Mark Simkin (@simk1n) 's Twitter Profile
Mark Simkin

@simk1n

ID: 897955167215210498

linkhttps://msimkin.github.io/ calendar_today16-08-2017 22:56:09

195 Tweet

476 Takipçi

42 Takip Edilen

Nadim Kobeissi (@kaepora) 's Twitter Profile Photo

JUST PUBLISHED: press release from the Paris Judiciary Tribunal, laying out the specific charges against Pavel Durov. These all appear to be France-specific charges, nothing to do with the European Commission. Worryingly, this seems to be a “throw everything and see what

JUST PUBLISHED: press release from the Paris Judiciary Tribunal, laying out the specific charges against Pavel Durov.

These all appear to be France-specific charges, nothing to do with the European Commission.

Worryingly, this seems to be a “throw everything and see what
Arantxa Zapico 🧉 (@arantxazapico) 's Twitter Profile Photo

New work with Benedikt Wanger! eprint.iacr.org/2024/1362.pdf We describe, analyze, and prove the security of the cryptography used in PeerDAS. PeerDAS is an intermediate solution on Ethereum's path to implementing full Data Availability Sampling (DAS).

Ben Diamond (@benediamond) 's Twitter Profile Photo

new paper out with Angus Gruen! eprint.iacr.org/2024/1351. in this paper, we prove that if a linear code over a field exhibits proximity gaps over affine lines, then its interleavings also do. we also amend the "general conjecture" for proximity gaps in the UDR [DP23, Conj. 2.4].

Tim Roughgarden (@tim_roughgarden) 's Twitter Profile Photo

Periodic reminder that at my website you can find over 1000 pages of lecture notes on algorithms, data science, game theory, market and mechanism design, blockchain protocols, and more (see replies for link)

Carsten Baum (@crypto_carsten) 's Twitter Profile Photo

I am happy to announce that our latest improvements to the FAEST digital signature scheme and MPC-in-the-head ZK proofs in general have been accepted at ASIACRYPT 2024. eprint.iacr.org/2024/490

nicola 💾 (@iamnotnicola) 's Twitter Profile Photo

Quantum Punks ⚛️ Over the years, I met quantum people that had no idea about crypto and viceversa. However, I also met people that are in the perfect intersection. alex and I decided to call them Quantum Punks and wrote a short manifesto. quantumpunks.org 🧵

Claudio Orlandi (@claudiorlandi) 's Twitter Profile Photo

Congrats to Lennart Braun of #aarhuskrypto who last week defended his PhD "Cryptography After Prime Time -- Protocols for Z2k and Groups of Unknown Order" Computer Science at Aarhus University

Congrats to Lennart Braun of #aarhuskrypto who last week defended his PhD "Cryptography After Prime Time -- Protocols for Z2k and Groups of Unknown Order" <a href="/csaudk/">Computer Science at Aarhus University</a>
Alin Tomescu (@alinush407) 's Twitter Profile Photo

Neither breaking, nor shocking. It was known (e.g., petsymposium.org/popets/2018/po…). Monero’s ring signature-based TXNs cannot hide the sender among the full set of users. (It’s nice cryptography; but cannot scale as is.) As a result, Monero can be very easy to trace. Privacy is

Lefteris Karapetsas | Hiring for @rotkiapp (@lefterisjp) 's Twitter Profile Photo

People often DM me saying that I am brutal in criticizing projects and that I should tone it down a bit. Thing is criticism is good. It means I care. It's how you react to criticism that tells a lot about you and your project. So now I want to speak a bit about EigenLayer. I

People often DM me saying that I am brutal in criticizing projects and that I should tone it down a bit.

Thing is criticism is good. It means I care. It's how you react to criticism that tells a lot about you and your project.

So now I want to speak a bit about <a href="/eigenlayer/">EigenLayer</a>.

I
hakan (@hatr) 's Twitter Profile Photo

🇩🇪 prosecutors appear to be able to **deanonymize Tor ** by tapping servers, for years (!) and doing "timing analysis". In one case – Ricochet, related to CSAM – they did this four times, ordered telco provider to identify customer connecting to entry node tagesschau.de/investigativ/p…

a16z crypto (@a16zcrypto) 's Twitter Profile Photo

This summer, we held our third summer research program, where we invite researchers from academia and industry to come and share their work. We also publicly release all of their presentations to make the community stronger. Check out the first three videos below:

asanso.eth 🦇🔊🐼🧱🔥 (@asanso) 's Twitter Profile Photo

Excited to share a paper I really enjoyed writing (soon on eprint). We investigate the rough order assumption in imaginary quadratic number fields using tools from algebraic geometry, connecting it to the rank of elliptic curves over Q. Check it out: github.com/asanso/rough-o…

Excited to share a paper I really enjoyed writing (soon on eprint). We investigate the rough order assumption in imaginary quadratic number fields using tools from algebraic geometry, connecting it to the rank of elliptic curves over Q. Check it out: github.com/asanso/rough-o…
Mark Simkin (@simk1n) 's Twitter Profile Photo

New paper out! We present a simple way to construct OR-proofs from collision-resistant hashing with logarithmic (in the number of statements) proof sizes. To appear at TCC 2024, joint work with Katharina Boudgoust. Link: ia.cr/2024/1482

New paper out! We present a simple way to construct OR-proofs from collision-resistant hashing with logarithmic (in the number of statements) proof sizes.

To appear at TCC 2024, joint work with <a href="/KBoudgoust/">Katharina Boudgoust</a>.
Link: ia.cr/2024/1482