Cryptology ePrint Archive: Listing for 2019
Regex
2019/1499 (PDF ) Authenticated Key Distribution: When the Coupon Collector is Your Enemy Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Roenne, Peter Y. A. Ryan
2019/1498 (PDF ) Supersingular Isogeny-Based Designated Verifier Blind Signature Rajeev Anand Sahu, Agnese Gini, Ankan Pal
2019/1497 (PDF ) Analysis of Modified Shell Sort for Fully Homomorphic Encryption Joon-Woo Lee, Young-Sik Kim, Jong-Seon No
2019/1496 (PDF ) Improved on Identity-based quantum signature based on Bell states Chang-Bin Wang, Shu-Mei Hsu, Hsiang Chang, Jue-Sam Chou
2019/1495 (PDF ) Tight Security of Cascaded LRW2 Ashwin Jha, Mridul Nandi
2019/1494 (PDF ) Scaling Verifiable Computation Using Efficient Set Accumulators Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh
2019/1493 (PDF ) Solving $X^{q+1}+X+a=0$ over Finite Fields Kwang Ho Kim, Junyop Choe, Sihem Mesnager
2019/1492 (PDF ) Too Much Crypto Jean-Philippe Aumasson
2019/1491 (PDF ) Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9 Yuyin Yu, Nikolay Kaleyski, Lilya Budaghyan, Yongqiang Li
2019/1490 (PDF ) Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
2019/1489 (PDF ) Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement Joël Alwen, Margarita Capretto, Miguel Cueto, Chethan Kamath, Karen Klein, Ilia Markov, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo
2019/1488 (PDF ) Fine-Grained Cryptography Revisited Shohei Egashira, Yuyu Wang, Keisuke Tanaka
2019/1487 (PDF ) SNR-Centric Power Trace Extractors for Side-Channel Attacks Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang
2019/1486 (PDF ) RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations Ramiro Martínez, Paz Morillo
2019/1485 (PDF ) Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki
2019/1484 (PDF ) Force-Locking Attack on Sync Hotstuff Atsuki Momose, Jason Paul Cruz
2019/1483 (PDF ) Communication--Computation Trade-offs in PIR Asra Ali, Tancrède Lepoint, Sarvar Patel, Mariana Raykova, Phillipp Schoppmann, Karn Seth, Kevin Yeo
2019/1482 (PDF ) Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof Jiaheng Zhang, Tiancheng Xie, Yupeng Zhang, Dawn Song
2019/1481 (PDF ) On metric regularity of Reed-Muller codes Alexey Oblaukhov
2019/1480 (PDF ) Analogue of Vélu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves Fouazou Lontouo Perez Broon, Emmanuel Fouotsa
2019/1479 (PDF ) A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups Jongkil Kim, Willy Susilo, Fuchun Guo, Joonsang Baek, Nan Li
2019/1478 (PDF ) Leakage Detection with Kolmogorov-Smirnov Test Xinping Zhou, Kexin Qiao, Changhai Ou
2019/1477 (PDF ) Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis Daan van der Valk, Stjepan Picek, Shivam Bhasin
2019/1476 (PDF ) On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis Leo Weissbart
2019/1475 (PDF ) On the Security of Sponge-type Authenticated Encryption Modes Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
2019/1474 (PDF ) Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders Lichao Wu, Stjepan Picek
2019/1473 (PDF ) Splitting the Interpose PUF: A Novel Modeling Attack Strategy Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
2019/1472 (PDF ) Efficient Fully Secure Leakage-Deterring Encryption Jan Camenisch, Maria Dubovitskaya, Patrick Towa
2019/1471 (PDF ) A Privacy-Enhancing Framework for Internet of Things Services Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Sara Ricci
2019/1470 (PDF ) PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server Carsten Baum, Tore K. Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
2019/1469 (PDF ) The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures Georg Maringer, Tim Fritzmann, Johanna Sepúlveda
2019/1468 (PDF ) A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption Jung Hee Cheon, Duhyeong Kim, Taechan Kim, Yongha Son
2019/1467 (PDF ) Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies Andrew M. K. Nassief
2019/1466 (PDF ) A Note on the Instantiability of the Quantum Random Oracle Edward Eaton, Fang Song
2019/1465 (PDF ) An optimist's Poisson model of cryptanalysis Daniel R. L. Brown
2019/1464 (PDF ) New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni
2019/1463 (PDF ) Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation Amin Rezaei, Yuanqi Shen, Hai Zhou
2019/1461 (PDF ) Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP Morteza Adeli, Nasour Bagheri
2019/1460 (PDF ) Byzantine Fault Tolerance in Partially Synchronous Networks Yongge Wang
2019/1459 (PDF ) Side Channel Information Set Decoding using Iterative Chunking Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
2019/1458 (PDF ) Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery Moni Naor, Lior Rotem, Gil Segev
2019/1457 (PDF ) Fast and Secure Updatable Encryption Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
2019/1456 (PDF ) ModFalcon: compact signatures based on module NTRU lattices Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa
2019/1455 (PDF ) Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance Yanyan Liu, Yiru Sun
2019/1454 (PDF ) Practical Relativistic Zero-Knowledge for NP Claude Crépeau, Arnaud Massenet, Louis Salvail, Lucas Stinchcombe, Nan Yang
2019/1453 (PDF ) Saber on ESP32 Bin Wang, Xiaozhuo Gu, Yingshan Yang
2019/1452 (PDF ) Leakage-Resilient Lattice-Based Partially Blind Signatures D. Papachristoudis, D. Hristu-Varsakelis, F. Baldimtsi, G. Stephanides
2019/1451 (PDF ) Tight bound on NewHope failure probability Thomas Plantard, Arnaud Sipasseuth, Willy Susilo, Vincent Zucca
2019/1450 (PDF ) Extractors for Adversarial Sources via Extremal Hypergraphs Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li
2019/1449 (PDF ) Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL David Butler, David Aspinall, Adria Gascon
2019/1448 (PDF ) Investigating Profiled Side-Channel Attacks Against the DES Key Schedule Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
2019/1447 (PDF ) Benchmarking Post-Quantum Cryptography in TLS Christian Paquin, Douglas Stebila, Goutam Tamvada
2019/1446 (PDF ) Boolean functions for homomorphic-friendly stream ciphers Claude Carlet, Pierrick Méaux
2019/1445 (PDF ) Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
2019/1444 (PDF ) Compact Storage of Superblocks for NIPoPoW Applications Kostis Karantias, Aggelos Kiayias, Nikos Leonardos, Dionysis Zindros
2019/1443 (PDF ) CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist Abhrajit Sengupta, Ozgur Sinanoglu
2019/1441 (PDF ) A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications Paolo Santini, Alessandro Barenghi, Gerardo Pelosi, Marco Baldi, Franco Chiaraluce
2019/1440 (PDF ) Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems Sarah Azouvi, George Danezis, Valeria Nikolaenko
2019/1439 (PDF ) Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds S. Sharmila Deva Selvi, Irene Miriam Isaac, C. Pandu Rangan
2019/1438 (PDF ) A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang
2019/1437 (PDF ) Reverse Outsourcing: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme Fei Meng, Mingqiang Wang
2019/1436 (PDF ) Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
2019/1435 (PDF ) Confidential Assets on MimbleWimble Yi Zheng, Howard Ye, Patrick Dai, Tongcheng Sun, Vladislav Gelfer
2019/1434 (PDF ) About Low DFR for QC-MDPC Decoding Nicolas Sendrier, Valentin Vasseur
2019/1433 (PDF ) T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk
2019/1432 (PDF ) A Generic View on the Unified Zero-Knowledge Protocol and its Applications Diana Maimut, George Teseleanu
2019/1430 (PDF ) On the Impossibility of Probabilistic Proofs in Relativized Worlds Alessandro Chiesa, Siqi Liu
2019/1427 (PDF ) On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha
2019/1426 (PDF ) On asymptotically optimal tests for random number generators Boris Ryabko
2019/1425 (PDF ) HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT Zhiguo Wan, Wei Liu, Hui Cui
2019/1424 (PDF ) Efficient Side-Channel Secure Message Authentication with Better Bounds Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
2019/1423 (PDF ) QC-MDPC decoders with several shades of gray Nir Drucker, Shay Gueron, Dusan Kostic
2019/1422 (PDF ) IPDL: A Probabilistic Dataflow Logic for Cryptography Xiong Fan, Joshua Gancher, Greg Morrisett, Elaine Shi, Kristina Sojakova
2019/1421 (PDF ) Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations Nicky Mouha, Christopher Celi
2019/1420 (PDF ) A Non-Interactive Shuffle Argument With Low Trust Assumptions Antonis Aggelakis, Prastudy Fauzi, Georgios Korfiatis, Panos Louridas, Foteinos Mergoupis-Anagnou, Janno Siim, Michal Zajac
2019/1419 (PDF ) Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks Ahmet Turan Erozan, Michael Hefenbrock, Michael Beigl, Jasmin Aghassi-Hagmann, Mehdi B. Tahoori
2019/1418 (PDF ) Designated-ciphertext Searchable Encryption Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo
2019/1417 (PDF ) CSIDH on Other Form of Elliptic Curves Xuejun Fan, Song Tian, Bao Li, Xiu Xu
2019/1416 (PDF ) The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption Melissa Chase, Trevor Perrin, Greg Zaverucha
2019/1415 (PDF ) Toward A More Efficient Gröbner-based Algebraic Cryptanalysis Hossein Arabnezhad-Khanoki, Babak Sadeghiyan
2019/1413 (PDF ) Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/1412 (PDF ) Cryptanalysis and Improvement of Smart-ID's Clone Detection Mechanism Augustin P. Sarr
2019/1411 (PDF ) Isochronous Gaussian Sampling: From Inception to Implementation James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
2019/1409 (PDF ) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang
2019/1408 (PDF ) The group of automorphisms of the set of self-dual bent functions Aleksandr Kutsenko
2019/1407 (PDF ) Incrementally Verifiable Computation via Incremental PCPs Moni Naor, Omer Paneth, Guy N. Rothblum
2019/1406 (PDF ) Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting Tassos Dimtiriou
2019/1405 (PDF ) Revisiting Higher-Order Computational Attacks against White-Box Implementations Houssem Maghrebi, Davide Alessio
2019/1404 (PDF ) CSIDH on the surface Wouter Castryck, Thomas Decru
2019/1402 (PDF ) Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations Vincent HERBERT
2019/1401 (PDF ) SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1400 (PDF ) RedShift: Transparent SNARKs from List Polynomial Commitments Assimakis Kattis, Konstantin Panarin, Alexander Vlasov
2019/1399 (PDF ) (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes Jan-Pieter D'Anvers, Mélissa Rossi, Fernando Virdia
2019/1398 (PDF ) How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework Xiaoxia Jiang, Youliang Tian
2019/1397 (PDF ) How to compartment secrets Gaëlle Candel, Rémi Géraud-Stewart, David Naccache
2019/1396 (PDF ) A note on the multivariate cryptosystem based on a linear code Yasufumi Hashimoto
2019/1395 (PDF ) McTiny: fast high-confidence post-quantum key erasure for tiny network servers Daniel J. Bernstein, Tanja Lange
