==========================
==
Gharib Personal Blog
==
==========================
A Techi Personal Blog
Start
.
Posts
.
Categories
.
Tags
.
Cryptography
Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms
DewTwo: a transparent PCS with quasi-linear prover, logarithmic verifier and 4.5KB proofs from falsifiable assumptions
Distributional Private Information Retrieval
FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs
How to Protect and Secure Your Data in 10 Ways
Isogeny-based Cryptography using Isomorphisms of Superspecial Abelian Surfaces
On the Anonymity of Linkable Ring Signatures
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers
Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM
PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies
Previous Page
4 of 28
Next Page