Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

eprint.iacr.org

Cryptology ePrint Archive

Get the latest updates from Cryptology ePrint Archive directly as they happen.

Follow now 40 followers

Latest posts

Last updated about 1 hour ago

Putting Sybils on a Diet: Securing Distributed Hash Tables using Proofs of Space

about 23 hours ago

Distributed Hash Tables (DHTs) are peer-to-peer protocols that serve as building blocks...

Universally Composable On-Chain Quadratic Voting for Liquid Democracy

about 23 hours ago

Decentralized governance plays a critical role in blockchain communities, allowing stakeholders to...

Optimizing Key Recovery in Classic McEliece: Advanced Error Correction for Noisy Side-Channel Measurements

1 day ago

Classic McEliece is one of the code-based Key Encapsulation Mechanism finalists in...

POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics

1 day ago

Many user-centric applications face a common privacy problem: the need to collect...

Comparing classical and quantum conditional disclosure of secrets

1 day ago

The conditional disclosure of secrets (CDS) setting is among the most basic...

Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY

1 day ago

Masking is one of the most prevalent and investigated countermeasures against side-channel...

CRAFT: Characterizing and Root-Causing Fault Injection Threats at Pre-Silicon

1 day ago

Fault injection attacks represent a class of threats that can compromise embedded...

WEBCAT: Web-based Code Assurance and Transparency

2 days ago

Ensuring code integrity in browser-based applications remains a longstanding challenge exacerbated by...

Unified MEDS Accelerator

2 days ago

The Matrix Equivalence Digital Signature (MEDS) scheme a code-based candidate in the...

Efficient Noncommutative KEMs from Twisted Dihedral Group Ring

2 days ago

NTRU schemes have been extensively studied as post-quantum proposals within the category...

Formal Analysis of Multi-Device Group Messaging in WhatsApp

2 days ago

WhatsApp provides end-to-end encrypted messaging to over two billion users. However, due...

Solving systems of polynomial equations via Macaulay matrices

2 days ago

One approach to solving polynomial systems is to multiply each equation by...