2019/1394 (PDF ) Voltage-based Covert Channels using FPGAs Dennis R. E. Gnad, Cong Dang Khoa Nguyen, Syed Hashim Gillani, Mehdi B. Tahoori
2019/1393 (PDF ) SoK: Computer-Aided Cryptography Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
2019/1392 (PDF ) Decryption failure is more likely after success Nina Bindel, John M. Schanck
2019/1391 (PDF ) Are These Pairing Elements Correct? Automated Verification and Applications Susan Hohenberger, Satyanarayana Vusirikala
2019/1390 (PDF ) Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
2019/1389 (PDF ) Generic Attack on Iterated Tweakable FX Constructions Ferdinand Sibleyras
2019/1388 (PDF ) Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code Jayashree Dey, Ratna Dutta
2019/1387 (PDF ) The supersingular isogeny problem in genus 2 and beyond Craig Costello, Benjamin Smith
2019/1386 (PDF ) Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version) Chao Liu, Zhongxiang Zheng, Keting Jia, Qidi You
2019/1385 (PDF ) Improvements of the Balance Discovery Attack on Lightning Network Payment Channels Gijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, Halimah Badioze Zaman
2019/1384 (PDF ) Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations Keita Emura, Shuichi Katsumata, Yohei Watanabe
2019/1383 (PDF ) Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities Karim Eldefrawy, Tancrède Lepoint, Antonin Leroux
2019/1382 (PDF ) On the Power of Multiple Anonymous Messages Badih Ghazi, Noah Golowich, Ravi Kumar, Rasmus Pagh, Ameya Velingker
2019/1381 (PDF ) The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions Kaisa Nyberg
2019/1380 (PDF ) Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs Elif Bilge Kavun, Nele Mentens, Jo Vliegen, Tolga Yalcin
2019/1379 (PDF ) Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes Christophe Clavier, Léo Reynaud
2019/1378 (PDF ) Alzette: a 64-bit ARX-box (feat. CRAX and TRAX) Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang
2019/1377 (PDF ) A Scalable Post-quantum Hash-Based Group Signature Masoumeh Shafieinejad, Navid Nasr Esfahani
2019/1376 (PDF ) Generic Constructions of RIBE via Subset Difference Method Xuecheng Ma, Dongdai Lin
2019/1375 (PDF ) New ideas to build noise-free homomorphic cryptosystems Gérald Gavin, Sandrine Tainturier
2019/1374 (PDF ) Challenges of Post-Quantum Digital Signing in Real-world Applications: A Survey Teik Guan Tan, Pawel Szalachowski, Jianying Zhou
2019/1373 (PDF ) A note on the cost of computing odd degree isogenies Daniel Cervantes-Vázquez, Francisco Rodríguez-Henríquez
2019/1372 (PDF ) Analyzing the Linear Keystream Biases in AEGIS Maria Eichlseder, Marcel Nageler, Robert Primas
2019/1371 (PDF ) A short-list of pairing-friendly curves resistant to Special TNFS at the 128-bit security level Aurore Guillevic
2019/1370 (PDF ) A Subset Fault Analysis of ASCON Priyanka Joshi, Bodhisatwa Mazumdar
2019/1369 (PDF ) Impeccable Circuits II Aein Rezaei Shahmirzadi, Shahram Rasoolzadeh, Amir Moradi
2019/1368 (PDF ) Efficient FPGA Implementations of LowMC and Picnic Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner
2019/1367 (PDF ) Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption Keitaro Hashimoto, Wakaha Ogata, Toi Tomita
2019/1366 (PDF ) A Lattice-based Enhanced Privacy ID Nada EL Kassem, Luis Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa
2019/1365 (PDF ) FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh
2019/1364 (PDF ) Boolean Functions with Multiplicative Complexity 3 and 4 Cagdas Calik, Meltem Sonmez Turan, Rene Peralta
2019/1363 (PDF ) Multi-Device for Signal Sébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque
2019/1362 (PDF ) A Modern View on Forward Security Colin Boyd, Kai Gellert
2019/1361 (PDF ) Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level Kaushik Nath, Palash Sarkar
2019/1360 (PDF ) Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol Daniele Cozzo, Nigel P. smart
2019/1359 (PDF ) Universal Forgery Attack against GCM-RUP Yanbin Li, Gaëtan Leurent, Meiqin Wang, Wei Wang, Guoyan Zhang, Yu Liu
2019/1358 (PDF ) Traceable Inner Product Functional Encryption Xuan Thanh Do, Duong Hieu Phan, David Pointcheval
2019/1357 (PDF ) Cryptanalysis of the Legendre PRF and generalizations Ward Beullens, Tim Beyne, Aleksei Udovenko, Giuseppe Vitto
2019/1356 (PDF ) Towards Post-Quantum Security for Signal's X3DH Handshake Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila
2019/1355 (PDF ) A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code Daniel Smith-Tone, Cristina Tone
2019/1354 (PDF ) BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, Butian Huang
2019/1353 (PDF ) Laconic Conditional Disclosure of Secrets and Applications Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta
2019/1352 (PDF ) Spectral analysis of ZUC-256 Jing Yang, Thomas Johansson, Alexander Maximov
2019/1351 (PDF ) Speeding Up OMD Instantiations in Hardware Diana Maimut, Alexandru Stefan Mega
2019/1350 (PDF ) Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun
2019/1349 (PDF ) UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
2019/1348 (PDF ) Network Time with a Consensus on Clock Handan Kilinc Alper
2019/1347 (PDF ) Variants of Wegman-Carter Message Authentication Code Supporting Variable Tag Lengths Sebati Ghosh, Palash Sarkar
2019/1346 (PDF ) Privacy-Preserving Decentralised Singular Value Decomposition Bowen Liu, Qiang Tang
2019/1345 (PDF ) Audita: A Blockchain-based Auditing Framework for Off-chain Storage Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano
2019/1344 (PDF ) From Fairness to Full Security in Multiparty Computation Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
2019/1343 (PDF ) An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber Yue Qin, Chi Cheng, Jintai Ding
2019/1342 (PDF ) Scalable Wildcarded Identity-Based Encryption Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh
2019/1341 (PDF ) Succinct Non-Interactive Secure Computation Andrew Morgan, Rafael Pass, Antigoni Polychroniadou
2019/1340 (PDF ) Secret Shared Shuffle Melissa Chase, Esha Ghosh, Oxana Poburinnaya
2019/1339 (PDF ) Extracting Randomness from Extractor-Dependent Sources Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs
2019/1338 (PDF ) Two-party Private Set Intersection with an Untrusted Third Party Phi Hung Le, Samuel Ranellucci, S. Dov Gordon
2019/1337 (PDF ) Offline Witness Encryption with Semi-Adaptive Security Peter Chvojka, Tibor Jager, Saqib A. Kakvi
2019/1336 (PDF ) Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers Neal Koblitz, Alfred Menezes
2019/1335 (PDF ) On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions Tibor Jager, David Niehues
2019/1334 (PDF ) Privacy-Preserving Distributed Machine Learning based on Secret Sharing Ye Dong, Xiaojun Chen, Liyan Shen
2019/1333 (PDF ) The Dark SIDH of Isogenies Paul Bottinelli, Victoria de Quehen, Chris Leonardi, Anton Mosunov, Filip Pawlega, Milap Sheth
2019/1332 (PDF ) SEAL: Sealed-Bid Auction Without Auctioneers Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil G. Ray
2019/1331 (PDF ) Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating? Melissa Azouaoui, Romain Poussier, François-Xavier Standaert, Vincent Verneuil
2019/1330 (PDF ) OptiSwap: Fast Optimistic Fair Exchange Lisa Eckey, Sebastian Faust, Benjamin Schlosser
2019/1329 (PDF ) Drinfeld modules may not be for isogeny based cryptography Antoine Joux, Anand Kumar Narayanan
2019/1328 (PDF ) Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices Yashvanth Kondi, Bernardo Magri, Claudio Orlandi, Omer Shlomovits
2019/1327 (PDF ) Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain Donghoon Chang, Munawar Hasan, Pranav Jain
2019/1326 (PDF ) Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
2019/1325 (PDF ) Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2019/1324 (PDF ) Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme Avijit Dutta, Mridul Nandi
2019/1323 (PDF ) Secure Quantum Extraction Protocols Prabhanjan Ananth, Rolando L. La Placa
2019/1322 (PDF ) An Efficient Micropayment Channel on Ethereum Hisham S. Galal, Muhammad ElSheikh, Amr M. Youssef
2019/1321 (PDF ) Supersingular isogeny key exchange for beginners Craig Costello
2019/1320 (PDF ) Homomorphic Encryption Random Beacon Alisa Cherniaeva, Ilia Shirobokov, Omer Shlomovits
2019/1319 (PDF ) Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64 (Full Version) Mingjiang Huang, Liming Wang
2019/1318 (PDF ) Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications (Full Version) Mingjiang Huang, Liming Wang
2019/1317 (PDF ) Reverse Firewalls for Actively Secure MPCs Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen
2019/1316 (PDF ) Binary Kummer Line Sabyasachi Karati
2019/1315 (PDF ) Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
2019/1314 (PDF ) Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang
2019/1313 (PDF ) On Oblivious Amplification of Coin-Tossing Protocols Nir Bitansky, Nathan Geier
2019/1312 (PDF ) Cryptographic Fault Diagnosis using VerFI Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova
2019/1311 (PDF ) BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments Jiwon Lee, Jihye Kim, Hyunok Oh
2019/1310 (PDF ) Lightweight Iterative MDS Matrices: How Small Can We Go? Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu
2019/1309 (PDF ) SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism Sujoy Sinha Roy
2019/1308 (PDF ) A Novel CCA Attack using Decryption Errors against LAC Qian Guo, Thomas Johansson, Jing Yang
2019/1305 (PDF ) Privacy-Preserving Computation over Genetic Data: HLA Matching and so on Jinming Cui, Huaping Li, Meng Yang
2019/1304 (PDF ) Reduction Modulo $2^{448}-2^{224}-1$ Kaushik Nath, Palash Sarkar
2019/1302 (PDF ) There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt
2019/1301 (PDF ) Modular lattice signatures, revisited Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang
2019/1300 (PDF ) Actively Secure Setup for SPDZ Dragos Rotaru, Nigel P. Smart, Titouan Tanguy, Frederik Vercauteren, Tim Wood
2019/1299 (PDF ) A constant-rate non-malleable code in the split-state model. Divesh Aggarwal, Maciej Obremski
2019/1298 (PDF ) An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings Mark Abspoel, Anders Dalskov, Daniel Escudero, Ariel Nof
2019/1297 (PDF ) Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors Hamid Nejatollahi, Sina Shahhosseini, Rosario Cammarota, Nikil Dutt
2019/1296 (PDF ) FastSwap: Concretely Efficient Contingent Payments for Complex Predicates Mathias Hall-Andersen
2019/1295 (PDF ) A trip between creation and destruction of non-commutative public key exchange protocols Borja Gómez
2019/1294 (PDF ) Hashing to elliptic curves of $j$-invariant $1728$ Dmitrii Koshelev
2019/1293 (PDF ) LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR Chi-Gon Jung, JongHyeok Lee, Youngjin Ju, Yong-Been Kwon, Seong-Woo Kim, Yunheung Paek
2019/1292 (PDF ) Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2019/1291 (PDF ) SÉTA: Supersingular Encryption from Torsion Attacks Luca De Feo, Cyprien Delpech de Saint Guilhem, Tako Boris Fouotsa, Péter Kutas, Antonin Leroux, Christophe Petit, Javier Silva, Benjamin Wesolowski
