💀 The Wall of Shame

The most cited papers with no code. Sorted by the weight of their sins.

Page 3, showing 50 papers

# Paper Cause of Death Category Citations Published
101 On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
Zhipeng Wang, Stefanos Chaliasos, ... (+6 more)
👻 Ghosted cs.CR 65 4 years ago
102 One-Way Functions Imply Secure Computation in a Quantum World
James Bartusek, Andrea Coladangelo, ... (+2 more)
👻 Ghosted quant-ph 64 5 years ago
103 Secure Software Leasing
Prabhanjan Ananth, Rolando L. La Placa
👻 Ghosted quant-ph 64 5 years ago
104 Towards the AlexNet Moment for Homomorphic Encryption: HCNN, theFirst Homomorphic CNN on Encrypted Data with GPUs
Ahmad Al Badawi, Jin Chao, ... (+7 more)
👻 Ghosted cs.CR 64 7 years ago
105 On Finding Quantum Multi-collisions
Qipeng Liu, Mark Zhandry
👻 Ghosted cs.CR 63 7 years ago
106 Montgomery curves and their arithmetic
Craig Costello, Benjamin Smith
👻 Ghosted cs.CR 63 9 years ago
107 Instantaneous Decentralized Poker
Iddo Bentov, Ranjit Kumaresan, Andrew Miller
👻 Ghosted cs.CR 63 9 years ago
108 Stronger and Faster Side-Channel Protections for CSIDH
Daniel Cervantes-Vázquez, Mathilde Chenu, ... (+4 more)
👻 Ghosted cs.CR 62 6 years ago
109 RankSign: an efficient signature algorithm based on the rank metric
Philippe Gaborit, Olivier Ruatta, ... (+2 more)
👻 Ghosted cs.CR 62 9 years ago
110 A Geometric Approach to Rank Metric Codes and a Classification of Constant Weight Codes
Tovohery Hajatiana Randrianarisoa
👻 Ghosted cs.IT 61 6 years ago
111 LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes
Marco Baldi, Alessandro Barenghi, ... (+3 more)
👻 Ghosted cs.CR 61 8 years ago
112 Binary linear complementary dual codes
Masaaki Harada, Ken Saito
🔮 The Ethereal math.CO 61 8 years ago
113 Quantum algorithms for computing short discrete logarithms and factoring RSA integers
Martin Ekerå, Johan Håstad
👻 Ghosted cs.CR 61 9 years ago
114 The Mathematical Foundations for Mapping Policies to Network Devices (Technical Report)
Dinesha Ranathunga, Matthew Roughan, ... (+2 more)
👻 Ghosted cs.CR 61 9 years ago
115 Galois Hulls of Linear Codes over Finite Fields
Hongwei Liu, Xu Pan
👻 Ghosted cs.IT 60 7 years ago
116 Conditional Cube Attack on Round-Reduced ASCON
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
👻 Ghosted cs.CR 58 8 months ago
117 Constructions of Maximum Distance Separable Symbol-Pair Codes Using Cyclic and Constacyclic Codes
Shuxing Li, Gennian Ge
👻 Ghosted cs.IT 58 9 years ago
118 On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
Kai-Min Chung, Serge Fehr, ... (+2 more)
👻 Ghosted quant-ph 57 5 years ago
119 Non-interactive classical verification of quantum computation
Gorjan Alagic, Andrew M. Childs, ... (+2 more)
👻 Ghosted quant-ph 57 6 years ago
120 Private Aggregation from Fewer Anonymous Messages
Badih Ghazi, Pasin Manurangsi, ... (+2 more)
👻 Ghosted cs.CR 57 6 years ago
121 On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
Mohsen Toorani
👻 Ghosted cs.CR 57 11 years ago
122 Optimal Binary LCD Codes
Stefka Bouyuklieva
👻 Ghosted cs.IT 55 5 years ago
123 The Adversarial Robustness of Sampling
Omri Ben-Eliezer, Eylon Yogev
👻 Ghosted cs.DS 55 6 years ago
124 A kilobit hidden SNFS discrete logarithm computation
Joshua Fried, Pierrick Gaudry, ... (+2 more)
👻 Ghosted cs.CR 55 9 years ago
