About the Cryptography category
|
|
0
|
2406
|
April 28, 2019
|
DSM: Decentralized State Machine - Solving the "Double Spend Problem" without the need for global consensus, unlocking a new paradigm
|
|
20
|
629
|
June 29, 2025
|
Unpredictable RANDAO
|
|
6
|
488
|
June 27, 2025
|
Cross-curve public key correlation proof
|
|
2
|
82
|
June 18, 2025
|
Lattice-based signature aggregation
|
|
2
|
1000
|
May 12, 2025
|
So you wanna Post-Quantum Ethereum transaction signature
|
|
25
|
1874
|
April 12, 2025
|
Transpiling a Halo2 circuit into CCS
|
|
0
|
221
|
March 16, 2025
|
The road to Post-Quantum Ethereum transaction is paved with Account Abstraction (AA)
|
|
1
|
827
|
February 24, 2025
|
Web2 Nullifiers using vOPRF
|
|
3
|
276
|
February 20, 2025
|
Key Management for Autonomous AI Agents with Crypto Wallets
|
|
4
|
1016
|
February 16, 2025
|
Hedged Signatures FTW
|
|
2
|
325
|
February 16, 2025
|
Proof of Validator: A simple anonymous credential scheme for Ethereum's DHT
|
|
9
|
4190
|
February 6, 2025
|
Falcon as an Ethereum Transaction Signature: The Good, the Bad, and the Gnarly
|
|
9
|
719
|
January 30, 2025
|
Releasing Constantine v0.2.0 (Jan 2025), a modular cryptography stack for Ethereum
|
|
1
|
3115
|
January 28, 2025
|
Poqeth: Efficient, post-quantum signature verification on Ethereum
|
|
0
|
292
|
January 22, 2025
|
Simple guide to fast linear combinations (aka multiexponentiations)
|
|
1
|
8179
|
March 8, 2022
|
Security of BLS batch verification
|
|
9
|
6007
|
January 10, 2025
|
STARK Round By Round Soundness and Security in Random Oracle Model
|
|
3
|
3535
|
January 9, 2025
|
On the gas efficiency of the WHIR polynomial commitment scheme
|
|
4
|
562
|
December 20, 2024
|
Perfect Mathematical Composability - Theorem-Like Primitives
|
|
1
|
221
|
December 7, 2024
|
The return of Torus Based Cryptography: Whisk and Curdleproof in the target group
|
|
3
|
3428
|
December 1, 2024
|
How obfuscation can help Ethereum
|
|
11
|
5899
|
November 20, 2024
|
ZKMPC: Publicly Auditable MPC for general-purpose computations
|
|
0
|
357
|
November 11, 2024
|
Curvy Protocol - Dual Key Stealth Address Protocol based on Elliptic Curve Pairing
|
|
0
|
213
|
October 30, 2024
|
Comparing Two Hash Functions for Multi-Party Computation and Zero-Knowledge
|
|
0
|
230
|
October 15, 2024
|
Attestation Verification Optimization
|
|
1
|
440
|
October 1, 2024
|
Do not add bls12 precompile, implement Pasta curves w/o trusted setup instead
|
|
26
|
7418
|
September 20, 2024
|
A Threshold Network for “Human Keys” to solve privacy and custody issues
|
|
2
|
779
|
August 19, 2024
|
MACI with mostly-off-chain "happy path"
|
|
13
|
6579
|
July 20, 2024
|
SGX as 2FA for FHE/MPC
|
|
0
|
2224
|
June 11, 2024
|