About the Cryptography category
|
|
0
|
2395
|
April 28, 2019
|
DSM: Decentralized State Machine - Solving the "Double Spend Problem" without the need for global consensus, unlocking a new paradigm
|
|
16
|
375
|
May 15, 2025
|
Lattice-based signature aggregation
|
|
2
|
736
|
May 12, 2025
|
So you wanna Post-Quantum Ethereum transaction signature
|
|
25
|
1733
|
April 12, 2025
|
Transpiling a Halo2 circuit into CCS
|
|
0
|
206
|
March 16, 2025
|
The road to Post-Quantum Ethereum transaction is paved with Account Abstraction (AA)
|
|
1
|
692
|
February 24, 2025
|
Web2 Nullifiers using vOPRF
|
|
3
|
246
|
February 20, 2025
|
Key Management for Autonomous AI Agents with Crypto Wallets
|
|
4
|
952
|
February 16, 2025
|
Hedged Signatures FTW
|
|
2
|
310
|
February 16, 2025
|
Proof of Validator: A simple anonymous credential scheme for Ethereum's DHT
|
|
9
|
4137
|
February 6, 2025
|
Falcon as an Ethereum Transaction Signature: The Good, the Bad, and the Gnarly
|
|
9
|
617
|
January 30, 2025
|
Releasing Constantine v0.2.0 (Jan 2025), a modular cryptography stack for Ethereum
|
|
1
|
3080
|
January 28, 2025
|
Poqeth: Efficient, post-quantum signature verification on Ethereum
|
|
0
|
253
|
January 22, 2025
|
Simple guide to fast linear combinations (aka multiexponentiations)
|
|
1
|
8145
|
March 8, 2022
|
Security of BLS batch verification
|
|
9
|
5946
|
January 10, 2025
|
STARK Round By Round Soundness and Security in Random Oracle Model
|
|
3
|
3512
|
January 9, 2025
|
On the gas efficiency of the WHIR polynomial commitment scheme
|
|
4
|
520
|
December 20, 2024
|
Perfect Mathematical Composability - Theorem-Like Primitives
|
|
1
|
207
|
December 7, 2024
|
The return of Torus Based Cryptography: Whisk and Curdleproof in the target group
|
|
3
|
3401
|
December 1, 2024
|
How obfuscation can help Ethereum
|
|
11
|
5839
|
November 20, 2024
|
ZKMPC: Publicly Auditable MPC for general-purpose computations
|
|
0
|
321
|
November 11, 2024
|
Curvy Protocol - Dual Key Stealth Address Protocol based on Elliptic Curve Pairing
|
|
0
|
200
|
October 30, 2024
|
Comparing Two Hash Functions for Multi-Party Computation and Zero-Knowledge
|
|
0
|
212
|
October 15, 2024
|
Attestation Verification Optimization
|
|
1
|
429
|
October 1, 2024
|
Do not add bls12 precompile, implement Pasta curves w/o trusted setup instead
|
|
26
|
7349
|
September 20, 2024
|
A Threshold Network for “Human Keys” to solve privacy and custody issues
|
|
2
|
718
|
August 19, 2024
|
MACI with mostly-off-chain "happy path"
|
|
13
|
6547
|
July 20, 2024
|
SGX as 2FA for FHE/MPC
|
|
0
|
2196
|
June 11, 2024
|
An RSA Deterministic Key Generation Scheme: Algorithm and Security Analysis
|
|
0
|
2087
|
June 5, 2024
|
Practical, Trustless, Bitcoin Bridge
|
|
3
|
3829
|
June 3, 2024
|