2019/1290 (PDF ) Trapdoor DDH groups from pairings and isogenies Péter Kutas, Christophe Petit, Javier Silva
2019/1289 (PDF ) On constant-time QC-MDPC decoding with negligible failure rate Nir Drucker, Shay Gueron, Dusan Kostic
2019/1288 (PDF ) Threshold Schemes from Isogeny Assumptions Luca De Feo, Michael Meyer
2019/1287 (PDF ) MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019/1286 (PDF ) Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains Ambili K N, Jimmy Jose
2019/1285 (PDF ) Full-Round Differential Attack on DoT Block Cipher Manoj Kumar
2019/1284 (PDF ) Shorter QA-NIZK and SPS with Tighter Security Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang
2019/1283 (PDF ) Breaking the Hidden Irreducible Polynomials Scheme Christian Eder
2019/1282 (PDF ) Privacy-Preserving Decision Tree Training and Prediction against Malicious Server Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald
2019/1281 (PDF ) Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer Geoffroy Couteau, Bill Roscoe, Peter Ryan
2019/1280 (PDF ) Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2019/1279 (PDF ) Post-quantum Zero Knowledge in Constant Rounds Nir Bitansky, Omri Shmueli
2019/1278 (PDF ) An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric Hamad Al Shehhi, Emanuele Bellini, Filipe Borba, Florian Caullery, Marc Manzano, Victor Mateu
2019/1277 (PDF ) Towards Quantum-Safe VPNs and Internet Maran van Heesch, Niels van Adrichem, Thomas Attema, Thijs Veugen
2019/1276 (PDF ) Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. Panos Kampanakis, Dimitrios Sikeridis
2019/1275 (PDF ) Updatable Oblivious Key Management for Storage Systems Stanislaw Jarecki, Hugo Krawczyk, Jason Resch
2019/1274 (PDF ) Rank-metric Encryption on Arm-Cortex M0 Ameirah al Abdouli, Emanuele Bellini, Florian Caullery, Marc Manzano, Victor Mateu
2019/1273 (PDF ) A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, Kris Gaj
2019/1272 (PDF ) The Niederreiter cryptosystem and Quasi-Cyclic codes Upendra Kapshikar, Ayan Mahalanobis
2019/1271 (PDF ) Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart
2019/1270 (PDF ) SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh
2019/1269 (PDF ) Repudiable Ring Signature: Stronger Security and Logarithmic-Size Hao Lin, Mingqiang Wang
2019/1268 (PDF ) On the Security of RSA-PSS in the Wild Saqib A. Kakvi
2019/1266 (PDF ) Note on the noise growth of the RNS variants of the BFV scheme Jean Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
2019/1264 (PDF ) Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era Juan Garay, Aggelos Kiayias, Rafail Ostrovsky, Giorgos Panagiotakos, Vassilis Zikas
2019/1263 (PDF ) Comments on Cryptographic Entropy Measurement Anna Johnston
2019/1262 (PDF ) A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran
2019/1261 (PDF ) On Round-By-Round Soundness and State Restoration Attacks Justin Holmgren
2019/1260 (PDF ) TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions Anita Aghaie, Amir Moradi
2019/1259 (PDF ) Security and Efficiency Trade-offs for Elliptic Curve Diffie-Hellman at the 128-bit and 224-bit Security Levels Kaushik Nath, Palash Sarkar
2019/1258 (PDF ) Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper) Shogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
2019/1257 (PDF ) Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj
2019/1256 (PDF ) Permuted Puzzles and Cryptographic Hardness Elette Boyle, Justin Holmgren, Mor Weiss
2019/1255 (PDF ) Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular Daniel Benarroch, Matteo Campanelli, Dario Fiore, Kobi Gurkan, Dimitris Kolonelos
2019/1254 (PDF ) Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map Jiseung Kim, Changmin Lee
2019/1253 (PDF ) Probabilistic Properties of Modular Addition \\ (Extended abstract) Victoria Vysotskaya
2019/1252 (PDF ) Simplifying Constructions and Assumptions for $i\mathcal{O}$ Aayush Jain, Huijia Lin, Amit Sahai
2019/1251 (PDF ) Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits Anca Nitulescu
2019/1250 (PDF ) The Price of Active Security in Cryptographic Protocols Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss
2019/1249 (PDF ) Related-key Attack on 5-Round Kuznyechik Vitaly Kiryukhin
2019/1248 (PDF ) A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis Bastian Richter, David Knichel, Amir Moradi
2019/1247 (PDF ) A Note on Masking Generic Boolean Functions Lauren De Meyer, Felix Wegener, Amir Moradi
2019/1246 (PDF ) A Note on Our Submission to Track 4 of iDASH 2019 Marcel Keller, Ke Sun
2019/1245 (PDF ) Observations on the Quantum Circuit of the SBox of AES Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong
2019/1244 (PDF ) A Note on a Static SIDH Protocol Samuel Dobson, Trey Li, Lukas Zobernig
2019/1242 (PDF ) Non-Profiled Side Channel Attack based on Deep Learning using Picture Trace Jong-Yoen Park, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Yoo-Seung Won
2019/1241 (PDF ) SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim
2019/1240 (PDF ) Forward and Backward Private DSSE for Range Queries Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, Lei Xu
2019/1239 (PDF ) Computationally Modeling User-Mediated Authentication Protocols Britta Hale
2019/1238 (PDF ) Linear-Regression on Packed Encrypted Data in the Two-Server Model Adi Akavia, Hayim Shaul, Mor Weiss, Zohar Yakhini
2019/1237 (PDF ) QFactory: classically-instructed remote secret qubits preparation Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden
2019/1236 (PDF ) Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack Bo-Yeon Sim, Dong-Guk Han
2019/1235 (PDF ) Physical Cryptography Mariana Costiuc, Diana Maimut, George Teseleanu
2019/1234 (PDF ) Efficient Homomorphic Comparison Methods with Optimal Complexity Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim
2019/1233 (PDF ) Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, Nuttapong Attrapadung
2019/1232 (PDF ) Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
2019/1231 (PDF ) Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications Zhao Chunhuan, Zheng Zhongxiang, Wang Xiaoyun, Xu Guangwu
2019/1230 (PDF ) Linear-Size Constant-Query IOPs for Delegating Computation Eli Ben-Sasson, Alessandro Chiesa, Lior Goldberg, Tom Gur, Michael Riabzev, Nicholas Spooner
2019/1229 (PDF ) Transparent SNARKs from DARK Compilers Benedikt Bünz, Ben Fisch, Alan Szepieniec
2019/1228 (PDF ) Guess what?! On the impossibility of unconditionally secure public-key encryption Lorenz Panny
2019/1227 (PDF ) Dynamic Searchable Encryption with Small Client Storage Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou
2019/1225 (PDF ) Analysis of Nakamoto Consensus, Revisited Jianyu Niu, Chen Feng, Hoang Dau, Yu-Chih Huang, Jingge Zhu
2019/1224 (PDF ) Practical Volume-Based Attacks on Encrypted Databases Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa
2019/1223 (PDF ) Integrita: Protecting View-Consistency in Online Social Network with Federated Servers Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/1222 (PDF ) Sub-Linear Privacy-Preserving Near-Neighbor Search M. Sadegh Riazi, Beidi Chen, Anshumali Shrivastava, Dan Wallach, Farinaz Koushanfar
2019/1221 (PDF ) Probabilistic Data Structures in Adversarial Environments David Clayton, Christopher Patton, Thomas Shrimpton
2019/1220 (PDF ) Side-channel Attacks on Blinded Scalar Multiplications Revisited Thomas Roche, Laurent Imbert, Victor Lomné
2019/1219 (PDF ) Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper) Nugier Cyrius, Adelin Remi, Migliore Vincent, Alata Eric
2019/1218 (PDF ) On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages Abdur Rehman Raza, Khawir Mahmood, Muhammad Faisal Amjad, Haider Abbas, Mehreen Afzal
2019/1216 (PDF ) Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm Wei-Zhu Yeoh, Je Sen Teh, Jiageng Chen
2019/1215 (PDF ) Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/1214 (PDF ) A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption Farokhlagha Moazami, Masoumeh Safkhani
2019/1213 (PDF ) Exploring Lightweight Efficiency of ForkAES Fatih Balli, Subhadeep Banik
2019/1212 (PDF ) Swap and Rotate: Lightweight linear layers for SPN-based blockciphers Subhadeep Banik, Fatih Balli, Francesco Regazzoni, Serge Vaudenay
2019/1211 (PDF ) Topology-Hiding Computation for Networks with Unknown Delays Rio LaVigne, Chen-Da Liu-Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi
2019/1210 (PDF ) Adaptive Security of Practical Garbling Schemes Zahra Jafargholi, Sabine Oechsner
2019/1209 (PDF ) On collisions related to an ideal class of order 3 in CSIDH Hiroshi Onuki, Tsuyoshi Takagi
2019/1208 (PDF ) Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective Xenia Bogomolec, John Gregory Underhill, Stiepan Aurélien Kovac
2019/1207 (PDF ) Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications Borja Gómez
2019/1206 (PDF ) High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography Jing Tian, Zhe Liu, Jun Lin, Zhongfeng Wang, Binjing Li
2019/1205 (PDF ) Secure Multi-party Quantum Computation with a Dishonest Majority Yfke Dulek, Alex Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner
2019/1204 (PDF ) Efficient simulation of random states and random unitaries Gorjan Alagic, Christian Majenz, Alexander Russell
2019/1203 (PDF ) Authentication in Key-Exchange: Definitions, Relations and Composition Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi
2019/1202 (PDF ) Rational isogenies from irrational endomorphisms Wouter Castryck, Lorenz Panny, Frederik Vercauteren
2019/1201 (PDF ) Efficient Redactable Signature and Application to Anonymous Credentials Olivier Sanders
2019/1200 (PDF ) A note on short invertible ring elements and applications to cyclotomic and trinomials number fields Thomas Attema, Ronald Cramer, Chaoping Xing
2019/1199 (PDF ) Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices Max Hoffmann, Michael Klooß, Markus Raiber, Andy Rupp
2019/1198 (PDF ) Encrypted Databases: New Volume Attacks against Range Queries Zichen Gui, Oliver Johnson, Bogdan Warinschi
2019/1197 (PDF ) Secret sharing and duality Laszlo Csirmaz
2019/1196 (PDF ) Evaluating Octic Residue Symbols Marc Joye
2019/1195 (PDF ) Non-Malleable Commitments Using Goldreich-Levin List Decoding Vipul Goyal, Silas Richelson
2019/1194 (PDF ) Perfect Forward Security of SPAKE2 Michel Abdalla, Manuel Barbosa
2019/1193 (PDF ) Security models for everlasting privacy Panagiotis Grontas, Aris Pagourtzis, Alexandros Zacharakis
2019/1192 (PDF ) Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets Daniel Berend, Dor Bitan, Shlomi Dolev
2019/1191 (PDF ) On the equivalence of authentication codes and robust (2,2)-threshold schemes Maura B. Paterson, Douglas R. Stinson
2019/1190 (PDF ) Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT Fulei Ji, Wentao Zhang, Tianyou Ding
