Cryptography
Browse posts by tag
Foundations of Cryptography
Introduction to Cryptography with Coding Theory
Serious Cryptography
Cipher Maps: A Unified Framework for Oblivious Function Approximation Through Algebraic Structures and Bernoulli Models
Cipher Maps: When Category Theory Meets Oblivious Computing
Using category theory to formalize oblivious computing through cipher maps and algebraic cipher types, enabling functorial composition of privacy-preserving transformations.
Encrypted Search with Oblivious Bernoulli Types: Information-Theoretic Privacy through Controlled Approximation
Maximizing Confidentiality in Encrypted Search Through Entropy Optimization
Rethinking Encrypted Search: From Access Pattern Leakage to Information-Theoretic Privacy
Rethinking encrypted search through oblivious types that provide information-theoretic privacy guarantees against access pattern leakage, without relying on computational hardness assumptions.
Algebraic Cipher Types: A Functorial Framework for Secure Computation
Algebraic Cipher Types: Computing on Encrypted Data While Preserving Structure
A functorial framework that lifts algebraic structures into the encrypted domain, enabling secure computation that preserves mathematical properties.
Algebraic Hashing A Modern C++20 Library for Composable Hash Functions Version 2.0
Apertures: Coordinated Partial Evaluation for Distributed Computation
Cryptographic perfect hash functions: A theoretical analysis on space efficiency, time complexity, and entropy
PFC: Zero-Copy Data Compression Through Prefix-Free Codecs and Generic Programming
The Beautiful Deception: How 256 Bits Pretend to be Infinity
How do you store infinity in 256 bits? An exploration of the fundamental deception at the heart of cryptography: using finite information to simulate infinite randomness.
Known Plaintext Attacks on Time Series Encryption
Analysis of known plaintext attack vulnerabilities in time series encryption schemes.
Perfect Hashing: Space Bounds, Entropy, and Cryptographic Security
Analyzing the space bounds, entropy requirements, and cryptographic security properties of perfect hash functions.
The Beautiful Deception: How 256 Bits Pretend to be Infinity
The Beautiful Deception: How 256 Bits Pretend to be Infinity
A Boolean Algebra Over Trapdoors
A Boolean algebra framework over trapdoors for cryptographic operations. Introduces a homomorphism from powerset Boolean algebra to n-bit strings via cryptographic hash functions, enabling secure computations with one-way properties.
Algebraic Hashing: Composable Hash Functions Through XOR
A C++ library for composable hash functions using algebraic structure over XOR, with template metaprogramming.
Time Series Analysis of Confidentiality Degradation in Encrypted Search Systems
Estimating How Confidential Encrypted Searches Are Using Moving Average Bootstrap Method
IEEE Paper: Estimating How Confidential Encrypted Searches Are Using Moving Average Bootstrap Method
Published IEEE paper on using bootstrap methods to estimate encrypted search confidentiality against frequency attacks.
Random Oracles in Python
Three Python approximations of a random oracle, each illuminating a different tradeoff between true randomness, determinism, and composability.