<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://cryptology.city/Assumptions/bilinear-map-assumptions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/computational-diffie-hellman</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/crypto-dark-matter</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/decisional-composite-residuosity</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/decisional-diffie-hellman</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/discrete-logarithm</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/factoring</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/knowledge-of-exponent</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/learning-parity-with-noise</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/learning-with-errors</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/ntru</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/quadratic-residuosity</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/rsa-assumption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Assumptions/supersingular-isogeny-diffie-hellman</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/arthur-merlin</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/bounded-error-probabilistic-polynomial-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/bounded-error-quantum-polynomial-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/co-arthur-merlin</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/co-nondeterministic-polynomial-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/computational-zero-knowledge</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/exponential-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/interactive-proof-systems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/merlin-arthur</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/nondeterministic-polynomial-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/p-poly</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/polynomial-space</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/polynomial-time-hierarchy</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/polynomial-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/probabilistic-polynomial-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/quantum-classical-merlin-arthur</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/quantum-interactive-proofs</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/quantum-merlin-arthur</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/quantum-statistical-zero-knowledge</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/randomized-polynomial-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/sharp-p</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/statistical-zero-knowledge</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/total-function-np</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Complexity/zero-error-probabilistic-polynomial-time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Folklore/hybrid-argument</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Folklore/switching-lemma</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/algebraic-group-model</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/arithmetization</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/black-box-separations</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/fiat-shamir-heuristic</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/generic-group-model</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/interactive-protocol</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/latex-macros</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/random-oracle-model</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Glossary/universal-composability-framework</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/attribute-based-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/broadcast-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/commitment-scheme</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/digital-signature</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/distributed-point-function</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/doubly-efficient-pir</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/fingerprinting-code</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/fuzzy-identity-based-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/hash-function</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/hidden-vector-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/hierarchical-identity-based-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/homomorphic-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/identity-based-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/indistinguishability-obfuscation</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/inner-product-predicate-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/key-encapsulation-mechanism</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/key-exchange</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/message-authentication-code</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/multi-server-private-information-retrieval</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/non-interactive-zero-knowledge</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/oblivious-ram</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/oblivious-transfer</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/one-way-permutation</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/polynomial-commitment</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/pseudorandom-error-correcting-code</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/pseudorandom-function</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/pseudorandom-generator</