About 50 results
Open links in new tab
  1. Cryptology ePrint Archive

    For more than 20 years, the Cryptology ePrint Archive has been publishing pre-print papers relevant to the field of cryptology. You can read more about our goals and history, see our acceptance and …

  2. About the Cryptology ePrint Archive - IACR

    The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by the authors and did not undergo any refereeing process other than verifying that the …

  3. Operations of the Cryptology ePrint Archive - IACR

    In this respect, the papers in the Cryptology ePrint Archive have the status of technical reports. Papers submitted may be author versions of published papers if the copyright holder allows such posting.

  4. Lova: Lattice-Based Folding Scheme from Unstructured Lattices

    Dec 4, 2024 · Existing post-quantum folding schemes (Boneh, Chen, ePrint 2024/257) based on lattice assumptions instead are secure under structured lattice assumptions, such as the Module Short …

  5. Faster Signatures from MPC-in-the-Head - IACR Cryptology ePrint …

    Feb 15, 2024 · We revisit the construction of signature schemes using the MPC-in-the-head paradigm. We obtain two main contributions: – We observe that previous signatures in the MPC-in-the-head …

  6. Submit a paper - IACR

    The Cryptology ePrint Archive uses MathJax which only renders mathematics. For example, you should not use \emph {...} for italics, and you should not include any \cite {...} commands.

  7. Browse by year and category - IACR

    Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.

  8. Aggregating Falcon Signatures with LaBRADOR - IACR Cryptology …

    Feb 23, 2024 · Several prior works have suggested to use non-interactive arguments of knowledge with short proofs to aggregate signatures of Falcon, which is part of the first post-quantum signatures …

  9. Evasive LWE Assumptions: Definitions, Classes, and Counterexamples

    Dec 11, 2024 · The evasive LWE assumption, proposed by Wee [Eurocrypt'22 Wee] for constructing a lattice-based optimal broadcast encryption, has shown to be a powerful assumption, adopted by …

  10. Qelect: Lattice-based Single Secret Leader Election Made Practical

    Jan 26, 2025 · In a single secret leader election (SSLE) protocol, all parties collectively and obliviously elect one leader. No one else should learn its identity unless it reveals itself as the leader. The …