2019/1189 (PDF ) Security Analysis and Improvements for the IETF MLS Standard for Group Messaging Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis
2019/1188 (PDF ) Improving Password Guessing via Representation Learning Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti
2019/1187 (PDF ) Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs Orr Dunkelman, Léo Perrin
2019/1186 (PDF ) Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences Mahabir Prasad Jhanwar, Pratyush Ranjan Tiwari
2019/1185 (PDF ) Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL David Butler, Andreas Lochbihler, David Aspinall, Adria Gascon
2019/1184 (PDF ) A concrete instantiation of Bulletproof zero-knowledge proof Andrey Jivsov
2019/1183 (PDF ) Broadcast-Optimal Two-Round MPC Ran Cohen, Juan Garay, Vassilis Zikas
2019/1182 (PDF ) Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries Serge Fehr, Chen Yuan
2019/1180 (PDF ) Key Recovery from Gram-Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
2019/1179 (PDF ) Practical MP-LWE-based encryption balancing security-risk vs. efficiency Ron Steinfeld, Amin Sakzad, Raymond K. Zhao
2019/1178 (PDF ) SoK: Sharding on Blockchain Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1177 (PDF ) Proofs for Inner Pairing Products and Applications Benedikt Bünz, Mary Maller, Pratyush Mishra, Nirvan Tyagi, Psi Vesely
2019/1176 (PDF ) The Thirteenth Power Residue Symbol Eric Brier, David Naccache
2019/1175 (PDF ) Revisiting Leakage Abuse Attacks Laura Blackstone, Seny Kamara, Tarik Moataz
2019/1174 (PDF ) Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography Borja Gómez
2019/1173 (PDF ) Immunization against Complete Subversion without Random Oracles Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi
2019/1172 (PDF ) Lever: Breaking the Shackles of Scalable On-chain Validation Mingming Wang, Qianhong Wu
2019/1171 (PDF ) Almost universal codes for MIMO wiretap channels Laura Luzzi, Roope Vehkalahti, Cong Ling
2019/1170 (PDF ) Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count Iggy van Hoof
2019/1169 (PDF ) Semantically Secure Lattice Codes for Compound MIMO Channels Antonio Campello, Cong Ling, Jean-Claude Belfiore
2019/1168 (PDF ) Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting) Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu
2019/1167 (PDF ) BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications Nabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann
2019/1166 (PDF ) The complete cost of cofactor h=1 Peter Schwabe, Amber Sprenkels
2019/1165 (PDF ) Fast verification of masking schemes in characteristic two Nicolas Bordes, Pierre Karpman
2019/1164 (PDF ) Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version) Chao Liu, Zhongxiang Zheng, Keting Jia, Limin Tao
2019/1163 (PDF ) On the Difficulty of FSM-based Hardware Obfuscation Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar
2019/1162 (PDF ) Subversion-Resistant Simulation (Knowledge) Sound NIZKs Karim Baghery
2019/1161 (PDF ) Estimating quantum speedups for lattice sieves Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
2019/1160 (PDF ) Cryptanalysis of the Multivariate Encryption Scheme EFLASH Morten Øygarden, Patrick Felke, Håvard Raddum, Carlos Cid
2019/1159 (PDF ) Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
2019/1158 (PDF ) Practical Privacy-Preserving K-means Clustering Payman Mohassel, Mike Rosulek, Ni Trieu
2019/1157 (PDF ) A Note on the Chi-square Method : A Tool for Proving Cryptographic Security Srimanta Bhattacharya, Mridul Nandi
2019/1156 (PDF ) How to Extract Useful Randomness from Unreliable Sources Divesh Aggarwal, Maciej Obremski, João Ribeiro, Luisa Siniscalchi, Ivan Visconti
2019/1155 (PDF ) Machine-Checked Proofs for Cryptographic Standards José Bacelar Almeida, Cécile Baritel-Ruet, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Alley Stoughton, Pierre-Yves Strub
2019/1154 (PDF ) The Retracing Boomerang Attack Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
2019/1153 (PDF ) Stronger Security and Constructions of Multi-Designated Verifier Signatures Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nițulescu, Claudio Orlandi, Sophia Yakoubov
2019/1152 (PDF ) Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs Jonas Krautter, Dennis R. E. Gnad, Falk Schellenberg, Amir Moradi, Mehdi B. Tahoori
2019/1151 (PDF ) Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem Yusuke Yoshida, Fuyuki Kitagawa, Keisuke Tanaka
2019/1150 (PDF ) The Bitcoin Backbone Protocol Against Quantum Adversaries Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, Petros Wallden
2019/1149 (PDF ) LockDown: Balance Availability Attack against Lightning Network Channels Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquin Garcia-Alfaro
2019/1148 (PDF ) On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption Benjamin R. Curtis, Rachel Player
2019/1147 (PDF ) Batching non-membership proofs with bilinear accumulators Steve Thakur
2019/1146 (PDF ) Implementing Grover oracles for quantum key search on AES and LowMC Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia
2019/1145 (PDF ) B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion Craig Costello
2019/1144 (PDF ) Rerandomizable Signatures under Standard Assumption Sanjit Chatterjee, R. Kabaleeshwaran
2019/1143 (PDF ) Auditable Compressed Storage Iraklis Leontiadis, Reza Curtmola
2019/1142 (PDF ) Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP Tamalika Mukherjee, Noah Stephens-Davidowitz
2019/1141 (PDF ) KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
2019/1140 (PDF ) Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version) Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
2019/1139 (PDF ) Coded Merkle Tree: Solving Data Availability Attacks in Blockchains Mingchao Yu, Saeid Sahraei, Songze Li, Salman Avestimehr, Sreeram Kannan, Pramod Viswanath
2019/1138 (PDF ) ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage Gang Wang, Zhijie Jerry Shi, Mark Nixon, Song Han
2019/1137 (PDF ) On the Complexity of Arithmetic Secret Sharing Ronald Cramer, Chaoping Xing, Chen Yuan
2019/1136 (PDF ) An implementation of the Paillier crypto system with threshold decryption without a trusted dealer Thijs Veugen, Thomas Attema, Gabriele Spini
2019/1135 (PDF ) A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing Arinjita Paul, S. Sharmila Deva Selvi, C. Pandu Rangan
2019/1134 (PDF ) Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes Ronald Cramer, Chaoping Xing
2019/1133 (PDF ) Threat Models and Security of Phase-Change Memory Gang Wang
2019/1132 (PDF ) Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2019/1131 (PDF ) Nearly Optimal Robust Secret Sharing against Rushing Adversaries Pasin Manurangsi, Akshayaram Srinivasan, Prashant Nalini Vasudevan
2019/1130 (PDF ) On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode. V. Ustimenko
2019/1129 (PDF ) Privacy-Enhanced Machine Learning with Functional Encryption Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
2019/1128 (PDF ) SoK: Communication Across Distributed Ledgers Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, William J. Knottenbelt
2019/1127 (PDF ) Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing Kazuhiko Minematsu, Norifumi Kamiya
2019/1126 (PDF ) Encrypted Distributed Dictionaries Archita Agarwal, Seny Kamara
2019/1125 (PDF ) Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref
2019/1124 (PDF ) Evolving Ramp Secret Sharing with a Small Gap Amos Beimel, Hussien Othman
2019/1123 (PDF ) FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme Laltu Sardar, Sushmita Ruj
2019/1122 (PDF ) Exploring Trade-offs in Batch Bounded Distance Decoding Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer
2019/1121 (PDF ) Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors Aaron Hutchinson, Jason LeGrow, Brian Koziel, Reza Azarderakhsh
2019/1120 (PDF ) Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
2019/1119 (PDF ) MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version) Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko
2019/1118 (PDF ) A Diffie-Hellman quantum session key establishment protocol without entanglement Yalin Chen, Chang Hsiang, Liang-Chun Wang, Yu-Yuan Chou, Jue-Sam Chou
2019/1116 (PDF ) Computational Extractors with Negligible Error in the CRS Model Ankit Garg, Yael Tauman Kalai, Dakshita Khurana
2019/1115 (PDF ) Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2019/1114 (PDF ) A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE Jung Hee Cheon, Minki Hhan, Seungwan Hong, Yongha Son
2019/1113 (PDF ) Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector Oliver Masters, Hamish Hunt, Enrico Steffinlongo, Jack Crawford, Flavio Bergamaschi, Maria E. Dela Rosa, Caio C. Quini, Camila T. Alves, Feranda de Souza, Deise G. Ferreira
2019/1112 (PDF ) Subliminal Hash Channels George Teseleanu
2019/1111 (PDF ) Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers Mikerah Quintyne-Collins
2019/1109 (PDF ) Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Nicolas Gama, Mariya Georgieva, Fernando Pérez-González
2019/1108 (PDF ) Lower Bounds for Multi-Server Oblivious RAMs Kasper Green Larsen, Mark Simkin, Kevin Yeo
2019/1107 (PDF ) On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, Dragos Rotaru, Markus Schofnegger
2019/1106 (PDF ) Side-channel Masking with Pseudo-Random Generator Jean-Sébastien Coron, Aurélien Greuet, Rina Zeitoun
2019/1105 (PDF ) On the Multi-User Security of Short Schnorr Signatures with Preprocessing Jeremiah Blocki, Seunghoon Lee
2019/1104 (PDF ) More Efficient MPC from Improved Triple Generation and Authenticated Garbling Kang Yang, Xiao Wang, Jiang Zhang
2019/1103 (PDF ) Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels
2019/1101 (PDF ) On the (Quantum) Random Oracle Methodology: New Separations and More Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang
2019/1100 (PDF ) Efficient Explicit Constructions of Multipartite Secret Sharing Schemes Qi Chen, Chunming Tang, Zhiqiang Lin
2019/1099 (PDF ) On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name Eman Salem Alashwali, Kasper Rasmussen
2019/1098 (PDF ) Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling Eleftheria Makri, Tim Wood
2019/1097 (PDF ) Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann
2019/1096 (PDF ) Proof-of-Burn Kostis Karantias, Aggelos Kiayias, Dionysis Zindros
2019/1095 (PDF ) Secure Computation with Preprocessing via Function Secret Sharing Elette Boyle, Niv Gilboa, Yuval Ishai
2019/1094 (PDF ) Is Information-Theoretic Topology-Hiding Computation Possible? Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, Tal Moran
2019/1093 (PDF ) Quantum Random Oracle Model with Auxiliary Input Minki Hhan, Keita Xagawa, Takashi Yamakawa
2019/1092 (PDF ) Cerberus Channels: Incentivizing Watchtowers for Bitcoin Georgia Avarikioti, Orfeas Stefanos Thyfronitis Litos, Roger Wattenhofer
2019/1091 (PDF ) Short Paper: XOR Arbiter PUFs have Systematic Response Bias Nils Wisiol, Niklas Pirnay
2019/1090 (PDF ) Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB Xinggu Chen, Haining Fan
