About the Cryptography category
|
|
0
|
2397
|
April 28, 2019
|
DSM: Decentralized State Machine - Solving the "Double Spend Problem" without the need for global consensus, unlocking a new paradigm
|
|
16
|
392
|
May 15, 2025
|
Lattice-based signature aggregation
|
|
2
|
767
|
May 12, 2025
|
So you wanna Post-Quantum Ethereum transaction signature
|
|
25
|
1751
|
April 12, 2025
|
Transpiling a Halo2 circuit into CCS
|
|
0
|
207
|
March 16, 2025
|
The road to Post-Quantum Ethereum transaction is paved with Account Abstraction (AA)
|
|
1
|
701
|
February 24, 2025
|
Web2 Nullifiers using vOPRF
|
|
3
|
250
|
February 20, 2025
|
Key Management for Autonomous AI Agents with Crypto Wallets
|
|
4
|
957
|
February 16, 2025
|
Hedged Signatures FTW
|
|
2
|
314
|
February 16, 2025
|
Proof of Validator: A simple anonymous credential scheme for Ethereum's DHT
|
|
9
|
4139
|
February 6, 2025
|
Falcon as an Ethereum Transaction Signature: The Good, the Bad, and the Gnarly
|
|
9
|
623
|
January 30, 2025
|
Releasing Constantine v0.2.0 (Jan 2025), a modular cryptography stack for Ethereum
|
|
1
|
3083
|
January 28, 2025
|
Poqeth: Efficient, post-quantum signature verification on Ethereum
|
|
0
|
258
|
January 22, 2025
|
Simple guide to fast linear combinations (aka multiexponentiations)
|
|
1
|
8150
|
March 8, 2022
|
Security of BLS batch verification
|
|
9
|
5956
|
January 10, 2025
|
STARK Round By Round Soundness and Security in Random Oracle Model
|
|
3
|
3518
|
January 9, 2025
|
On the gas efficiency of the WHIR polynomial commitment scheme
|
|
4
|
525
|
December 20, 2024
|
Perfect Mathematical Composability - Theorem-Like Primitives
|
|
1
|
210
|
December 7, 2024
|
The return of Torus Based Cryptography: Whisk and Curdleproof in the target group
|
|
3
|
3407
|
December 1, 2024
|
How obfuscation can help Ethereum
|
|
11
|
5843
|
November 20, 2024
|
ZKMPC: Publicly Auditable MPC for general-purpose computations
|
|
0
|
326
|
November 11, 2024
|
Curvy Protocol - Dual Key Stealth Address Protocol based on Elliptic Curve Pairing
|
|
0
|
202
|
October 30, 2024
|
Comparing Two Hash Functions for Multi-Party Computation and Zero-Knowledge
|
|
0
|
216
|
October 15, 2024
|
Attestation Verification Optimization
|
|
1
|
430
|
October 1, 2024
|
Do not add bls12 precompile, implement Pasta curves w/o trusted setup instead
|
|
26
|
7351
|
September 20, 2024
|
A Threshold Network for “Human Keys” to solve privacy and custody issues
|
|
2
|
724
|
August 19, 2024
|
MACI with mostly-off-chain "happy path"
|
|
13
|
6549
|
July 20, 2024
|
SGX as 2FA for FHE/MPC
|
|
0
|
2197
|
June 11, 2024
|
An RSA Deterministic Key Generation Scheme: Algorithm and Security Analysis
|
|
0
|
2090
|
June 5, 2024
|
Practical, Trustless, Bitcoin Bridge
|
|
3
|
3831
|
June 3, 2024
|