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/pseudorandom-permutation</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/public-key-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/secret-sharing</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/secure-multi-party-computation</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/single-server-private-information-retrieval</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/succinct-argument</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/symmetric-key-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/symmetric-private-information-retrieval-multi-server</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/trapdoor-hash-function</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/trapdoor-permutation</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/Primitives/zero-knowledge-proof</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/AGGM06---On-basing-one-way-functions-on-NP-hardness</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/AHY25---Fine-Grained-Complexity-in-a-World-without-Cryptography</loc>
    <lastmod>2025-02-23T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/AIK06---Cryptography-in-NC0</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/AK07---Quantum-versus-Classical-Proofs-and-Advice</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/AKL+20---OptORAMa-Optimal-Oblivious-RAM</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/AKS83---An-0(n-log-n)-sorting-network</loc>
    <lastmod>2025-04-22T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/AMR25---Trapdoor-Hash-Functions-and-PIR-from-Low-Noise-LPN</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/AMYY25---Evasive-LWE-Attacks,-Variants--and--Obfustopia</loc>
    <lastmod>2025-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Ale03---More-on-average-case-vs-approximation-complexity</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BBB+18---Bulletproofs-Short-Proofs-for-Confidential-Transactions-and-More</loc>
    <lastmod>2025-01-24T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BBG05---Hierarchical-Identity-Based-Encryption-with-Constant-Size-Ciphertext</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BBHR18---Scalable,-transparent,-and-post-quantum-secure-computational-integrity</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BF01---Identity-Based-Encryption-from-the-Weil-Pairing</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BFL+24---Quantum-Merlin-Arthur-with-an-Internally-Separable-Proof</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BFM23---On-the-Power-of-Nonstandard-Quantum-Oracles</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BFM24---Quantum-Merlin-Arthur-and-Proofs-Without-Relative-Phase</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BFM88---Non-interactive-zero-knowledge-and-its-applications</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BGG+90---Everything-Provable-is-Provable-in-Zero-Knowledge</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BGI15---Function-Secret-Sharing</loc>
    <lastmod>2025-04-22T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BGI16---Function-Secret-Sharing-Improvements-and-Extensions</loc>
    <lastmod>2025-04-22T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BGS75---Relativizations-of-the-P=NP-question</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BGV12---Leveled-fully-homomorphic-encryption-without-bootstrapping</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BGW05---Collusion-Resistant-Broadcast-Encryption-with-Short-Ciphertexts-and-Private-Keys</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BGW88---Completeness-theorems-for-non-cryptographic-fault-tolerant-distributed-computation</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BH26---How-to-Steal-Oblivious-Transfer-from-Minicrypt</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BHMW21---On-the-Security-of-Doubly-Efficient-PIR</loc>
    <lastmod>2025-02-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BHNZ25---Separating-QMA-from-QCMA-with-a-Classical-Oracle</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BHV26---Separating-Quantum-and-Classical-Advice-with-Good-Codes</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BIP+18---Exploring-Crypto-Dark-Matter-New-Simple-PRF-Candidates-and-Their-Applications</loc>
    <lastmod>2025-02-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BIPW17---Can-We-Access-a-Database-Both-Locally-and-Privately</loc>
    <lastmod>2025-02-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BK24---Oracle-Separation-of-QMA-and-QCMA-with-Bounded-Adaptivity</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BL13---Limits-of-Provable-Security-for-Homomorphic-Encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BLVW19---Worst-Case-Hardness-for-LPN-and-Cryptographic-Hashing-via-Code-Smoothing</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BM09---Merkle-Puzzles-Are-Optimal-An-O(n2)-Query-Attack-on-Any-Key-Exchange-from-a-Random-Oracle</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BM25---Superposition-Detection-and-QMA-with-Non-Collapsing-Measurements</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BM84---How-to-Generate-Cryptographically-Strong-Sequences-of-Pseudo-Random-Bits</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BM88---Arthur-merlin-games-A-randomized-proof-system-and-a-hierarchy-of-complexity-classes</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BMZ19---The-Distinction-Between-Fixed-and-Random-Generators-in-Group-Based-Assumptions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BN16---Is-There-an-Oblivious-RAM-Lower-Bound</loc>
