge Proofs
Physical Zero-Knowledge Proofs for Five Cells
Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup
Set (Non-)Membership NIZKs from Determinantal Accumulators
Benchmarking the Setup of Updatable zk-SNARKs.

Browse Subjects

Show more subjects...

Statistics

from
to
Export