- https://rwc.iacr.org/2024/program.php
- https://fse.iacr.org/2024/program.php
ZK & FHE
- Do Not Trust Anybody: ZK Proofs for Image Transformations Tile by Tile on Your Laptop
- How can cryptography help with AI regulation compliance?
- Towards robust FHE for the real world
- Advanced FHE Protocols for the Blockchain
Credentials
- Key transparency: introduction, recent results, and open problems
- zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
Verifying Implementations
- Verifiable Verification in Cryptographic Protocols
- Weak Fiat-Shamir attacks on modern proof systems
Post-quantum implementations
- RISC-V Cryptography Evolution: High Assurance and Post-Quantum Cryptography
- LaZer: a Lattice Library for Zero-Knowledge and Succinct Proofs
- Swoosh: Efficient Lattice-Based Non-Interactive Key Exchange
Arithmetization-Oriented Ciphers
- Solving Degree Bounds for Iterated Polynomial Systems
- Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives
- Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives
Each hyperlink points directly to the slides.
Click to 「阅读原文」👇