On the weightwise nonlinearity of weightwise perfecty balanced functions, by Agnese Gini and Pierrick Méaux
In this article we perform a general study on the criterion of weightwise nonlinearity for the functions which are weightwise...
In this article we perform a general study on the criterion of weightwise nonlinearity for the functions which are weightwise...
Onion services enable bidirectional anonymity for parties that communicate over the Tor network, thus providing improved privacy properties compared to...
We propose a univariate sumcheck argument $mathfrak{Count}$ of essentially optimal communication efficiency of one group element. While the previously most...
This paper presents benchmarking and profiling of the two lattice-based signature scheme finalists, Dilithium and Falcon, on the ARM Cortex...
Dynamic participation support is an important feature of Bitcoin's longest-chain protocol and its variants. But these protocols suffer from long...
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography, and recently gained in popularity due to...
Rotational-XOR (RX) cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in ARX-C ciphers, i.e., ciphers that can...
Cryptographic keys are increasingly stored in dedicated hardware or behind software interfaces. Doing so limits access, such as permitting only...
In most verifiable electronic voting schemes, one key step is the tally phase, where the election result is computed from...
Most multi-party computation protocols allow secure computation of arithmetic circuits over a finite field, such as the integers modulo a...