Highlights
Introducing ZKnox
BitVM: Unlocking Arbitrary Computation on Bitcoin Through Circuit Abstractions
The Ethereum Cypherpunk Manifesto
- https://x.com/pcaversaccio/status/1895806679704306130
- https://hackmd.io/@pcaversaccio/the-ethereum-cypherpunk-manifesto
Updates
TFHE-rs v1.0.0
- https://x.com/zama_fhe/status/1895147693632094400
- https://github.com/zama-ai/tfhe-rs/releases/tag/tfhe-rs-1.0.0
zkVMs benchmarks
Unearthing the Reality of zkTLS: A Benchmarking and Cryptanalysis Report
Visual Algebra YouTube lectures
World-leaders in Cryptography: Anna Lysyanskaya
D/INFRA SUMMIT 2025 | ETHDENVER
Papers
The Algebraic One-More MISIS Problem and Applications to Threshold Signatures
Fine-Grained Verifier NIZK and Its Applications
Black-Box (and Fast) Non-Malleable Zero Knowledge
Commitment Schemes Based on Module-LIP
BUFFing Threshold Signature Schemes
A Note on Obfuscation-based Attacks on Private-coin Evasive LWE
Non-Interactive Verifiable Aggregation
Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments
ProofFrog: A Tool For Verifying Game-Hopping Proofs
Multi-Authority Functional Encryption: Corrupt Authorities, Dynamic Collusion, Lower Bounds, and More
Low Communication Threshold FHE from Standard (Module-)LWE
Hybrid Obfuscated Key Exchange and KEMs
Delegatable ABE with Full Security from Witness Encryption
Withdrawable signatures in Fiat-Shamir with aborts constructions
SNARKs for Stateful Computations on Authenticated Data
Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions
Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model
Blind Signatures from Cryptographic Group Actions
Reducing the Number of Qubits in Solving LWE
An Efficient Quantum Oblivious Transfer Protocol
Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity
Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions)
Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures
MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs
On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols
A Complete Security Proof of SQIsign
Evasive LWE: Attacks, Variants & Obfustopia
Simple and General Counterexamples for Private-Coin Evasive LWE
Split Prover Zero-Knowledge SNARKs
Polynomial Secret Sharing Schemes and Algebraic Matroids
Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY
Lattice-Based Updatable Public-Key Encryption for Group Messaging
Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality
Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials
A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol
The Complexity of Memory Checking with Covert Security
Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions
Commit-and-Prove System for Vectors and Applications to Threshold Signing
**If you'd like to receive updates via email, subscribe us!