==========================
==
Gharib Personal Blog
==
==========================
A Techi Personal Blog
Start
.
Posts
.
Categories
.
Tags
.
Cryptography
A Holistic Framework for Impossible Boomerang Attacks
Bootstrapping (T)FHE Ciphertexts via Automorphisms: Closing the Gap Between Binary and Gaussian Keys
Learning from Functionality Outputs: Private Join and Compute in the Real World
Multi-Authority Functional Encryption with Bounded Collusions from Standard Assumptions
Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography
Revisiting Beimel-Weinreb Weighted Threshold Secret Sharing Schemes
Secure Showing of Partial Attributes
Shuffle Shamir Secret Shares Uniformly with Linear Online Communication
The Nonlinear Filter Model of Stream Cipher Redivivus
Wiretapping LLMs: Network Side-Channel Attacks on Interactive LLM Services
1 of 17
Next Page