zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs
SECDSA: Mobile signing and authentication under classical sole control
SoK: Understanding BFT Consensus in the Age of Blockchains
On the looseness of FO derandomization
MAJORITY-3SAT (and Related Problems) in Polynomial Time
Elliptic curves and isogenies: The good bits
http://www.jcr.cacrnet.org.cn/CN/volumn/home.shtml
| Posts |
|---|
| A 6 minute introduction to end to end encryption |
| 冯克勤:我怎样走向学习代数数论之路 |
| 无人关心中国“夺回”量子霸权 |
| Kaspersky Password Manager: All your passwords are belong to us |
| Quantum Key Distribution: Is it as secure as claimed and what can it offer the enterprise? |
| 安全多方计算仪式Lumino技术详细导读 |
| 两方计算的复杂度分析 - 兼信通院性能测评补充说明 |
| 浅谈提升 PlonK |
| 深入分析 Arbitrum 的安全机制 |
| 分析|零知识证明 |
| Videos |
|---|
| The Map of Superconductivity |
| String Theory |
| Quantum Research Seminars Toronto |
| TQC 2021 |
| The Story of Shor's Algorithm, Straight From the Source by Peter Shor |
| Mina Ecosystem Updates – Meeting #1 |
Nutan Limaye (IIT Bombay) - Superpolynomial lower bounds against low-depth algebraic circuits
**CSI-RASHI: DISTRIBUTED KEY GENERATION FOR CSIDH **– ROBI PEDERSEN
Inclusive Logic
Privacy Enhancing Technologies Symposium
北京大学应用数学专题讲习班 :Blockchain, Privacy-Preserving Computation, Theory and Algorithm
CCF “量子计算” 暑假班
Ideal Class Groups

by 鲁迅
往期周刊回顾:
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问