Highlights
Introducing ZKnox
This new research organization is at the forefront of advanced cryptography, backed by a grant from the Ethereum Foundation. Their mission: provide high impact open source code that improves Ethereum security and efficiency.
这个新研究组织处于先进加密技术的前沿,由以太坊基金会资助。他们的使命:提供高影响力的开源代码,以提高以太坊的安全性和效率。
BitVM: Unlocking Arbitrary Computation on Bitcoin Through Circuit Abstractions
BitVM enables arbitrary computation on Bitcoin via circuit abstractions, overcoming UTXO limitations using covenants, statefulness, and branching.
BitVM 通过电路抽象在比特币上实现任意计算,利用契约、状态保持和分支克服 UTXO 限制。
The Ethereum Cypherpunk Manifesto
Updates
TFHE-rs v1.0.0
zkVMs benchmarks
Unearthing the Reality of zkTLS: A Benchmarking and Cryptanalysis Report
Visual Algebra YouTube lectures
World-leaders in Cryptography: Anna Lysyanskaya
D/INFRA SUMMIT 2025 | ETHDENVER
Papers
The Algebraic One-More MISIS Problem and Applications to Threshold Signatures
Fine-Grained Verifier NIZK and Its Applications
Black-Box (and Fast) Non-Malleable Zero Knowledge
Commitment Schemes Based on Module-LIP
BUFFing Threshold Signature Schemes
A Note on Obfuscation-based Attacks on Private-coin Evasive LWE
Non-Interactive Verifiable Aggregation
Samaritan: Linear-time Prover SNARK from New Multilinear Polynomial Commitments
ProofFrog: A Tool For Verifying Game-Hopping Proofs
Multi-Authority Functional Encryption: Corrupt Authorities, Dynamic Collusion, Lower Bounds, and More
Low Communication Threshold FHE from Standard (Module-)LWE
Hybrid Obfuscated Key Exchange and KEMs
Delegatable ABE with Full Security from Witness Encryption
Withdrawable signatures in Fiat-Shamir with aborts constructions
SNARKs for Stateful Computations on Authenticated Data
Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions
Tight Adaptive Simulation Security for Identity-based Inner-Product FE in the (Quantum) Random Oracle Model
Blind Signatures from Cryptographic Group Actions
Reducing the Number of Qubits in Solving LWE
An Efficient Quantum Oblivious Transfer Protocol
Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity
Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions)
Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures
MERCURY: A multilinear Polynomial Commitment Scheme with constant proof size and no prover FFTs
On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols
A Complete Security Proof of SQIsign
Evasive LWE: Attacks, Variants & Obfustopia
Simple and General Counterexamples for Private-Coin Evasive LWE
Split Prover Zero-Knowledge SNARKs
Polynomial Secret Sharing Schemes and Algebraic Matroids
Partial Lattice Trapdoors: How to Split Lattice Trapdoors, Literally
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY
Lattice-Based Updatable Public-Key Encryption for Group Messaging
Predicate Encryption from Lattices: Enhanced Compactness and Refined Functionality
Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials
A Note on Zero-Knowledge Simulator of the CROSS Identification Protocol
The Complexity of Memory Checking with Covert Security
Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions
Commit-and-Prove System for Vectors and Applications to Threshold Signing
If you'd like to receive updates via email, subscribe
us!