Questions and Answers
In the years I spent browsing the stackexchange network, I devoted quite an amount of time answering questions about cryptography, from the most basic ques...
In the years I spent browsing the stackexchange network, I devoted quite an amount of time answering questions about cryptography, from the most basic ques...
General questions How to explain ZK proofs to a 7 year old? Are there lower bounds on the size and interaction of a ZK proof with a given soundness e...
Constructing MPC Protocols How to multiply two additively shared values? How can two parties conditionally disclose a secret to a third party? How ...
Do OWF imply $\mathsf{P} \neq \mathsf{NP}?$ (short answer: yes) How does the random oracle model help with constructing secure cryptographic primitive...
Public-Key Encryption Is the RSA cryptosystem provably secure? Are there public-key cryptosystems not relying on arithmetic over finite fields? (shor...
Public-Key Encryption Is the RSA cryptosystem provably secure? Are there public-key cryptosystems not relying on arithmetic over finite fields? (shor...
The learning parity with noise assumption (LPN) is one of the most fundamental assumptions of cryptography. It states that given a random secret vector $\v...
In the course of working on various projects, I found myself spending an excessive amount of time skimming through textbooks and Wikipedia pages to be remi...
The learning parity with noise assumption (LPN) is one of the most fundamental assumptions of cryptography. It states that given a random secret vector $\v...
The learning parity with noise assumption (LPN) is one of the most fundamental assumptions of cryptography. It states that given a random secret vector $\v...
Public-Key Encryption Is the RSA cryptosystem provably secure? Are there public-key cryptosystems not relying on arithmetic over finite fields? (shor...
Do OWF imply $\mathsf{P} \neq \mathsf{NP}?$ (short answer: yes) How does the random oracle model help with constructing secure cryptographic primitive...
Constructing MPC Protocols How to multiply two additively shared values? How can two parties conditionally disclose a secret to a third party? How ...
General questions How to explain ZK proofs to a 7 year old? Are there lower bounds on the size and interaction of a ZK proof with a given soundness e...
The aim of this post is to provide a simple, ready-for-use LaTeX article template for writing research papers on cryptography. This is the setup I generall...