1Papers
Mt. Random: Multi-Tiered Randomness Beacons
- https://eprint.iacr.org/2021/1096.pdf
On Actively Secure Fine-grained Access Structures from Isogeny Assumptions
- https://eprint.iacr.org/2021/1109.pdf
CHES 2021
https://ches.iacr.org/2021/program.php
- NTT Multiplication for NTT-unfriendly Rings
- Compact Dilithium Implementations on Cortex-M3 and Cortex-M4
- Polynomial Multiplication in NTRU Prime
- A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA
- CTIDH: faster constant-time CSIDH
- Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
- ROTed: Random Oblivious Transfer for embedded devices
- Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries
- Concrete quantum cryptanalysis of binary elliptic curves
- Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
- Masking Kyber: First- and Higher-Order Implementations
Latincrypt 2021
https://www.urosario.edu.co/Eventos-UR/DR2/Latin-Crypt/Documentos/Latincrypt_program.pdf
October 6-8, 2021
- Luca De Feo, ¿What's next for isogeny based cryptography?
- Shweta Agrawal, Recent Progress and Challenges in Lattice Based Cryptography
- Dan Boneh, Recent Developments in Cryptography
- Tight Bounds for Simon's Algorithm
- Constructions for Quantum Indistinguishability Obfuscation
- Post-Quantum Key-Blinding for Authentication in Anonymity Networks
- Implementing and measuring KEMTLS
- A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates
- Attribute-Based Access Control for Inner Product Functional Encryption from LWE
- Improved attacks against key reuse in learning with errors key exchange
- Weight-Based Nakamoto-Style Blockchains
- Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
- Improved Threshold Signatures, Proactive Secret Sharing and Input Certification from LSS Homomorphisms
Eurocrypt 21 Zero Knowledge session
- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers
- Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
- Towards Accountability in CRS Generation
| Videos |
|---|
| From STARK to StarkWare: the winding path from Theory to Practice |
| Turing Lecture 2021: Abstractions, Their Algorithms, and Their Compilers |
| The Universe is Hostile to Computers |
| Scaling Ethereum with Polygon - Polygon Primer Workshop 01 |
The Value of Errors in Proofs – a fascinating journey from Turing’s seminal 1936 R ≠ RE to the 2020 breakthrough of MIP = RE*
- https://www.matrix-inst.org.au/events/online-seminar-september-2021-professor-avi-widgerson/
- https://www.urosario.edu.co/ascrypto/home/
- a cryptography summer school
https://github.com/nalinbhardwaj/wordlines
- Mobile ZK Puzzle Game with NFT rewards
Cryptographic Frontier 2021: Open Problems in Ethereum Research
- https://sites.google.com/view/cryptofrontier21

往期周刊回顾:
Kurt Pan 密码周刊 (34)
Kurt Pan 密码周刊 (33)
Kurt Pan 密码周刊 (32)
Kurt Pan 密码周刊 (31)
Kurt Pan 密码周刊往期回顾 (20-30)
Kurt Pan 密码周刊往期回顾(11-20)
Kurt Pan 密码周刊往期回顾 (1-10)
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问