Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

eprint.iacr.org

Cryptology ePrint Archive

Get the latest updates from Cryptology ePrint Archive directly as they happen.

Follow now 40 followers

Latest posts

Last updated 33 minutes ago

MT-TMVP: Modular Tiled TMVP-based Polynomial Multiplication for Post-Quantum Cryptography on FPGAs

about 4 hours ago

As quantum technology advances, developing cryptographic solutions resistant to quantum attacks is...

Using the Schur Product to Solve the Code Equivalence Problem

about 5 hours ago

Given two linear codes, the Code Equivalence Problem asks to find (if...

Leader Election with Poly-logarithmic Communication Per Party

about 6 hours ago

The leader election problem requires a set of $n$ parties, out of...

Zero-Knowledge Polynomial Commitment in Binary Fields

about 7 hours ago

In recent work, Diamond and Posen ('24) introduce a polynomial commitment scheme...

How to Make Any Computational Secret Sharing Scheme Adaptively Secure

about 9 hours ago

Secret sharing (SS) is a foundational cryptographic primitive with diverse applications, including...

Silentium: Implementation of a Pseudorandom Correlation Generator for Beaver Triples

1 day ago

Secure Multi-Party Computation is a privacy-enhancing technology that allows several parties to...

Nearly Optimal Parallel Broadcast in the Plain Public Key Model

1 day ago

Parallel Byzantine broadcast (PBC) (also known as Interactive Consistency), is a fundamental...

Adaptive TDFs from Injective TDFs

1 day ago

Adaptive trapdoor functions (ATDFs) and tag-based ATDFs (TB-ATDFs) are variants of trapdoor...

UPKE and UKEM Schemes from Supersingular Isogenies

2 days ago

Forward-secure public key encryption (FS-PKE) is a key-evolving public-key paradigm that ensures...

Adaptively Secure Three-Round Threshold Schnorr Signatures from DDH

2 days ago

Threshold signatures are one of the most important cryptographic primitives in distributed...

Reviving a Grover based Quantum Secret Sharing Scheme

2 days ago

Secret-sharing schemes allow a dealer to split a secret into multiple “shares”...

Scalable Multiparty Computation from Non-linear Secret Sharing

2 days ago

A long line of work has investigated the design of scalable secure...