Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.
Get Feedereprint.iacr.org
Get the latest updates from Cryptology ePrint Archive directly as they happen.
Follow now 40 followers
Last updated 33 minutes ago
about 4 hours ago
As quantum technology advances, developing cryptographic solutions resistant to quantum attacks is...
about 5 hours ago
Given two linear codes, the Code Equivalence Problem asks to find (if...
about 6 hours ago
The leader election problem requires a set of $n$ parties, out of...
about 7 hours ago
In recent work, Diamond and Posen ('24) introduce a polynomial commitment scheme...
about 9 hours ago
Secret sharing (SS) is a foundational cryptographic primitive with diverse applications, including...
1 day ago
Secure Multi-Party Computation is a privacy-enhancing technology that allows several parties to...
1 day ago
Parallel Byzantine broadcast (PBC) (also known as Interactive Consistency), is a fundamental...
1 day ago
Adaptive trapdoor functions (ATDFs) and tag-based ATDFs (TB-ATDFs) are variants of trapdoor...
2 days ago
Forward-secure public key encryption (FS-PKE) is a key-evolving public-key paradigm that ensures...
2 days ago
Threshold signatures are one of the most important cryptographic primitives in distributed...
2 days ago
Secret-sharing schemes allow a dealer to split a secret into multiple “shares”...
2 days ago
A long line of work has investigated the design of scalable secure...