Delegating Supersingular Isogenies over with Cryptographic Applications
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
On using the same key pair for Ed25519 and an X25519 based KEM
Signer and Message Ambiguity from a Variety of Keys
On (Weak) Simulation-Extractability of Universal zkSNARKs
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
On One-way Functions from -Complete Problems
Non-Interactive Zero Knowledge from Sub-exponential DDH
Generic Constructions of Revocable Hierarchical Identity-based Encryption
Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity
How to Share and Own a Secret
Public-key Cryptosystems and Signature Schemes from p-adic Lattices
Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency
Solving discrete logarithm problem over prime fields using quantum annealing and logical qubits
SNARKpack: Practical SNARK Aggregation
LogStack: Stacked Garbling with Computation
Rainbow on Cortex-M4
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
On the Possibility of Basing Cryptography on
Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms
SoK: Exploring Blockchains Interoperability
A Composable Look at Updatable Encryption
More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
Hardware Deployment of Hybrid PQC
The Case for SIKE: A Decade of the Supersingular Isogeny Problem
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
High-assurance field inversion for curve-based cryptography
Efficient Sorting of Homomorphic Encrypted Data with -way Sorting Network
Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric
Grover on Caesar and Vigenère Ciphers
Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori
Dual lattice attacks for closest vector problems (with preprocessing)
| Posts/ Videos |
|---|
| 安全研究人员蓄意引入漏洞?该道歉的是这些自媒体们! |
| 《我对计算的理解》:2021全球架构师峰会演讲实录 |
| imToken Team: 区块链 & 去中心化钱包知识须知 |
| 别倒腾了!比特币是个无限游戏 |
| 狗狗币收割了无数财富,你却还不知道它是啥 |
| 区块链的2021 |
| Layer 2 Rollup辩论:zkSync、Optimism、Arbitrum和Starkware |
| The Layer 2 Wars Heat Up |
| Mathematicians Find a New Class of Digitally Delicate Primes |
| Introduction to Blockchain (Explained by the Algorand Foundation) |
| In Praise of Bitcoin |
Madhu Sudan: A Picture is Worth a Thousand Words, Its Essence is Checked in Three
Scaling Ethereum | ZK Summit
Implementation aspects of lattice-based cryptography
https://iden3.io/circom
现在,技术与资本主义息息相关,已经很难区分两者了。—— Ted Chiang,美国科幻小说作家

往期周刊回顾:
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问