Research
Intro
Focus areas
Projects
Publications
Education
Culture
Events
People
A Non-Interactive Shuffle Argument With Low Trust Assumptions
On the Capacity of Private Monomial Computation
On QA-NIZK in the BPK Model
Key-and-Argument-Updatable QA-NIZKs
Private edge computing for linear inference based on secret sharing
On Adaptive Security of Delayed-Input Sigma-Protocols and Fiat-Shamir NIZKs
Succinct Functional Commitment for a Large Class of Arithmetic Circuits
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Boolean Polynomials, BDDs and CRHS Equations – Connecting the Dots with CryptaPath
Vetted Encryption
Previous
1
…
3
4
5
6
7
8
9
…
12
Next
keyboard_arrow_up
Menu