cover_image

Kurt Pan 密码周刊 (32)

Kurt Pan XPTY
2021年08月13日 00:01

1Papers

  • Polynomial Representation Is Tricky: Maliciously Secure Private Set Intersection Revisited

    • https://eprint.iacr.org/2021/1009.pdf
  • A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    • https://eprint.iacr.org/2021/1012.pdf
  • Iterative Oblivious Pseudo-Random Functions and Applications

    • https://eprint.iacr.org/2021/1013.pdf
  • Quantum collision finding for homomorphic hash functions

    • https://eprint.iacr.org/2021/1016.pdf
  • Obfustopia Built on Secret-Key Functional Encryption

    • https://eprint.iacr.org/2021/1018.pdf
  • Implementing and Measuring KEMTLS

    • https://eprint.iacr.org/2021/1019.pdf
  • Designing a Practical Code-based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup

    • https://eprint.iacr.org/2021/1020.pdf
  • Zero-Knowledge Middleboxes

    • https://eprint.iacr.org/2021/1022.pdf
  • SIDH Proof of Knowledge

    • https://eprint.iacr.org/2021/1023.pdf
  • Efficient Information-Theoretic Multi-Party Computation over Non-Commutative Rings

    • https://eprint.iacr.org/2021/1025.pdf
  • On the Hardness of Ring/Module/Polynomial LWR Problems

    • https://eprint.iacr.org/2021/1026.pdf
  • On Fingerprinting Attacks and Length-Hiding Encryption

    • https://eprint.iacr.org/2021/1027.pdf
  • LOVE a pairing

    • https://eprint.iacr.org/2021/1029.pdf
  • On the Origin of Quantum Uncertainty

    • https://arxiv.org/pdf/2005.07325.pdf

Inscrypt 2021

https://cst.qd.sdu.edu.cn/inscrypt_2021/index.htm

  • Authenticated Key Exchange: Tight Security & Explicit Authentication

  • Secure Computation as a Societal Tool: Promise, Hurdles, and Dangers

  • A Survey on Two-Round MPC

  • Towards and Open Approach to Leakage-Resistant Authenticated Encryption

  • Concurrent Signatures from a Variety of Keys

  • A Generic Construction of Fuzzy Signature

  • An Identity based Linkable Ring Signature with Logarithmic Size

  • Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T

  • Fully Secure Lattice-based ABE from Noisy Linear Functional Encryption

  • Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices

  • Homomorphic Modular Reduction and Improved Bootstrapping for BGV Scheme

  • A Simple Post-Quantum Non-Interactive Zero-Knowledge Proof from Garbled Circuits

  • Improved Zero-Knowledge Argument of Encrypted Extended Permutation

USENIX Security '21

https://www.usenix.org/conference/usenixsecurity21/technical-sessions

  • Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
  • Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption
  • Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
  • Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
  • Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code
  • Protecting Cryptography Against Compelled Self-Incrimination
  • Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation
  • Pretty Good Phone Privacy
  • KeyForge: Non-Attributable Email from Forward-Forgeable Signatures
  • The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter
  • ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
  • Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security
  • How Great is the Great Firewall? Measuring China's DNS Censorship
  • Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context

Posts
苹果扫描iPhone所有照片,发现问题还要报警:全新「保护」计划惹众怒
Cairo 语言介绍
元宇宙「只不过」是对数字空间的一次升级
Mina背后的理想乡:递归零知识证明
zkEVM - Hermez设计思路
如果我们这样看一个NFT
DGHV:整数上的同态加密(2)
吴文俊:开创中国特有的数学道路
侧链与L2之间如何相互转账?一文了解StarkWare的无需信任转账方案
How do Mina nodes communicate?
The Art of Dark Forest War
Videos
李白玉博士开讲关于同态加密的安全性
  • Mina Documentation

    • https://docs.minaprotocol.com/en
  • An Intensive Introduction to Cryptography

    • Boaz Barak
    • https://intensecrypto.org/public/index.html
  • Introduction to Theoretical Computer Science

    • Boaz Barak
    • https://introtcs.org/public/index.html
  • https://crypto.iacr.org/2021/program.php

  • A Deep Dive into End-to-End Encryption

    • https://wisporg.app.neoncrm.com/np/clients/wisporg/event.jsp?event=5&
    • August 19, 2021 10:30am - 11:30am  PDT




往期周刊回顾:

Kurt Pan 密码周刊 (31)

Kurt Pan 密码周刊往期回顾 (20-30)

Kurt Pan 密码周刊往期回顾(11-20)

Kurt Pan 密码周刊往期回顾 (1-10)



为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。

点击【阅读原文】👇可访问