Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

eprint.iacr.org

Cryptology ePrint Archive

Get the latest updates from Cryptology ePrint Archive directly as they happen.

Follow now 40 followers

Latest posts

Last updated about 12 hours ago

Fast Enhanced Private Set Union in the Balanced and Unbalanced Scenarios

1 day ago

Private set union (PSU) allows two parties to compute the union of...

Repeated Agreement is Cheap! On Weak Accountability and Multishot Byzantine Agreement

1 day ago

Byzantine Agreement (BA) allows $n$ processes to propose input values to reach...

High-Performance FPGA Implementations of Lightweight ASCON-128 and ASCON-128a with Enhanced Throughput-to-Area Efficiency

2 days ago

The ASCON algorithm was chosen for its efficiency and suitability for resource-constrained...

A Specification of an Anonymous Credential System Using BBS+ Signatures with Privacy-Preserving Revocation and Device Binding

2 days ago

Recently, there has been a growing interest in anonymous credentials (ACs) as...

Sampling Arbitrary Discrete Distributions for RV Commitment Schemes Using the Trimmed-Tree Knuth-Yao Algorithm

2 days ago

Sampling from non-uniform randomness according to an algorithm which keeps the internal...

Generalization of semi-regular sequences: Maximal Gröbner basis degree, variants of genericness, and related conjectures

2 days ago

Nowadays, the notion of semi-regular sequences, originally proposed by Fröberg, becomes very...

Multi-Client Attribute-Based and Predicate Encryption, Revisited

2 days ago

Multi-client Attribute-Based Encryption (ABE) is a generalization of key-policy ABE where attributes...

One Bit to Rule Them All – Imperfect Randomness Harms Lattice Signatures

2 days ago

The Fiat-Shamir transform is one of the most widely applied methods for...

SoK: Dlog-based Distributed Key Generation

3 days ago

Distributed Key Generation (DKG) protocols are fundamental components of threshold cryptography, enabling...

An Attack on TON’s ADNL Secure Channel Protocol

3 days ago

We present an attack on the Abstract Datagram Network Layer (ADNL) protocol...

Relating Definitions of Computational Differential Privacy in Wider Parameter Regimes

3 days ago

The literature on computational differential privacy (CDP) has focused almost exclusively on...

Randomized vs. Deterministic? Practical Randomized Synchronous BFT in Expected Constant Time

3 days ago

Most practical synchronous Byzantine fault-tolerant (BFT) protocols, such as Sync HotStuff (S&P...