125 Simpler Proofs of Quantumness
Zvika Brakerski, Venkata Koppula, ... (+2 more)
👻 Ghosted quant-ph 54 5 years ago
126 Tropical cryptography II: extensions by homomorphisms
Dima Grigoriev, Vladimir Shpilrain
👻 Ghosted cs.CR 54 7 years ago
127 Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
Xin Li
🔮 The Ethereal cs.CC 54 8 years ago
128 FairTraDEX: A Decentralised Exchange Preventing Value Extraction
Conor McMenamin, Vanesa Daza, ... (+2 more)
👻 Ghosted cs.GT 54 4 years ago
129 New security notions and feasibility results for authentication of quantum data
Sumegha Garg, Henry Yuen, Mark Zhandry
👻 Ghosted cs.CR 53 9 years ago
130 On the c-differential uniformity of certain maps over finite fields
Sartaj Ul Hasan, Mohit Pal, ... (+2 more)
🔮 The Ethereal math.CO 52 6 years ago
131 General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Zhengfeng Ji, Youming Qiao, ... (+2 more)
👻 Ghosted cs.CR 52 6 years ago
132 Detecting Token Systems on Ethereum
Michael Fröwis, Andreas Fuchs, Rainer Böhme
👻 Ghosted cs.CR 52 7 years ago
133 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic
Nian Li, Tor Helleseth
👻 Ghosted cs.IT 52 9 years ago
134 Tight adaptive reprogramming in the QROM
Alex B. Grilo, Kathrin Hövelmanns, ... (+2 more)
👻 Ghosted quant-ph 51 5 years ago
135 Improved Classical and Quantum Algorithms for Subset-Sum
Xavier Bonnetain, Rémi Bricout, ... (+2 more)
👻 Ghosted quant-ph 51 6 years ago
136 Post-quantum Zero Knowledge in Constant Rounds
Nir Bitansky, Omri Shmueli
👻 Ghosted quant-ph 51 6 years ago
137 Quantum Fully Homomorphic Encryption With Verification
Gorjan Alagic, Yfke Dulek, ... (+2 more)
👻 Ghosted quant-ph 51 8 years ago
138 New Constructions of MDS Symbol-Pair Codes
Baokun Ding, Gennian Ge, ... (+3 more)
👻 Ghosted cs.IT 51 9 years ago
139 Cryptanalysis of a System Based on Twisted Reed-Solomon Codes
Julien Lavauzelle, Julian Renner
👻 Ghosted cs.IT 50 7 years ago
140 Using Bernstein-Vazirani Algorithm to Attack Block Ciphers
Huiqin Xie, Li Yang
👻 Ghosted quant-ph 50 8 years ago
141 Pseudorandom States, Non-Cloning Theorems and Quantum Money
Zhengfeng Ji, Yi-Kai Liu, Fang Song
👻 Ghosted quant-ph 50 8 years ago
142 Constructions of cyclic constant dimension codes
Bocong Chen, Hongwei Liu
👻 Ghosted cs.IT 50 8 years ago
143 SALSA: Attacking Lattice Cryptography with Transformers
Emily Wenger, Mingjie Chen, ... (+2 more)
👻 Ghosted cs.CR 50 3 years ago
144 Hash functions from superspecial genus-2 curves using Richelot isogenies
Wouter Castryck, Thomas Decru, Benjamin Smith
👻 Ghosted cs.CR 49 7 years ago
145 A general private information retrieval scheme for MDS coded databases with colluding servers
Yiwei Zhang, Gennian Ge
👻 Ghosted cs.IT 49 9 years ago
146 A Note on Quantum-Secure PRPs
Mark Zhandry
👻 Ghosted cs.CR 49 9 years ago
147 Quantum copy-protection of compute-and-compare programs in the quantum random oracle model
Andrea Coladangelo, Christian Majenz, Alexander Poremba
👻 Ghosted quant-ph 48 5 years ago
148 Semi-Quantum Money
Roy Radian, Or Sattath
👻 Ghosted quant-ph 48 6 years ago
149 Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection
Devin Reich, Ariel Todoki, ... (+3 more)
👻 Ghosted cs.CR 48 6 years ago
150 Still Wrong Use of Pairings in Cryptography
Mehmet Sabir Kiraz, Osmanbey Uzunkol
👻 Ghosted cs.CR 48 10 years ago