    <lastmod>2025-04-29T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BS98---Collusion-secure-fingerprinting-for-digital-data</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BSW07---Ciphertext-Policy-Attribute-Based-Encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/BW07---Conjunctive-Normal-Form-Encryption-and-Attribute-Based-Encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Bla79---Safeguarding-cryptographic-keys</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Bra79---Relativized-cryptography</loc>
    <lastmod>2025-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CCG+94---The-random-oracle-hypothesis-is-false</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CCGH25---A-Meta-Complexity-Characterization-of-Quantum-Cryptography</loc>
    <lastmod>2025-04-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CD22---An-efficient-key-recovery-attack-on-SIDH</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CDH20---A-Lower-Bound-for-One-Round-Oblivious-RAM</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CG24---Pseudorandom-Error-Correcting-Codes</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CG97---Computationally-private-information-retrieval</loc>
    <lastmod>2025-02-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CGKS98---Private-information-retrieval</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CGN98---Private-Information-Retrieval-by-Keywords</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CGZ24---Undetectable-Watermarks-for-Language-Models</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CHS25---Watermarking-Language-Models-for-Many-Adaptive-Users</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CHW26---The-Structured-Generic-Group-Model</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CIMR25---Secret-Key-PIR-from-Random-Linear-Codes</loc>
    <lastmod>2025-04-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CK20---Private-Information-Retrieval-with-Sublinear-Online-Time</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/CNC+23---Authenticated-private-information-retrieval</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Can01---Universally-composable-security-a-new-paradigm-for-cryptographic-protocols</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Cha82---Blind-Signatures-for-Untraceable-Payments</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Cle86---Limits-on-the-security-of-coin-flips-when-half-the-processors-are-faulty</loc>
    <lastmod>2025-05-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/DGI+19---Trapdoor-Hash-Functions-and-Their-Applications</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/DH24---Lower-Bounds-on-Public-Key-Operations-in-PIR</loc>
    <lastmod>2025-02-07T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/DH76---New-Directions-in-Cryptography</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/DMO00---Single-Database-Private-Information-Retrieval-Implies-Oblivious-Transfer</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/DPPY25---Anamorphism-Beyond-One-to-One-Messaging-Public-Key-with-Anamorphic-Broadcast-Mode</loc>
    <lastmod>2025-05-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/DT24---Fully-Malicious-Authenticated-PIR</loc>
    <lastmod>2025-01-23T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Dac14---A-Black-Box-Construction-of-a-CCA2-Encryption-Scheme-from-a-Plaintext-Aware-Encryption-Scheme</loc>
    <lastmod>2025-04-30T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Din20---On-the-Streaming-Indistinguishability-of-a-Random-Permutation-and-a-Random-Function</loc>
    <lastmod>2025-07-24T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Din24---Tight-Indistinguishability-Bounds-for-the-XOR-of-Independent-Random-Permutations-by-Fourier-Analysis</loc>
    <lastmod>2025-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Din25---Combining-Outputs-of-a-Random-Permutation-New-Constructions-and-Tight-Security-Bounds-by-Fourier-Analysis</loc>
    <lastmod>2025-05-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/ElGamal85---A-Public-Key-Cryptosystem-and-a-Signature-Scheme-Based-on-Discrete-Logarithms</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/FGJ+25---Publicly-Detectable-Watermarking-for-Language-Models</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/FIPR05---Keyword-Search-and-Oblivious-Pseudorandom-Functions</loc>
    <lastmod>2025-01-07T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/FKL18---The-Algebraic-Group-Model-and-its-Applications</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/FS86---How-to-Prove-Yourself-Practical-Solutions-to-Identification-and-Signature-Problems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GG00---On-the-limits-of-non-approximability-of-lattice-problems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GG21---The-Advantage-of-Truncated-Permutations</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GG24---New-constructions-of-pseudorandom-codes</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GG98---On-the-possibility-of-basing-Cryptography-on-the-assumption-that-P-!=-NP</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GGHRSW13---Candidate-indistinguishability-obfuscation-and-functional-encryption-for-all-circuits</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GGM86---How-to-construct-random-functions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GI14---Distributed-Point-Functions-and-Their-Applications</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GIKM00---Protecting-Data-Privacy-in-Private-Information-Retrieval-Scheme</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GJL+25---Post-Quantum-PKE-from-Unstructured-Noisy-Linear-Algebraic-Assumptions-Beyond-LWE-and-Alekhnovich's-LPN</loc>
