Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
Iterative Oblivious Pseudo-Random Functions and Applications
Quantum collision finding for homomorphic hash functions
Obfustopia Built on Secret-Key Functional Encryption
Implementing and Measuring KEMTLS
Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Zero-Knowledge Middleboxes
SIDH Proof of Knowledge
Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings
On the Hardness of Ring/Module/Polynomial LWR Problems
On Fingerprinting Attacks and Length-Hiding Encryption
LOVE a pairing
On the Origin of Quantum Uncertainty
https://cst.qd.sdu.edu.cn/inscrypt_2021/index.htm
Authenticated Key Exchange: Tight Security & Explicit Authentication
Secure Computation as a Societal Tool: Promise, Hurdles, and Dangers
A Survey on Two-Round MPC
Towards and Open Approach to Leakage-Resistant Authenticated Encryption
Concurrent Signatures from a Variety of Keys
A Generic Construction of Fuzzy Signature
An Identity based Linkable Ring Signature with Logarithmic Size
Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T
Fully Secure Lattice-based ABE from Noisy Linear Functional Encryption
Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices
Homomorphic Modular Reduction and Improved Bootstrapping for BGV Scheme
A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits
Improved Zero-Knowledge Argument of Encrypted Extended Permutation
https://www.usenix.org/conference/usenixsecurity21/technical-sessions
| Posts |
|---|
| 苹果扫描iPhone所有照片,发现问题还要报警:全新「保护」计划惹众怒 |
| Cairo 语言介绍 |
| 元宇宙「只不过」是对数字空间的一次升级 |
| Mina背后的理想乡:递归零知识证明 |
| zkEVM - Hermez设计思路 |
| 如果我们这样看一个NFT |
| DGHV:整数上的同态加密(2) |
| 吴文俊:开创中国特有的数学道路 |
| 侧链与L2之间如何相互转账?一文了解StarkWare的无需信任转账方案 |
| How do Mina nodes communicate? |
| The Art of Dark Forest War |
| Videos |
|---|
| 李白玉博士开讲关于同态加密的安全性 |
Mina Documentation
An Intensive Introduction to Cryptography
Introduction to Theoretical Computer Science
https://crypto.iacr.org/2021/program.php
A Deep Dive into End-to-End Encryption

往期周刊回顾:
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问