1Posts & Books
- Sizing Up Post-Quantum Signatures
- Applied Cryptography Knowledge Area Version 1.0.0
- Threshold Digital Signatures
- Benchmarking symmetric encryption (AEAD) in Rust
- Privacy Preserving Machine Learning: Maintaining confidentiality and preserving trust
- WhatsApp End-to-End Encrypted Backups Security Assessment
- Fully Confidential Ethereum Transactions: Aztec Network’s Privacy Architecture
- Without quantum security, our blockchain future is uncertain
- SuperSolver - accelerating the Delfs-Galbraith algorithm with fast subfield root detection
- The best comparison on zkRollups today
- Polygon Unveils Miden, an Advanced zk-STARKs - based Scaling Solution
- Be the First to Build a Snapp at the Snapps Developer Workshop and Bootcamp: Learn how to build a Mina Snapp in the upcoming Snapps Developer Workshop and Bootcamp from December 7-12
2Videos & Podcasts
- Zero Knowledge Proof (with Avi Wigderson)
- INDIVIDUALIZED CYBERSECURITY RESEARCH MENTORING (IMENTOR) WORKSHOP 2021
- ZKStudyClub: Eclipse and Lunar with Matteo Campanelli
- ZK HACK #4 - Ferveo and Plonkup Workshop by Anoma
- Episode 206: Distilling DeFi Primitives with Guillermo, Alex and Tarun
3Projects & Docs
- ethers.rs: Complete Ethereum and Celo wallet implementation and utilities in Rust
- ArgentX: browser extension for StarkNet
- Metaverse Quantum: a Defi utility token cryptocurrency, digital currency created on the Ethereum blockchain
- Polygon Miden: A STARK-based virtual machine.
4Papers & Conferences
ACM CCS 2021 Best Paper Awards
Mitaka: a simpler, parallelizable, maskable variant of Falcon
SuperSolver: accelerating the Delfs-Galbraith algorithm with fast subfield root detection
Estimating the Effectiveness of Lattice Attacks
The Hidden Lattice Problem
SoK: Password-Authenticated Key Exchange -- Theory, Practice, Standardization and Real-World Lessons
Verifiable Obtained Random Subsets for Improving SPHINCS+
Security Analysis Of DGM and GM Group Signature Schemes Instantiated With XMSS-T
GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme
Rectangular, Range, and Restricted AONTs: Three Generalizations of All-or-Nothing Transforms
Improved Lattice-Based Mix-Nets for Electronic Voting
Relations between Privacy, Verifiability, Accountability and Coercion-Resistance in Voting Protocols
Interaction-Preserving Compilers for Secure Computation
CCA Secure A Posteriori Openable Encryption in the Standard Model
EVA Improved: Compiler and Extension Library for CKKS
SoK: Cryptographic Confidentiality of Data on Mobile Devices
Constructive Separations and Their Consequences
The Computational Lens : Coming Spring 2022
往期周刊回顾:
Kurt Pan 密码周刊 (45)
Kurt Pan 密码周刊 (44)
Kurt Pan 密码周刊 (43)
Kurt Pan 密码周刊 (42)
Kurt Pan 密码周刊 (41)
Kurt Pan 密码周刊往期回顾 (31-40)
Kurt Pan 密码周刊往期回顾 (20-30)
Kurt Pan 密码周刊往期回顾(11-20)
Kurt Pan 密码周刊往期回顾 (1-10)
为了方便电脑用户,以及更开放的互联网访问,周刊内容会同步发布在Gitbook。
点击【阅读原文】👇可访问