    <lastmod>2025-05-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GK03---On-the-(In)security-of-the-Fiat-Shamir-Paradigm</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GK96---On-the-Composition-of-Zero-Knowledge-Proof-Systems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GKM+00---The-relationship-between-public-key-encryption-and-oblivious-transfer</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GKR15---Delegating-Computation-Interactive-Proofs-for-Muggles</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GL89---A-Hard-Core-Predicate-for-All-One-Way-Functions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GM24---Edit-Distance-Robust-Watermarks-for-Language-Models</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GM84---Probabilistic-encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GMMY24---CountCrypt-Quantum-Cryptography-between-QCMA-and-PP</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GMR85---The-knowledge-complexity-of-interactive-proof-systems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GMR88---A-Digital-Signature-Scheme-Secure-Against-Adaptive-Chosen-Message-Attacks</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GMW87---How-to-play-ANY-mental-game</loc>
    <lastmod>2025-03-01T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GMW91---Proofs-that-yield-nothing-but-their-validity-or-all-languages-in-NP-have-zero-knowledge-proof-systems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GO96---Software-protection-and-simulation-on-oblivious-RAMs</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GPSW06---Attribute-Based-Encryption-for-Fine-Grained-Access-Control-of-Encrypted-Data</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GR13---Enhancements-of-Trapdoor-Permutations</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GS86---Private-Coins-versus-Public-Coins-in-Interactive-Proof-Systems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GZS24---Efficient-Pre-processing-PIR-Without-Public-Key-Cryptography</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/GZSP25---Pseudorandom-Functions-with-Weak-Programming-Privacy-and-Applications-to-Private-Information-Retrieval</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Gen09---Fully-homomorphic-encryption-using-ideal-lattices</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Gol00---Candidate-One-Way-Functions-Based-on-Expander-Graphs</loc>
    <lastmod>2025-02-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Gro16---On-the-Size-of-Pairing-based-Non-interactive-Arguments</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Grover96---A-fast-quantum-mechanical-algorithm-for-database-search</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/HILL99---A-Pseudorandom-Generator-from-Any-One-Way-Function</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/HKKS19---Stronger-Lower-Bounds-for-Online-ORAM</loc>
    <lastmod>2025-04-22T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/HMO+19---On-the-Communication-Complexity-of-Key-Agreement-Protocols</loc>
    <lastmod>2025-04-09T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/HMST22---On-the-Complexity-of-Two-Party-Differential-Privacy</loc>
    <lastmod>2025-03-07T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/HPPY25---Plinko-Single-Server-PIR-with-Efficient-Updates-via-Invertible-PRFs</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/HPS98---NTRU-a-ring-based-public-key-cryptosystem</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/HS25---Tighter-Concrete-Security-for-the-Simplest-OT</loc>
    <lastmod>2025-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/HV16---On-the-Power-of-Secure-Two-Party-Computation</loc>
    <lastmod>2025-02-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/IKNP03---Extending-Oblivious-Transfers-Efficiently</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/IR89---Limits-on-the-provable-consequences-of-one-way-permutations</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/ISW24---PIR-with-Client-Side-Preprocessing-Information-Theoretic-Constructions-and-Lower-Bounds</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Imp95---A-personal-view-of-average-case-complexity</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/JDF11---Towards-quantum-resistant-cryptosystems-from-supersingular-elliptic-curve-isogenies</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/JKX18---OPAQUE-An-Asymmetric-PAKE-Protocol-Secure-Against-Pre-Computation-Attacks</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/JLS21---Indistinguishability-obfuscation-from-well-founded-assumptions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/JS08---On-the-Equivalence-of-Generic-Group-Models</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/KL21---A-Logarithmic-Lower-Bound-for-Oblivious-RAM-(for-all-parameters)</loc>
    <lastmod>2025-04-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/KM19---CPA-to-CCA-Transformation-for-KDM-Security</loc>
    <lastmod>2025-04-30T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/KO97---Replication-is-not-needed-single-database,-computationally-private-information-retrieval</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/KRS25---How-to-Prove-False-Statements-Practical-Attacks-on-Fiat-Shamir</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/KSW08---Predicate-Encryption-Supporting-Disjunctions-Polynomial-Equations-and-Inner-Products</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/KZ22---An-Analysis-of-the-Algebraic-Group-Model</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/KZG10---Constant-size-commitments-to-polynomials-and-their-applications</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Kil88---Founding-cryptography-on-oblivious-transfer</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LLM22---XSPIR-Efficient-Symmetrically-Private-Information-Retrieval-from-Ring-LWE</loc>
