Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

eprint.iacr.org

Cryptology ePrint Archive

Get the latest updates from Cryptology ePrint Archive directly as they happen.

Follow now 40 followers

Latest posts

Last updated about 3 hours ago

Efficient Fuzzy Labeled PSI from Vector Ring-OLE

about 9 hours ago

Fuzzy-labeled private set intersection (PSI) outputs the corresponding label if there is...

Sample Efficient Search to Decision for $k$LIN

about 17 hours ago

The $k$LIN problem concerns solving noisy systems of random sparse linear equations...

Privacy-Preserving Machine Learning on Web Browsing for Public Opinion

about 24 hours ago

We present a real-world deployment of secure multiparty computation to predict political...

Optimized HPPK Cryptography for Post-Quantum Security

1 day ago

In this paper, we present an optimized construction of the Homomorphic Polynomial...

Revisiting Adaptively Secure IBE from Lattices with Smaller Modulus: A Conceptually Simple Framework with Low Overhead

1 day ago

Most adaptively secure identity-based encryption (IBE) constructions from lattices in the standard...

CoRReCt: Compute, Record, Replay, Compare to Secure Computations on Untrusted Systems

1 day ago

If the system of an honest user is corrupted, all of its...

Rumors MPC: GOD for Dynamic Committees Low Communication via Constant-Round Chat

1 day ago

Constructing MPC with ephemeral committees has gained a lot of attention since...

Leakage-Resilient Circuits against NC1, Revisited

1 day ago

In this study, we revisit leakage-resilient circuits (LRCs) against NC1-leakage and propose...

Large smooth twins from short lattice vectors

1 day ago

Finding the largest pair of consecutive $B$-smooth integers is computationally challenging. Current...

Hard Instances of Discrete Logarithm Problem and Cryptographic Applications

1 day ago

Let f be an arbitrary positive integer valued function. The goal of...

A Performance Comparison of the Homomorphic Encryption Schemes CKKS and TFHE

1 day ago

Homomorphic encryption (HE) is a promising technique for privacy-preserving data analysis. Several...

Not in The Prophecies: Practical Attacks on Nostr

1 day ago

Distributed social networking services (SNSs) recently received significant attention as an alternative...