Beyond computational assumptions: How BGKW replaced hardness with isolation
🧮Homomorphic Encryption
Flag this post
Cyclic Proofs for iGL via Corecursion
arxiv.org·4h
✅Formal Verification
Flag this post
News for October 2025
ptreview.sublinear.info·1d
🧮Homomorphic Encryption
Flag this post
Enhancing Federated Learning Privacy with QUBO
arxiv.org·4h
🌐Decentralized AI
Flag this post
A Note on Notes: Towards Scalable Anonymous Payments via Evolving Nullifiers and Oblivious Synchronization
eprint.iacr.org·3d
🧮Homomorphic Encryption
Flag this post
Quantum-Resistant Federated Learning: Implementing Post-Quantum Cryptography in Cross-Silo Model Aggregation
🧮Homomorphic Encryption
Flag this post
Online Identity Is Evolving: From Data Storage to Proof-Based Verification with zkTLS
blogger.com·3d
📜Smart Contracts
Flag this post
Leakage-abuse Attack Against Substring-SSE with Partially Known Dataset
arxiv.org·1d
🧮Homomorphic Encryption
Flag this post
Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus
📜Smart Contracts
Flag this post
Panther: A Cost-Effective Privacy-Preserving Framework for GNN Training and Inference Services in Cloud Environments
arxiv.org·1d
🌐Decentralized AI
Flag this post
A Soft‑Fork Proposal for Blockchain‑Based Distributed AI Computation
hackernoon.com·1d
🌐Decentralized AI
Flag this post
Proving Authenticated Key Exchange via Memory-Efficient Reductions
eprint.iacr.org·6d
🧮Homomorphic Encryption
Flag this post
Zero-Trust with Zero-Friction eBPF in Calico v3.31
tigera.io·11h
🔒Hardware Security
Flag this post
Credentials Evidence or Simulate
📜Smart Contracts
Flag this post
Low-Level Hacks
⚙️Programming
Flag this post
Formal Verification’s Value Grows
semiengineering.com·1h
✅Formal Verification
Flag this post
Loading...Loading more...