Linked e-resources
Details
Table of Contents
Multi-Party Computation: Two-Sided Malicious Security for Private Intersection-Sum with Cardinality
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
Multiparty Generation of an RSA Modulus
Secret Sharing
Non-Malleability against Polynomial Tampering
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model
Nearly Optimal Robust Secret Sharing against Rushing Adversaries
Cryptanalysis
Cryptanalytic Extraction of Neural Network Models
Automatic Verification of Differential Characteristics: Application to Reduced Gimli
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme
Out of Oddity
New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Improved Differential-Linear Attacks with Applications to ARX Ciphers
Cryptanalysis Results on Spook: Bringing Full-round Shadow-512 to the Light
Cryptanalysis of LEDAcrypt
Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)
Delay functions
Order-Fairness for Byzantine Consensus
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions
Zero Knowledge
Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence
Interactive Proofs for Social Graphs
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
PPAD-Hardness and Delegation with Unambiguous Proofs
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust
Spartan: Efficient and general-purpose zkSNARKs
NIZK from LPN and Trapdoor Hash via Correlation Intract ability for Approximable Relations
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing.
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF
Multiparty Generation of an RSA Modulus
Secret Sharing
Non-Malleability against Polynomial Tampering
Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model
Nearly Optimal Robust Secret Sharing against Rushing Adversaries
Cryptanalysis
Cryptanalytic Extraction of Neural Network Models
Automatic Verification of Differential Characteristics: Application to Reduced Gimli
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme
Out of Oddity
New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
Improved Differential-Linear Attacks with Applications to ARX Ciphers
Cryptanalysis Results on Spook: Bringing Full-round Shadow-512 to the Light
Cryptanalysis of LEDAcrypt
Alzette: a 64-bit ARX-box (feat. CRAX and TRAX)
Delay functions
Order-Fairness for Byzantine Consensus
Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions
Zero Knowledge
Compressed Sigma-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence
Interactive Proofs for Social Graphs
The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs
PPAD-Hardness and Delegation with Unambiguous Proofs
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust
Spartan: Efficient and general-purpose zkSNARKs
NIZK from LPN and Trapdoor Hash via Correlation Intract ability for Approximable Relations
Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages
Non-Interactive Zero-Knowledge Arguments for QMA, with preprocessing.