## Questions and Answers

In the years I spent browsing the stackexchange network, I devoted quite an amount of time answering questions about cryptography, from the most basic ques...

In the years I spent browsing the stackexchange network, I devoted quite an amount of time answering questions about cryptography, from the most basic ques...

General questions How to explain ZK proofs to a 7 year old? Are there lower bounds on the size and interaction of a ZK proof with a given soundness e...

Constructing MPC Protocols How to multiply two additively shared values? How can two parties conditionally disclose a secret to a third party? How ...

Do OWF imply $\mathsf{P} \neq \mathsf{NP}?$ (short answer: yes) How does the random oracle model help with constructing secure cryptographic primitive...

Public-Key Encryption Is the RSA cryptosystem provably secure? Are there public-key cryptosystems not relying on arithmetic over finite fields? (shor...

The aim of this post is to provide a simple, ready-for-use LaTeX article template for writing research papers on cryptography. This is the setup I generall...

The learning parity with noise assumption (LPN) is one of the most fundamental assumptions of cryptography. It states that given a random secret vector $\v...

In the course of working on various projects, I found myself spending an excessive amount of time skimming through textbooks and Wikipedia pages to be remi...