2019/1089 (PDF ) Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing Josiah Johnson Umezurike
2019/1088 (PDF ) KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability Clinton Ehrlich, Anna Guzova
2019/1087 (PDF ) Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data Shyam Murthy, Srinivas Vivek
2019/1086 (PDF ) The SPHINCS+ Signature Framework Daniel J. Bernstein, Andreas Hülsing, Stefan Kölbl, Ruben Niederhagen, Joost Rijneveld, Peter Schwabe
2019/1085 (PDF ) Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee
2019/1084 (PDF ) Distributed Vector-OLE: Improved Constructions and Implementation Phillipp Schoppmann, Adrià Gascón, Leonie Reichert, Mariana Raykova
2019/1083 (PDF ) What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS Eman Salem Alashwali, Kasper Rasmussen
2019/1082 (PDF ) On the Security of Multikey Homomorphic Encryption Hyang-Sook Lee, Jeongeun Park
2019/1081 (PDF ) OCEAN: A Built-In Replacement for Mining Pools Raymond Chee, Kartik Chitturi, Edouard Dufour-Sans, Kyle Soska
2019/1080 (PDF ) Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods Fukang Liu, Takanori Isobe, Willi Meier
2019/1079 (PDF ) When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited Yiming Zhu, Zhen Liu, Yanbin Pan
2019/1078 (PDF ) Puncturable Proxy Re-Encryption supporting to Group Messaging Service Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu
2019/1077 (PDF ) Adaptively Secure Garbling Schemes for Parallel Computations Kai-Min Chung, Luowen Qian
2019/1076 (PDF ) Fractal: Post-Quantum and Transparent Recursive Proofs from Holography Alessandro Chiesa, Dev Ojha, Nicholas Spooner
2019/1075 (PDF ) Private Information Retrieval with Sublinear Online Time Henry Corrigan-Gibbs, Dmitry Kogan
2019/1074 (PDF ) Non-monotonic Practical ABE with Direct Revocation, Blackbox Traceability, and a Large Attribute Universe Dirk Thatmann
2019/1073 (PDF ) iUC: Flexible Universal Composability Made Simple Jan Camenisch, Stephan Krenn, Ralf Kuesters, Daniel Rausch
2019/1072 (PDF ) Rate-1 Trapdoor Functions from the Diffie-Hellman Problem Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, Giulio Malavolta
2019/1071 (PDF ) DLSCA: a Tool for Deep Learning Side Channel Analysis Martin Brisfors, Sebastian Forsmark
2019/1070 (PDF ) Secure Delegation of Isogeny Computations and Cryptographic Applications Robi Pedersen, Osmanbey Uzunkol
2019/1069 (PDF ) Efficient Private PEZ Protocols for Symmetric Functions Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta
2019/1068 (PDF ) Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets Efficiently Joey Green, Tilo Burghardt, Elisabeth Oswald
2019/1067 (PDF ) Lattice Trapdoors and IBE from Middle-Product LWE Alex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong
2019/1066 (PDF ) HEAX: An Architecture for Computing on Encrypted Data M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai
2019/1065 (PDF ) Subversion-Resistant Commitment Schemes: Definitions and Constructions Karim Baghery
2019/1064 (PDF ) Separating Symmetric and Asymmetric Password-Authenticated Key Exchange Julia Hesse
2019/1063 (PDF ) A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig
2019/1062 (PDF ) Local Proofs Approaching the Witness Length Noga Ron-Zewi, Ron D. Rothblum
2019/1061 (PDF ) Breaking and Fixing Anonymous Credentials for the Cloud Ulrich Haböck, Stephan Krenn
2019/1060 (PDF ) Sharing the LUOV: Threshold Post-Quantum Signatures Daniele Cozzo, Nigel P. smart
2019/1059 (PDF ) A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem Daniele Di Tullio, Ankan Pal
2019/1058 (PDF ) Privacy-preserving auditable token payments in a permissioned blockchain system Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann
2019/1057 (PDF ) A Study of Persistent Fault Analysis Andrea Caforio, Subhadeep Banik
2019/1056 (PDF ) Adventures in Supersingularland Sarah Arpin, Catalina Camacho-Navarro, Kristin Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková
2019/1055 (PDF ) Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
2019/1054 (PDF ) Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence David Cerezo Sánchez
2019/1053 (PDF ) Modeling Memory Faults in Signature and Authenticated Encryption Schemes Marc Fischlin, Felix Günther
2019/1052 (PDF ) Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem Abderrahmane Nitaj, Willy Susilo, Joseph Tonien
2019/1051 (PDF ) A New Public Key Cryptosystem Based on Edwards Curves Maher Boudabra, Abderrahmane Nitaj
2019/1050 (PDF ) A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem Abderrahmane Nitaj, Emmanuel Fouotsa
2019/1049 (PDF ) CrypTFlow: Secure TensorFlow Inference Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma
2019/1048 (PDF ) New point compression method for elliptic $\mathbb{F}_{\!q^2}$-curves of $j$-invariant $0$ Dmitrii Koshelev
2019/1047 (PDF ) Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS Alessandro Chiesa, Yuncong Hu, Mary Maller, Pratyush Mishra, Psi Vesely, Nicholas Ward
2019/1046 (PDF ) The Function-Inversion Problem: Barriers and Opportunities Henry Corrigan-Gibbs, Dmitry Kogan
2019/1045 (PDF ) Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank Josh Alman, Robin Hui
2019/1044 (PDF ) Verifiable Registration-Based Encryption Rishab Goyal, Satyanarayana Vusirikala
2019/1043 (PDF ) Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack Eli Biham, Lior Neumann
2019/1042 (PDF ) A Machine-Checked Proof of Security for AWS Key Management Service José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Matthew Campagna, Ernie Cohen, Benjamin Gregoire, Vitor Pereira, Bernardo Portela, Pierre-Yves Strub, Serdar Tasiran
2019/1041 (PDF ) A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs Swapnil Paliwal, Anvita Chandrakar
2019/1040 (PDF ) Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators Abhishek Chakraborty, Ankur Srivastava
2019/1039 (PDF ) Accelerated V2X provisioning with Extensible Processor Platform Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Marcos Simplicio Jr., Diego F. Aranha, Ruud Derwig, Harsh Kupwade-Patil
2019/1038 (PDF ) Dynamic Searchable Encryption with Access Control Johannes Blömer, Nils Löken
2019/1037 (PDF ) Card-based Cryptography Meets Formal Verification Alexander Koch, Michael Schrempp, Michael Kirsten
2019/1036 (PDF ) Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies Kazuki Yoneyama
2019/1035 (PDF ) An LLL Algorithm for Module Lattices Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
2019/1034 (PDF ) Sponges Resist Leakage: The Case of Authenticated Encryption Jean Paul Degabriele, Christian Janson, Patrick Struck
2019/1033 (PDF ) Anonymous AE John Chan, Phillip Rogaway
2019/1032 (PDF ) On Fully Secure MPC with Solitary Output Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin
2019/1031 (PDF ) An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice Rahim Toluee, Taraneh Eghlidos
2019/1030 (PDF ) How to leverage hardness of constant degree expanding polynomials over R to build iO Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
2019/1029 (PDF ) Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures Yilei Chen, Nicholas Genise, Pratyay Mukherjee
2019/1028 (PDF ) Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors Divesh Aggarwal, Bogdan Ursu, Serge Vaudenay
2019/1027 (PDF ) Quantum LLL with an Application to Mersenne Number Cryptosystems Marcel Tiepelt, Alan Szepieniec
2019/1025 (PDF ) On Perfect Correctness without Derandomization Gilad Asharov, Naomi Ephraim, Ilan Komargodski, Rafael Pass
2019/1024 (PDF ) Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix Dor Bitan, Shlomi Dolev
2019/1023 (PDF ) Randomly Choose an Angle from Immense Number of Angles to Rotate Qubits, Compute and Reverse Dor Bitan, Shlomi Dolev
2019/1022 (PDF ) A Simple and Efficient Key Reuse Attack on NTRU Cryptosystem Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, Zheng Zhang
2019/1021 (PDF ) Recursive Proof Composition without a Trusted Setup Sean Bowe, Jack Grigg, Daira Hopwood
2019/1020 (PDF ) Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity Alexander Vlasov, Konstantin Panarin
2019/1019 (PDF ) Revisiting the Hybrid attack on sparse and ternary secret LWE Yongha Son, Jung Hee Cheon
2019/1018 (PDF ) Towards Instantiating the Algebraic Group Model Julia Kastner, Jiaxin Pan
2019/1017 (PDF ) The Local Forking Lemma and its Application to Deterministic Encryption Mihir Bellare, Wei Dai, Lucy Li
2019/1016 (PDF ) Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving Elena Kirshanova, Erik Mårtensson, Eamonn W. Postlethwaite, Subhayan Roy Moulik
2019/1015 (PDF ) Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures. Eleftherios Kokoris-Kogias, Dahlia Malkhi, Alexander Spiegelman
2019/1014 (PDF ) Security Reductions for White-Box Key-Storage in Mobile Payments Estuardo Alpirez Bock, Chris Brzuska, Marc Fischlin, Christian Janson, Wil Michiels
2019/1013 (PDF ) A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules') Carolyn Whitnall, Elisabeth Oswald
2019/1012 (PDF ) Simple and Efficient KDM-CCA Secure Public Key Encryption Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
2019/1011 (PDF ) COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers Raymond K. Zhao, Ron Steinfeld, Amin Sakzad
2019/1010 (PDF ) On Perfect Correctness in (Lockable) Obfuscation Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
2019/1009 (PDF ) LLL and stochastic sandpile models Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang
2019/1008 (PDF ) Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations Olivier Bronchain, François-Xavier Standaert
2019/1007 (PDF ) SPAE a mode of operation for AES on low-cost hardware Philippe Elbaz-Vincent, Cyril Hugounenq, Sébastien Riou
2019/1006 (PDF ) Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable) Francesco Lucente Stabile, Carey Patrick Atkins
2019/1005 (PDF ) Threshold Implementations in the Robust Probing Model Siemen Dhooghe, Svetla Nikova, Vincent Rijmen
2019/1004 (PDF ) Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizar
2019/1003 (PDF ) Twisted Hessian Isogenies Thinh Dang, Dustin Moody
2019/1002 (PDF ) Boomerang Uniformity of Popular S-box Constructions Shizhu Tian, Christina Boura, Léo Perrin
2019/1001 (PDF ) Middle-Product Learning with Rounding Problem and its Applications Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
2019/1000 (PDF ) Security of Symmetric Primitives against Key-Correlated Attacks Aisling Connolly, Pooya Farshim, Georg Fuchsbauer
2019/999 (PDF ) On the Fast Algebraic Immunity of Majority Functions Pierrick Méaux
2019/998 (PDF ) Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation Arpita Patra, Divya Ravi
2019/997 (PDF ) On the (In)security of Kilian-Based SNARGs James Bartusek, Liron Bronfman, Justin Holmgren, Fermi Ma, Ron Rothblum
2019/996 (PDF ) Pseudorandom Black Swans: Cache Attacks on CTR_DRBG Shaanan Cohney, Andrew Kwong, Shachar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom
2019/995 (PDF ) Blackbox Constructions from Mix-Nets Douglas Wikström
