About the Cryptography category
|
|
0
|
1507
|
April 28, 2019
|
RFC: Hierarchical Deterministic Wallet Derivation Function
|
|
3
|
592
|
May 22, 2023
|
Towards practical post quantum stealth addresses
|
|
3
|
889
|
April 28, 2023
|
Decentralized MEV Relays: Enhancing security with Zero-Knowledge Proofs
|
|
2
|
615
|
April 25, 2023
|
Cryptographic canaries and backups
|
|
5
|
3636
|
April 15, 2023
|
Cryptographic Obfuscation for Smart Contracts: Trustless Bitcoin Bridge and More
|
|
0
|
1388
|
March 27, 2023
|
Subgroup membership testing on elliptic curves via the Tate pairing
|
|
1
|
1049
|
February 5, 2023
|
Do not add bls12 precompile, implement Pasta curves w/o trusted setup instead
|
|
24
|
4199
|
February 2, 2023
|
Pairing-based polynomial commitment scheme without a trusted setup
|
|
3
|
699
|
January 27, 2023
|
Generalized Low Degree Check for Degree < 2^l with Application to FRI
|
|
0
|
560
|
January 25, 2023
|
Default post-quantum signature scheme?
|
|
9
|
4286
|
January 23, 2023
|
A hybrid post-quantum digital signature scheme for the EVM
|
|
1
|
2443
|
July 7, 2022
|
How obfuscation can help Ethereum
|
|
10
|
4254
|
January 13, 2023
|
Use RSA accumulator without making public the set members
|
|
0
|
679
|
December 17, 2022
|
Fast $\mathbb{G_2}$ subgroup check in BN254
|
|
0
|
1791
|
October 19, 2022
|
M-of-N secret sharing with pre-known shares
|
|
9
|
3487
|
September 24, 2022
|
Security of BLS batch verification
|
|
1
|
3402
|
August 28, 2022
|
Open problem: ideal vector commitment
|
|
27
|
14485
|
May 15, 2021
|
A Universal Verification Equation for Data Availability Sampling
|
|
0
|
3446
|
August 4, 2022
|
Generation of "independent'' points on elliptic curves
|
|
0
|
1102
|
June 21, 2022
|
Request for cryptographic primitive: vector commitment for elliptic curve points with algebraic properties
|
|
0
|
1947
|
April 2, 2021
|
A solution proposal to Vitalik's challenge: how to hide pigeonhole collisions (useful for Verkle trees, erasure codes, many ethereum contrstuctions, etc)
|
|
8
|
1964
|
May 8, 2022
|
Simple guide to fast linear combinations (aka multiexponentiations)
|
|
1
|
6236
|
March 8, 2022
|
Trustless Bitcoin Bridge Creation with Witness Encryption
|
|
12
|
9628
|
February 12, 2022
|
Indifferentiable hashing to ordinary elliptic Fq-curves of j=0 with the cost of one exponentiation in Fq
|
|
6
|
2417
|
February 2, 2022
|
The ~~EC~~FFT algorithm (without elliptic curve and isogenies!)
|
|
0
|
2651
|
November 26, 2021
|
Introducing Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
|
|
3
|
6177
|
September 14, 2021
|
Gold backed token using PUF to minimize fractional reserve banking and provide decentralized storage of physical gold
|
|
1
|
1169
|
September 8, 2021
|
LuckySeven, a protocol to generate publicly verifiable random numbers
|
|
0
|
1325
|
August 2, 2021
|
Point compression in pairing-based cryptography
|
|
2
|
1218
|
June 26, 2021
|