Explore >> Select a destination


You are here

cronokirby.com
| | martinralbrecht.wordpress.com
3.8 parsecs away

Travel
| | Together with Lenka Mareková, Kenny Paterson, Eyal Ronen and Igors Stepanovs, we have finally completed our (first, formal, in-depth, computational) analysis of the Telegram key exchange. This work is going to be presented at Eurocrypt 2025 in Madrid. Abstract. We describe, formally model, and prove the security of Telegram's key exchange protocols for client-server communications....
| | windowsontheory.org
3.8 parsecs away

Travel
| | Guest post by Boaz Barak and Zvika Brakerski (part 2) In the previous post, we demonstrated the versatility of fully homomorphic encryption and its applicability for multiple applications. In this post we will demonstrate (not too painfully, we hope) how fully homomorphic encryption is constructed. Our goal is to present the simplest solution that (we...
| | neilmadden.blog
2.6 parsecs away

Travel
| | This is the third part of my series on Key Encapsulation Mechanisms (KEMs) and why you should care about them. Part 1 looked at what a KEM is and the KEM/DEM paradigm for constructing public key encryption schemes. Part 2 looked at cases where the basic KEM abstraction is not sufficient and showed how it...
| | jeremykun.com
10.2 parsecs away

Travel
| In this article I'll derive a trick used in FHE called sample extraction. In brief, it allows one to partially convert a ciphertext in the Ring Learning With Errors (RLWE) scheme to the Learning With Errors (LWE) scheme. Here are some other articles I've written about other FHE building blocks, though they are not prerequisites...