    <lastmod>2025-02-25T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LMW23---Doubly-Efficient-Private-Information-Retrieval-and-Fully-Homomorphic-RAM-Computation-from-Ring-LWE</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LMW24---Doubly-Efficient-Cryptography-Commitments,-Arguments-and-RAM-MPC</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LMW25---Black-Box-Crypto-is-Useless-for-Doubly-Efficient-PIR</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LN18---Yes,-There-is-an-Oblivious-RAM-Lower-Bound!</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LNO13---Hiding-the-Input-Size-in-Secure-Two-Party-Computation</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LPR10---On-ideal-lattices-and-learning-with-errors-over-rings</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LR88---How-to-Construct-Pseudorandom-Permutations-from-Pseudorandom-Functions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LS15---On-the-hardness-of-LWE-with-binary-error</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/LV15---On-Basing-Private-Information-Retrieval-on-NP-Hardness</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Lam79---Constructing-digital-signatures-from-a-one-way-function</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/MM11---On-Black-Box-Separations-among-Injective-One-Way-Functions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/MMP+10---The-Limits-of-Two-Party-Differential-Privacy</loc>
    <lastmod>2025-03-07T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/MPZ20---Unifying-Generic-Group-Models</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Mau05---Abstract-Models-of-Computation-in-Cryptography</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Mer89---A-Certified-Digital-Signature</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/NN23---A-Distribution-Testing-Oracle-Separation-between-QMA-and-QCMA</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/NR97---Number-Theoretic-Constructions-of-Efficient-Pseudo-Random-Functions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Naor91---Bit-commitment-using-pseudorandomness</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Ost91---One-way-functions,-hard-on-average-problems,-and-statistical-zero-knowledge-proofs</loc>
    <lastmod>2025-02-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/PPY22---Anamorphic-Encryption-Private-Communication-against-a-Dictator</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Pai99---Public-key-cryptosystems-based-on-composite-degree-residuosity-classes</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Pap94---On-the-complexity-of-the-parity-argument-and-other-inefficient-proofs-of-existence</loc>
    <lastmod>2025-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/RSA78---A-method-for-obtaining-digital-signatures-and-public-key-cryptosystems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/RTV04---Notions-of-Reducibility-between-Cryptographic-Primitives</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/RW13---New-Constructions-and-Proof-Methods-for-Large-Universe-Attribute-Based-Encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Rabin81---How-to-Exchange-Secrets-with-Oblivious-Transfer</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Reg05---On-Lattices,-Learning-with-Errors,-Random-Linear-Codes,-and-Cryptography</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/SS11---Making-NTRU-as-secure-as-worst-case-problems-over-ideal-lattices</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/SW05---Fuzzy-Identity-Based-Encryption</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/SW14---How-to-Use-Indistinguishability-Obfuscation-Deniable-Encryption,-and-More</loc>
    <lastmod>2025-01-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/SW25---Binary-Codes-for-Error-Detection-and-Correction-in-a-Computationally-Bounded-World</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/SW25---Detecting-and-Correcting-Computationally-Bounded--Errors-A-Simple-Construction-Under-Minimal-Assumptions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/SZZ18---PPP-Completeness-with-Connections-to-Cryptography</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Sch91---Efficient-signature-generation-by-smart-cards</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Sha79---How-to-share-a-secret</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Sho97---Lower-Bounds-for-Discrete-Logarithms-and-Related-Problems</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Shor97---Polynomial-time-algorithms-for-prime-factorization-and-discrete-logarithms-on-a-quantum-computer</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Tar08---Optimal-probabilistic-fingerprint-codes</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Vad06---An-Unconditional-Study-of-Computational-Zero-Knowledge</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Wat09---Dual-System-Encryption-Realizing-Fully-Secure-IBE-and-HIBE-under-Simple-Assumptions</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Wat11---Ciphertext-Policy-Attribute-Based-Encryption-from-Subset-Cover</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Wil25---Simulating-Time-in-Square-Root-Space</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Wul07---Oblivious-Transfer-Amplification</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Wul09---Oblivious-Transfer-from-Weak-Noisy-Channels</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/YZ16---Cryptography-with-Auxiliary-Input-and-Trapdoor-from-Constant-Noise-LPN</loc>
    <lastmod>2025-05-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/YZW+19---Collision-Resistant-Hashing-from-Sub-exponential-Learning-Parity-with-Noise</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Yao82---Protocols-for-secure-computations</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/Yeo23---Lower-Bounds-for-(Batch)-PIR-with-Private-Preprocessing</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/References/vAH04---Public-Key-Steganography</loc>
    <lastmod>2025-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/impagliazzos-five-worlds</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url><url>
    <loc>https://cryptology.city/</loc>
    <lastmod>2026-04-01T10:45:13.000Z</lastmod>
  </url></urlset>