1Posts
- BLS12-381 For The Rest Of Us
- Quantum Cyberattacks Are Coming. This Math Can Stop Them
- FRI with Bootleproof-IPA Verkle Trees for “non-native” arithmetic and shrinking reference string size
- Complex systems theory & anarchism
2Videos & Podcasts
- ZK HACK #1 - How to Make SNARKs by Alessandro Chiesa
- ZK HACK #1 - SNARKs from Hash Functions by Nick Spooner
- ZK HACK #1 - zkSNARKs from Polynomial Commitments by Pratyush Mishra
- ZK HACK #1 - Introduction to Domain Specific Languages (DSLs) by Alex Ozdemir
- Alex Ozdemir - The Taxonomy of Circuit Languages
- MPC and DAGs with Aleph Zero’s Adam Gagol & Matthew Niemerg
- In Mathematics We Trust By Eli Ben-Sasson
3Projects & Docs
- Introduction to arkworks algebra APIs
4Papers
- Leaking Arbitrarily Many Secrets: Any-out-of-Many Proofs and Applications to RingCT Protocols
- A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs
- Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming
- A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup
- Three Attacks on Proof-of-Stake Ethereum
- A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers
- How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption
- With a Little Help from My Friends: Constructing Practical Anonymous Credentials
- Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees
- PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions
- On Unpadded NTRU Quantum (In)Security
- Public-Key Quantum Money with a Classical Bank
- Non-randomness of S-unit lattices
- Improved Zero-Knowledge Argument of Encrypted Extended Permutation
- Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption
- Wavelet: Code-based postquantum signatures with fast verification on microcontrollers
- Oblivious Transfer from Trapdoor Permutations in Minimal Rounds
- Efficient Representation of Numerical Optimization Problems for SNARKs
- Incremental Offline/Online PIR
- Improved Circuit-based PSI via Equality Preserving Compression
- Invalidity of the Agr17 Functional Encryption Scheme
- Unifying Compilers for SNARKs, SMT, and More
- A verified algebraic representation of Cairo program execution
- Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation
- Batch point compression in the context of advanced pairing-based protocols
- Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
往期周刊回顾:
Kurt Pan 密码周刊 (42)
Kurt Pan 密码周刊 (41)
Kurt Pan 密码周刊往期回顾 (31-40)
Kurt Pan 密码周刊往期回顾 (20-30)
Kurt Pan 密码周刊往期回顾(11-20)
Kurt Pan 密码周刊往期回顾 (1-10)
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问