Highlights

Introducing ZKnox

BitVM: Unlocking Arbitrary Computation on Bitcoin Through Circuit Abstractions

The Ethereum Cypherpunk Manifesto

Updates

TFHE-rs v1.0.0

zkVMs benchmarks

Unearthing the Reality of zkTLS: A Benchmarking and Cryptanalysis Report

Visual Algebra YouTube lectures

World-leaders in Cryptography: Anna Lysyanskaya

D/INFRA SUMMIT 2025 | ETHDENVER

Papers

The Algebraic One-More MISIS Problem and Applications to Threshold Signatures

Fine-Grained Verifier NIZK and Its Applications

Black-Box (and Fast) Non-Malleable Zero Knowledge

Commitment Schemes Based on Module-LIP

BUFFing Threshold Signature Schemes

A Note on Obfuscation-based Attacks on Private-coin Evasive LWE

Non-Interactive Verifiable Aggregation

Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments

ProofFrog: A Tool For Verifying Game-Hopping Proofs

Multi-Authority Functional Encryption: Corrupt Authorities, Dynamic Collusion, Lower Bounds, and More

Low Communication Threshold FHE from Standard (Module-)LWE

Hybrid Obfuscated Key Exchange and KEMs

Delegatable ABE with Full Security from Witness Encryption

Withdrawable signatures in Fiat-Shamir with aborts constructions

SNARKs for Stateful Computations on Authenticated Data

Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions

Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model

Blind Signatures from Cryptographic Group Actions

Reducing the Number of Qubits in Solving LWE

An Efficient Quantum Oblivious Transfer Protocol

Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity

Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions)

Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures

MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs

On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols

A Complete Security Proof of SQIsign

Evasive LWE: Attacks, Variants & Obfustopia

Simple and General Counterexamples for Private-Coin Evasive LWE

Split Prover Zero-Knowledge SNARKs

Polynomial Secret Sharing Schemes and Algebraic Matroids

Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally

Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY

Lattice-Based Updatable Public-Key Encryption for Group Messaging

Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality

Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials

A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol

The Complexity of Memory Checking with Covert Security

Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions

Commit-and-Prove System for Vectors and Applications to Threshold Signing


**If you'd like to receive updates via email, subscribe us!