|
About the Cryptography category
|
|
0
|
2427
|
April 28, 2019
|
|
Hybrid Encrypted Mempools
|
|
0
|
308
|
October 27, 2025
|
|
Removing Pairing, Bulletproofs, or ZKP from Range Proof of Pedersen Commitment
|
|
0
|
255
|
October 9, 2025
|
|
The road to Post-Quantum Ethereum transaction is paved with Account Abstraction (AA)
|
|
3
|
1259
|
October 4, 2025
|
|
Ethereum Validator Key Management via DDH-Based Exponent Verifiable Random Functions (eVRF)
|
|
0
|
194
|
August 21, 2025
|
|
Lattice-based signature aggregation
|
|
3
|
1586
|
August 14, 2025
|
|
HD Wallet for Lattice Cryptography
|
|
1
|
251
|
August 12, 2025
|
|
VRFs and Single Secret Leader Election
|
|
4
|
260
|
July 23, 2025
|
|
Simple guide to fast linear combinations (aka multiexponentiations)
|
|
2
|
8338
|
July 21, 2025
|
|
Were MPTs ever the best choice?
|
|
6
|
237
|
July 12, 2025
|
|
Unpredictable RANDAO
|
|
6
|
886
|
June 27, 2025
|
|
Cross-curve public key correlation proof
|
|
2
|
148
|
June 18, 2025
|
|
So you wanna Post-Quantum Ethereum transaction signature
|
|
25
|
2323
|
April 12, 2025
|
|
Transpiling a Halo2 circuit into CCS
|
|
0
|
299
|
March 16, 2025
|
|
Web2 Nullifiers using vOPRF
|
|
3
|
370
|
February 20, 2025
|
|
Key Management for Autonomous AI Agents with Crypto Wallets
|
|
4
|
1306
|
February 16, 2025
|
|
Hedged Signatures FTW
|
|
2
|
363
|
February 16, 2025
|
|
Proof of Validator: A simple anonymous credential scheme for Ethereum's DHT
|
|
9
|
4320
|
February 6, 2025
|
|
Falcon as an Ethereum Transaction Signature: The Good, the Bad, and the Gnarly
|
|
9
|
1075
|
January 30, 2025
|
|
Releasing Constantine v0.2.0 (Jan 2025), a modular cryptography stack for Ethereum
|
|
1
|
3187
|
January 28, 2025
|
|
Poqeth: Efficient, post-quantum signature verification on Ethereum
|
|
0
|
413
|
January 22, 2025
|
|
Security of BLS batch verification
|
|
9
|
6157
|
January 10, 2025
|
|
STARK Round By Round Soundness and Security in Random Oracle Model
|
|
3
|
3585
|
January 9, 2025
|
|
On the gas efficiency of the WHIR polynomial commitment scheme
|
|
4
|
755
|
December 20, 2024
|
|
Perfect Mathematical Composability - Theorem-Like Primitives
|
|
1
|
255
|
December 7, 2024
|
|
The return of Torus Based Cryptography: Whisk and Curdleproof in the target group
|
|
3
|
3489
|
December 1, 2024
|
|
How obfuscation can help Ethereum
|
|
11
|
5989
|
November 20, 2024
|
|
ZKMPC: Publicly Auditable MPC for general-purpose computations
|
|
0
|
437
|
November 11, 2024
|
|
Curvy Protocol - Dual Key Stealth Address Protocol based on Elliptic Curve Pairing
|
|
0
|
248
|
October 30, 2024
|
|
Comparing Two Hash Functions for Multi-Party Computation and Zero-Knowledge
|
|
0
|
281
|
October 15, 2024
|