2019/994 (PDF ) A new family of APN quadrinomials Lilya Budaghyan, Tor Helleseth, Nikolay Kaleyski
2019/993 (PDF ) Private Set Relations with Bloom Filters for Outsourced SLA Validation Louis Tajan, Dirk Westhoff, Frederik Armknecht
2019/992 (PDF ) Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin
2019/991 (PDF ) Vectorized linear approximations for attacks on SNOW 3G Jing Yang, Thomas Johansson, Alexander Maximov
2019/990 (PDF ) Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More Sanjam Garg, Mohammad Hajiabadi, Rafail Ostrovsky
2019/989 (PDF ) Substitution Attacks against Message Authentication Marcel Armour, Bertram Poettering
2019/988 (PDF ) RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications David W. Archer, Jose Manuel Calderon Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard Ryan
2019/987 (PDF ) Subverting Decryption in AEAD Marcel Armour, Bertram Poettering
2019/986 (PDF ) Outpost: A Responsive Lightweight Watchtower Majid Khabbazian, Tejaswi Nadahalli, Roger Wattenhofer
2019/985 (PDF ) EthDKG: Distributed Key Generation with Ethereum Smart Contracts Philipp Schindler, Aljosha Judmayer, Nicholas Stifter, Edgar Weippl
2019/984 (PDF ) Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions Sam Kim, David J. Wu
2019/983 (PDF ) Graph Similarity and Its Applications to Hardware Security Marc Fyrbiak, Sebastian Wallat, Sascha Reinhard, Nicolai Bissantz, Christof Paar
2019/982 (PDF ) CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama
2019/981 (PDF ) Traceback for End-to-End Encrypted Messaging Nirvan Tyagi, Ian Miers, Thomas Ristenpart
2019/980 (PDF ) New Approaches to Traitor Tracing with Embedded Identities Rishab Goyal, Venkata Koppula, Brent Waters
2019/979 (PDF ) PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks Kalikinkar Mandal, Guang Gong
2019/978 (PDF ) Strength in Numbers: Improving Generalization with Ensembles in Profiled Side-channel Analysis Guilherme Perin, Lukasz Chmielewski, Stjepan Picek
2019/977 (PDF ) Non-malleable Zero-Knowledge Arguments with Lower Round Complexity Zhenbin Yan, Yi Deng
2019/976 (PDF ) Towards real-time hidden speaker recognition by means of fully homomorphic encryption Martin Zuber, Sergiu Carpov, Renaud Sirdey
2019/974 (PDF ) Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel P. Smart, Tim Wood
2019/973 (PDF ) On the Non-Existence of Short Vectors in Random Module Lattices Ngoc Khanh Nguyen
2019/972 (PDF ) Noninteractive Zero Knowledge Proof System for NP from Ring LWE Wenping MA
2019/971 (PDF ) Verifpal: Cryptographic Protocol Analysis for the Real World Nadim Kobeissi, Georgio Nicolas, Mukesh Tiwari
2019/969 (PDF ) Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography Russell W. F. Lai, Giulio Malavolta, Viktoria Ronge
2019/968 (PDF ) There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero William Black, Ryan Henry
2019/967 (PDF ) On NIST's Compression Estimate Test Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
2019/966 (PDF ) Fast, Compact, and Expressive Attribute-Based Encryption Junichi Tomida, Yuto Kawahara, Ryo Nishimaki
2019/965 (PDF ) Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness Andrea Caforio, F Betül Durak, Serge Vaudenay
2019/964 (PDF ) WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited Georg Fuchsbauer
2019/963 (PDF ) Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits Pascal Aubry, Sergiu Carpov, Renaud Sirdey
2019/962 (PDF ) New Constructions of Hinting PRGs, OWFs with Encryption, and more Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
2019/961 (PDF ) Computing across Trust Boundaries using Distributed Homomorphic Cryptography Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Pierre Hubaux
2019/960 (PDF ) Another Look at Key Randomisation Hypotheses Subhabrata Samajder, Palash Sarkar
2019/959 (PDF ) Table Redundancy Method for Protecting against Fault Attacks Seungkwang Lee, Nam-su Jho, Myungchul Kim
2019/958 (PDF ) Using SMT Solvers to Automate Chosen Ciphertext Attacks Gabrielle Beck, Maximilian Zinkus, Matthew Green
2019/957 (PDF ) TaaS: Commodity MPC via Triples-as-a-Service Nigel P. Smart, Titouan Tanguy
2019/956 (PDF ) Security of Hedged Fiat-Shamir Signatures under Fault Attacks Diego F. Aranha, Claudio Orlandi, Akira Takahashi, Greg Zaverucha
2019/955 (PDF ) Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications Antonio Faonio, Dario Fiore, Javier Herranz, Carla Ràfols
2019/954 (PDF ) CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme Mohsen Jahanbani, Zeinolabedin Norouzi, Nasour Bagheri
2019/953 (PDF ) PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge Ariel Gabizon, Zachary J. Williamson, Oana Ciobotaru
2019/952 (PDF ) Non-Interactive Zero Knowledge Proofs in the Random Oracle Model Vincenzo Iovino, Ivan Visconti
2019/951 (PDF ) Collisions on Feistel-MiMC and univariate GMiMC Xavier Bonnetain
2019/950 (PDF ) Another look at some isogeny hardness assumptions Simon-Philipp Merz, Romy Minko, Christophe Petit
2019/949 (PDF ) A Note on Parameter Choices of Round5 Yongha Son
2019/948 (PDF ) Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin
2019/947 (PDF ) nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski
2019/946 (PDF ) Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design M Sazadur Rahman, Adib Nahiyan, Sarah Amir, Fahim Rahman, Farimah Farahmandi, Domenic Forte, Mark Tehranipoor
2019/945 (PDF ) A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting Navid Ghaedi Bardeh
2019/944 (PDF ) Efficient zero-knowledge arguments in the discrete log setting, revisited Max Hoffmann, Michael Klooß, Andy Rupp
2019/943 (PDF ) Analysis of Nakamoto Consensus Ling Ren
2019/942 (PDF ) Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model Handan Kılınç Alper
2019/941 (PDF ) Does "www." Mean Better Transport Layer Security? Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019/940 (PDF ) Security analysis of two lightweight certificateless signature schemes Nasrollah Pakniat
2019/939 (PDF ) Homomorphic Encryption Standard Martin Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan
2019/938 (PDF ) Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem Gaëtan Leurent, Ferdinand Sibleyras
2019/937 (PDF ) Fault Template Attacks on Block Ciphers Exploiting Fault Propagation Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay
2019/936 (PDF ) SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions Markku-Juhani O. Saarinen
2019/934 (PDF ) Linear Approximations of Random Functions and Permutations Mohsin Khan, Kaisa Nyberg
2019/933 (PDF ) Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen
2019/932 (PDF ) Related-key Differential Cryptanalysis of Full Round CRAFT Muhammad ElSheikh, Amr M. Youssef
2019/931 (PDF ) Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory Andre Esser, Alexander May
2019/930 (PDF ) Module-LWE versus Ring-LWE, Revisited Yang Wang, Mingqiang Wang
2019/929 (PDF ) On the Degree-Insensitive SI-GDH problem and assumption Samuel Dobson, Steven D. Galbraith
2019/928 (PDF ) Blockchain-enabled Cryptographically-secure Hardware Obfuscation Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert, Domenic Forte
2019/927 (PDF ) Isogeny-based hashing despite known endomorphisms Lorenz Panny
2019/926 (PDF ) Formal Verification of a Constant-Time Preserving C Compiler Gilles Barthe, Sandrine Blazy, Benjamin Grégoire, Rémi Hutin, Vincent Laporte, David Pichardie, Alix Trieu
2019/925 (PDF ) Fully Auditable Privacy-preserving Cryptocurrency Against Malicious Auditors Wulu Li, Yongcan Wang, Lei Chen, Xin Lai, Xiao Zhang, Jiajun Xin
2019/924 (PDF ) Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework Dirk Achenbach, Roland Gröll, Timon Hackenjos, Alexander Koch, Bernhard Löwe, Jeremias Mechler, Jörn Müller-Quade, Jochen Rill
2019/923 (PDF ) Automated Probe Repositioning for On-Die EM Measurements Bastian Richter, Alexander Wild, Amir Moradi
2019/922 (PDF ) A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation Karim Eldefrawy, Vitor Pereira
2019/921 (PDF ) Tree authenticated ephemeral keys Pavol Zajac
2019/920 (PDF ) Related-Key Differential Slide Attack Against Fountain V1 Raluca Posteuca
2019/919 (PDF ) Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection (extended version∗) Wei Cheng, Claude Carlet, Kouassi Goli, Sylvain Guilley, Jean-Luc Danger
2019/918 (PDF ) Resolving the Trilemma in Logic Encryption Hai Zhou, Amin Rezaei, Yuanqi Shen
2019/917 (PDF ) Simplified Revocable Hierarchical Identity-Based Encryption from Lattices Shixiong Wang, Juanyang Zhang, Jingnan He, Huaxiong Wang, Chao Li
2019/915 (PDF ) Unique Rabin-Williams Signature Scheme Decryption Lynn Margaret Batten, Hugh Cowie Williams
2019/914 (PDF ) Composable and Finite Computational Security of Quantum Message Transmission Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu
2019/913 (PDF ) Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — An Analytical Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography Wen-Ran Zhang
2019/912 (PDF ) Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
2019/911 (PDF ) IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography Gildas Avoine, Sébastien Canard, Loïc Ferreira
2019/910 (PDF ) Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
2019/909 (PDF ) A Practicable Timing Attack Against HQC and its Countermeasure Guillaume Wafo-Tapa, Slim Bettaieb, Loic Bidoux, Philippe Gaborit, Etienne Marcatel
2019/908 (PDF ) Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
2019/907 (PDF ) Practical Forgery Attacks on Limdolen and HERN Raghvendra Rohit, Guang Gong
2019/906 (PDF ) Efficient and secure software implementations of Fantomas Rafael J. Cruz, Antonio Guimarães, Diego F. Aranha
2019/904 (PDF ) Timed-Release Encryption With Master Time Bound Key (Full Version) Gwangbae Choi, Serge Vaudenay
2019/903 (PDF ) Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases Igor Semaev, Andrea Tenti
2019/902 (PDF ) Fractional LWE: a nonlinear variant of LWE Gérald Gavin, Stéphane Bonnevay
2019/901 (PDF ) Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs Thomas Haines, Clementine Gritti
2019/899 (PDF ) A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P Michael Yonli
2019/898 (PDF ) One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips Mehdi Tibouchi, Alexandre Wallet
2019/897 (PDF ) On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem Vasyl Ustimenko
2019/896 (PDF ) On the optionality and fairness of Atomic Swaps Runchao Han, Haoyu Lin, Jiangshan Yu
2019/895 (PDF ) The Singularity Attack to the Multivariate Signature Scheme Himq-3 Jintai Ding, Zheng Zhang, Joshua Deaton, Vishakha
2019/894 (PDF ) BioID: a Privacy-Friendly Identity Document Fatih Balli, F. Betül Durak, Serge Vaudenay
2019/893 (PDF ) New Efficient, Constant-Time Implementations of Falcon Thomas Pornin
2019/892 (PDF ) CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption Patrick Kresmer, Alexander Zeh
2019/891 (PDF ) Shielded Computations in Smart Contracts Overcoming Forks Vincenzo Botta, Daniele Friolo, Daniele Venturi, Ivan Visconti
2019/890 (PDF ) An Adaptive Attack on 2-SIDH Samuel Dobson, Steven D. Galbraith, Jason LeGrow, Yan Bo Ti, Lukas Zobernig
2019/889 (PDF ) Securing DNSSEC Keys via Threshold ECDSA From Generic MPC Anders Dalskov, Marcel Keller, Claudio Orlandi, Kris Shrishak, Haya Shulman
2019/888 (PDF ) Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed Mustafa Khairallah
2019/887 (PDF ) Accelerating V2X Cryptography through Batch Operations Paul Bottinelli, Robert Lambert
2019/886 (PDF ) Round Complexity of Byzantine Agreement, Revisited T-H. Hubert Chan, Rafael Pass, Elaine Shi
2019/885 (PDF ) On the alpha value of polynomials in the tower number field sieve algorithm Aurore Guillevic, Shashank Singh
2019/884 (PDF ) Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures Mahesh Sreekumar Rajasree
2019/883 (PDF ) HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller
2019/882 (PDF ) Modifying The Tropical Version of Stickel’s Key Exchange Protocol Any Muanalifah, Serge˘ı Sergeev
2019/881 (PDF ) On the Boomerang Uniformity of some Permutation Polynomials Marco Calderini, Irene Villa
2019/880 (PDF ) A Blockchain-Based Access Control Scheme for Smart Grids Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li
2019/879 (PDF ) Cube-Based Cryptanalysis of Subterranean-SAE Fukang Liu, Takanori Isobe, Willi Meier
2019/878 (PDF ) Algebraically Structured LWE, Revisited Chris Peikert, Zachary Pepin
2019/877 (PDF ) Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model Georg Fuchsbauer, Antoine Plouviez, Yannick Seurin
2019/876 (PDF ) Kadcast: A Structured Approach to Broadcast in Blockchain Networks Elias Rohrer, Florian Tschorsch
2019/875 (PDF ) Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication Daan Leermakers, Boris Skoric
2019/874 (PDF ) ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing Fei Meng, Mingqiang Wang
2019/873 (PDF ) Count of rotational symmetric bent Boolean functions Shashi Kant Pandey, P. R. Mishra
2019/872 (PDF ) Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Chen Yuan
2019/871 (PDF ) Non-Locality and Zero-Knowledge MIPs Claude Crépeau, Nan Yang
2019/870 (PDF ) The Eleventh Power Residue Symbol Marc Joye, Oleksandra Lapiha, Ky Nguyen, David Naccache
2019/869 (PDF ) ProtectIOn: Root-of-Trust for IO in Compromised Platforms Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
2019/868 (PDF ) On the Round Complexity of Randomized Byzantine Agreement Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky
2019/867 (PDF ) A Practical Forgery Attack on Lilliput-AE Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
2019/866 (PDF ) A Fast Characterization Method for Semi-invasive Fault Injection Attacks Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek
2019/865 (PDF ) Cryptanalysis of Reduced-Round SipHash Le He, Hongbo Yu
2019/863 (PDF ) Fast Actively Secure Five-Party Computation with Security Beyond Abort Megha Byali, Carmit Hazay, Arpita Patra, Swati Singla
2019/862 (PDF ) Key recovery attacks on the Legendre PRFs within the birthday bound Dmitry Khovratovich
2019/861 (PDF ) A Tale of Three Signatures: practical attack of ECDSA with wNAF Gabrielle De Micheli, Rémi Piau, Cécile Pierrot
2019/860 (PDF ) Machine learning and side channel analysis in a CTF competition Yongbo Hu, Yeyang Zheng, Pengwei Feng, Lirui Liu, Chen Zhang, Aron Gohr, Sven Jacob, Werner Schindler, Ileana Buhan, Karim Tobich
2019/859 (PDF ) A Coin-Free Oracle-Based Augmented Black Box Framework Kyosuke Yamashita, Mehdi Tibouchi, Masayuki Abe
2019/858 (PDF ) Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH Eric Crockett, Christian Paquin, Douglas Stebila
2019/857 (PDF ) Bitcontracts: Supporting Smart Contracts in Legacy Blockchains Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
2019/856 (PDF ) More results on Shortest Linear Programs Subhadeep Banik, Yuki Funabiki, Takanori Isobe
2019/855 (PDF ) WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery Dominic Dams, Jeff Lataille, Rino Sanchez, John Wade
2019/854 (PDF ) Reducing the Cost of Implementing AES as a Quantum Circuit Brandon Langenberg, Hai Pham, Rainer Steinwandt
2019/853 (PDF ) A critique of game-based definitions of receipt-freeness for voting Ashley Fraser, Elizabeth A. Quaglia, Ben Smyth
2019/852 (PDF ) Weak-Key Distinguishers for AES Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
2019/851 (PDF ) On Designing Lightweight RFID Security Protocols for Medical IoT Masoumeh Safkhani, Ygal Bendavid, Samad Rostampour, Nasour Bagheri
2019/850 (PDF ) Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles Morteza Adeli, Nasour Bagheri
2019/849 (PDF ) Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems Ambili K N, Jimmy Jose
2019/848 (PDF ) Observations on the DLCT and Absolute Indicators Anne Canteaut, Lukas Kölsch, Friedrich Wiemer
2019/847 (PDF ) Improved Heuristics for Short Linear Programs Quan Quan Tan, Thomas Peyrin
2019/846 (PDF ) Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions Yuechen Chen, Linru Zhang, Siu-Ming Yiu
2019/845 (PDF ) A Reaction Attack against Cryptosystems based on LRPC Codes Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas
2019/844 (PDF ) pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4 Matthias J. Kannwischer, Joost Rijneveld, Peter Schwabe, Ko Stoffelen
2019/843 (PDF ) How to Construct CSIDH on Edwards Curves Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi
2019/842 (PDF ) Improved SIMD Implementation of Poly1305 Sreyosi Bhattacharyya, Palash Sarkar
2019/841 (PDF ) Practical Cryptanalysis of k-ary C* Daniel Smith-Tone
2019/840 (PDF ) A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida
2019/839 (PDF ) Statistical Zap Arguments from Quasi-Polynomial LWE Abhishek Jain, Zhengzhong Jin
2019/838 (PDF ) Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, Vassilis Zikas
2019/837 (PDF ) Stronger and Faster Side-Channel Protections for CSIDH Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, Benjamin Smith
2019/836 (PDF ) Optimal Transport Layer for Secure Computation Markus Brandt, Claudio Orlandi, Kris Shrishak, Haya Shulman
2019/835 (PDF ) ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts Karl Wüst, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun
2019/834 (PDF ) Succinct Arguments in the Quantum Random Oracle Model Alessandro Chiesa, Peter Manohar, Nicholas Spooner
2019/833 (PDF ) AES MixColumn with 92 XOR gates Alexander Maximov
2019/832 (PDF ) Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC Ronald Cramer, Matthieu Rambaud, Chaoping Xing
2019/831 (PDF ) Privacy of Stateful RFID Systems with Constant Tag Identifiers Cristian Hristea, Ferucio Laurentiu Tiplea
2019/830 (PDF ) The Simplest Multi-key Linearly Homomorphic Signature Scheme Diego F. Aranha, Elena Pagnin
2019/829 (PDF ) Batch Binary Weierstrass Billy Bob Brumley, Sohaib ul Hassan, Alex Shaindlin, Nicola Tuveri, Kide Vuojärvi
2019/828 (PDF ) Optimal Collision Side-Channel Attacks Cezary Glowacz, Vincent Grosso
2019/827 (PDF ) k-root-n: An efficient algorithm for avoiding short term double-spending alongside distributed ledger technologies such as blockchain Zvi Schreiber
2019/826 (PDF ) Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations Erdinç Öztürk
2019/825 (PDF ) Plaintext Recovery Attacks against XTS Beyond Collisions Takanori Isobe, Kazuhiko Minematsu
2019/824 (PDF ) Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look Behnaz Rezvani, Flora Coleman, Sachin Sachin, William Diehl
2019/823 (PDF ) Securely Sampling Biased Coins with Applications to Differential Privacy Jeffrey Champion, abhi shelat, Jonathan Ullman
2019/822 (PDF ) Surveying definitions of coercion resistance Thomas Haines, Ben Smyth
2019/821 (PDF ) Towards Forward Secure Internet Traffic Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
2019/820 (PDF ) Universal Location Referencing and Homomorphic Evaluation of Geospatial Query Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow
2019/819 (PDF ) Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow
2019/818 (PDF ) X-DeepSCA: Cross-Device Deep Learning Side Channel Attack Debayan Das, Anupam Golder, Josef Danial, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen
2019/817 (PDF ) Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions Tapas Pal, Ratna Dutta
2019/816 (PDF ) Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks Mirco Richter
2019/814 (PDF ) Faster Subgroup Checks for BLS12-381 Sean Bowe
2019/813 (PDF ) Multi-Client Symmetric Searchable Encryption with Forward Privacy Alexandros Bakas, Antonis Michalas
2019/812 (PDF ) Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree Chaoyun Li, Bart Preneel
2019/811 (PDF ) SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Saurabh Shintre
2019/810 (PDF ) Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs Jeroen Delvaux
2019/809 (PDF ) On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet Yosuke Todo, Willi Meier, Kazumaro Aoki
2019/808 (PDF ) 2-Message Publicly Verifiable WI from (Subexponential) LWE Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs
2019/807 (PDF ) Provable Security for PKI Schemes Sara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg
2019/806 (PDF ) Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk
2019/805 (PDF ) RRTxFM: Probabilistic Counting for Differentially Private Statistics Saskia Nuñez von Voigt, Florian Tschorsch
2019/804 (PDF ) Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions Claire Delaplace, Andre Esser, Alexander May
2019/803 (PDF ) Methodology for Efficient CNN Architectures in Profiling Attacks -- Extended Version Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2019/802 (PDF ) New Circuit Minimization Techniques for Smaller and Faster AES SBoxes Alexander Maximov, Patrik Ekdahl
2019/801 (PDF ) A Chosen Random Value Attack on WPA3 SAE authentication protocol Sheng Sun
2019/800 (PDF ) Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations? Claire Delaplace, Alexander May
2019/799 (PDF ) Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, Benjamin Zengin
2019/798 (PDF ) A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods Kwangsu Lee
2019/797 (PDF ) Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$ Douglas Martins, Gustavo Banegas, Ricardo Custodio
2019/796 (PDF ) The End of Logic Locking? A Critical View on the Security of Logic Locking Susanne Engels, Max Hoffmann, Christof Paar
2019/795 (PDF ) More Practical Single-Trace Attacks on the Number Theoretic Transform Peter Pessl, Robert Primas
2019/794 (PDF ) Efficient Cryptography on the RISC-V Architecture Ko Stoffelen
2019/793 (PDF ) On equivalence between known families of quadratic APN functions Lylia Budaghyan, Marco Calderini, Irene Villa
2019/792 (PDF ) TICK: Tiny Client for Blockchains Wei Zhang, Jiangshan Yu, Qingqiang He, Nan Zhang, Nan Guan
2019/791 (PDF ) Sublattice Attacks on LWE over Arbitrary Number Field Lattices Hao Chen
2019/790 (PDF ) Simple and Efficient Approach for Achieving End-to-End Anonymous Communication Wei Jiang, Adam Bowers, Dan Lin
2019/789 (PDF ) Relation between o-equivalence and EA-equivalence for Niho bent functions Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila
2019/788 (PDF ) The Impact of Time on DNS Security Aanchal Malhotra, Willem Toorop, Benno Overeinder, Ralph Dolmans, Sharon Goldberg
2019/787 (PDF ) Optimized implementation of the NIST PQC submission ROLLO on microcontroller Jérôme Lablanche, Lina Mortajine, Othman Benchaalal, Pierre-Louis Cayrel, Nadia El Mrabet
2019/786 (PDF ) P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation Rebecca Schwerdt, Matthias Nagel, Valerie Fetzer, Tobias Gräf, Andy Rupp
2019/785 (PDF ) A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography Yalin Chen, Jue-Sam Chou, Liang-Chun Wang, Yu-Yuan Chou
2019/784 (PDF ) Towards a Hybrid Public Key Infrastructure (PKI): A Review Priyadarshi Singh, Abdul Basit, N Chaitanya Kumar, V. Ch. Venkaiah
2019/783 (PDF ) Dissecting the CHES 2018 AES Challenge Tobias Damm, Sven Freud, Dominik Klein
2019/782 (PDF ) Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms Antoine Joux, Cecile Pierrot
2019/781 (PDF ) BBQ: Using AES in Picnic Signatures Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart
2019/780 (PDF ) Statistical ZAP Arguments Saikrishna Badrinarayan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai
2019/779 (PDF ) Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse
2019/778 (PDF ) A Composable Security Treatment of the Lightning Network Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2019/777 (PDF ) A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos Jörg Schwenk, Douglas Stebila
2019/776 (PDF ) Scalable Private Set Union from Symmetric-Key Techniques Vladimir Kolesnikov, Mike Rosulek, Ni Trieu, Xiao Wang
2019/775 (PDF ) Pay To Win: Cheap, Crowdfundable, Cross-chain Algorithmic Incentive Manipulation Attacks on PoW Cryptocurrencies Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar Weippl
2019/774 (PDF ) Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness Hamidreza Amini Khorasgani, Hemanta Maji, Tamalika Mukherjee
2019/773 (PDF ) Efficient Secure Ridge Regression from Randomized Gaussian Elimination Frank Blom, Niek J. Bouman, Berry Schoenmakers, Niels de Vreede
2019/772 (PDF ) Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box Lorenzo Grassi, Markus Schofnegger
2019/771 (PDF ) DDH-based Multisignatures with Public Key Aggregation Duc-Phong Le, Guomin Yang, Ali Ghorbani
2019/770 (PDF ) Practical Attacks on Reduced-Round AES Navid Ghaedi Bardeh, Sondre Rønjom
2019/769 (PDF ) Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2019/768 (PDF ) Distributing any Elliptic Curve Based Protocol Nigel P. Smart, Younes Talibi Alaoui
2019/767 (PDF ) On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$ Jaeseong Jeong, Chang Heon Kim, Namhun Koo, Soonhak Kwon, Sumin Lee
2019/766 (PDF ) Complexity of Estimating Renyi Entropy of Markov Chains Maciej Obremski, Maciej Skorski
2019/765 (PDF ) SPQCop: Side-channel protected Post-Quantum Cryptoprocessor Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya
2019/764 (PDF ) The Adversarial Robustness of Sampling Omri Ben-Eliezer, Eylon Yogev
2019/763 (PDF ) Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80 Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma
2019/762 (PDF ) Verifiable Computing for Approximate Computation Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park
2019/761 (PDF ) Athena: A verifiable, coercion-resistant voting system with linear complexity Ben Smyth
2019/760 (PDF ) Differential Fault Analysis of NORX Amit Jana, Dhiman Saha, Goutam Paul
2019/759 (PDF ) Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer
2019/758 (PDF ) Genus 2 Supersingular Isogeny Oblivious Transfer Ramsès Fernàndez-València
2019/757 (PDF ) EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cedric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph Wintersteiger, Santiago Zanella-Beguelin
2019/756 (PDF ) SKIVA: Flexible and Modular Side-channel and Fault Countermeasures Pantea Kiaei, Darius Mercadier, Pierre-Evariste Dagand, Karine Heydemann, Patrick Schaumont
2019/755 (PDF ) Generic Attacks on Hash Combiners Zhenzhen Bao, Itai Dinur, Jian Guo, Gaëtan Leurent, Lei Wang
2019/754 (PDF ) Is it Easier to Prove Theorems that are Guaranteed to be True? Rafael Pass, Muthuramakrishnan Venkitasubramaniam
2019/753 (PDF ) Design of Anonymous Endorsement System in Hyperledger Fabric Subhra Mazumdar, Sushmita Ruj
2019/752 (PDF ) Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, Shiping Chen
2019/751 (PDF ) Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic Thorsten Kleinjung, Benjamin Wesolowski
2019/750 (PDF ) A Short Note on a Weight Probability Distribution Related to SPNs Sondre Rønjom
2019/749 (PDF ) The privacy of the TLS 1.3 protocol Ghada Arfaoui, Xavier Bultel, Pierre-Alain Fouque, Adina Nedelcu, Cristina Onete
2019/748 (PDF ) Temporary Censorship Attacks in the Presence of Rational Miners Fredrik Winzer, Benjamin Herd, Sebastian Faust
2019/747 (PDF ) Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte
2019/746 (PDF ) Public-Key Function-Private Hidden Vector Encryption (and More) James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova
2019/745 (PDF ) Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation Vincenzo Iovino
2019/744 (PDF ) Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection Devin Reich, Ariel Todoki, Rafael Dowsley, Martine De Cock, Anderson C. A. Nascimento
2019/743 (PDF ) Lattice-Based Remote User Authentication from Reusable Fuzzy Signature Yangguang Tian, Yingjiu Li, Robert. H Deng, Binanda Sengupta, Guomin Yang
2019/742 (PDF ) Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps
2019/741 (PDF ) Comprehensive Security Analysis of CRAFT Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Nasour Bagheri
2019/740 (PDF ) A Secure Publish/Subscribe Protocol for Internet of Things Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak
2019/739 (PDF ) A Survey on Authenticated Encryption -- ASIC Designer's Perspective Elif Bilge Kavun, Hristina Mihajloska, Tolga Yalcin
2019/737 (PDF ) Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
2019/736 (PDF ) Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE Hao Chen, Ilaria Chillotti, Ling Ren
2019/735 (PDF ) SoK of Used Cryptography in Blockchain Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019/734 (PDF ) From Usability to Secure Computing and Back Again Lucy Qin, Andrei Lapets, Frederick Jansen, Peter Flockhart, Kinan Dak Albab, Ira Globus-Harris, Shannon Roberts, Mayank Varia
2019/733 (PDF ) Compressible FHE with Applications to PIR Craig Gentry, Shai Halevi
2019/732 (PDF ) Fully Homomorphic NIZK and NIWI Proofs Prabhanjan Ananth, Apoorvaa Deshpande, Yael Tauman Kalai, Anna Lysyanskaya
2019/731 (PDF ) On the Complexity of ``Superdetermined'' Minrank Instances Javier Verbel, John Baena, Daniel Cabarcas, Ray Perlner, Daniel Smith-Tone
2019/730 (PDF ) PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH Vladimir Soukharev, Basil Hess
2019/729 (PDF ) Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients Jingwei Zhang, Shuhong Gao, Chang-An Zhao
2019/728 (PDF ) Verifying Solutions to LWE with Implications for Concrete Security Palash Sarkar, Subhadip Singha
2019/727 (PDF ) Iterative Differential Characteristic of TRIFLE-BC Fukang Liu, Takanori Isobe
2019/726 (PDF ) A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange Pedro Branco, Jintai Ding, Manuel Goulão, Paulo Mateus
2019/725 (PDF ) He Gives C-Sieves on the CSIDH Chris Peikert
2019/724 (PDF ) Breaking Tweakable Enciphering Schemes using Simon's Algorithm Sebati Ghosh, Palash Sarkar
2019/723 (PDF ) On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality Mihaela Ion, Ben Kreuter, Ahmet Erhan Nergiz, Sarvar Patel, Mariana Raykova, Shobhit Saxena, Karn Seth, David Shanahan, Moti Yung
2019/722 (PDF ) Neural Network Model Assessment for Side-Channel Analysis Guilherme Perin, Baris Ege, Lukasz Chmielewski
2019/721 (PDF ) Optimized SIKE Round 2 on 64-bit ARM Hwajeong Seo, Amir Jalali, Reza Azarderakhsh
2019/720 (PDF ) Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
2019/718 (PDF ) Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority Marina Blanton, Ahreum Kang, Chen Yuan
2019/717 (PDF ) Homomorphism learning problems and its applications to public-key cryptography Christopher Leonardi, Luis Ruiz-Lopez
2019/716 (PDF ) On the Quantum Complexity of the Continuous Hidden Subgroup Problem Koen de Boer, Léo Ducas, Serge Fehr
2019/715 (PDF ) On the Security of Lattice-based Fiat-Shamir Signatures in the Presence of Randomness Leakage Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming
2019/714 (PDF ) Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang
2019/713 (PDF ) Public Ledger for Sensitive Data Riccardo Longo, Massimiliano Sala
2019/712 (PDF ) SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting Shay Gueron, Yehuda Lindell
2019/711 (PDF ) SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation Brian Koziel, A-Bon Ackie, Rami El Khatib, Reza Azarderakhsh, Mehran Mozaffari-Kermani
2019/709 (PDF ) Secure Computation for Cloud data Storage Davood Rezaeipour
2019/708 (PDF ) Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions Luís T. A. N. Brandão, Çağdaş Çalık, Meltem Sönmez Turan, René Peralta
2019/707 (PDF ) Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions Olivier Blazy, Céline Chevalier, Quoc Huy Vu
2019/706 (PDF ) Endemic Oblivious Transfer Daniel Masny, Peter Rindal
2019/705 (PDF ) Commodity-Based 2PC for Arithmetic Circuits Ivan Damgård, Helene Haagh, Michael Nielsen, Claudio Orlandi
2019/704 (PDF ) Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese
2019/703 (PDF ) A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation Carolyn Whitnall, Elisabeth Oswald
2019/702 (PDF ) Cryptanalysis of Plantlet Subhadeep Banik, Khashayar Barooti, Takanori Isobe
2019/701 (PDF ) Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs Hiroaki Anada
2019/700 (PDF ) SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki
2019/699 (PDF ) Tight quantum security of the Fiat-Shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes André Chailloux
2019/698 (PDF ) A Formal Treatment of Deterministic Wallets Poulami Das, Sebastian Faust, Julian Loss
2019/697 (PDF ) Breaking ACORN with a Single Fault Elena Dubrova
2019/696 (PDF ) Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments Masayuki Abe, Miguel Ambrona, Miyako Ohkubo
2019/695 (PDF ) An Efficient Secure Three-Party Sorting Protocol with an Honest Majority Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas
2019/694 (PDF ) A Unified and Composable Take on Ratcheting Daniel Jost, Ueli Maurer, Marta Mularczyk
2019/693 (PDF ) Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions Raphael Bost, Pierre-Alain Fouque
2019/692 (PDF ) Synchronous Consensus with Optimal Asynchronous Fallback Guarantees Erica Blum, Jonathan Katz, Julian Loss
2019/691 (PDF ) Comparing proofs of security for lattice-based encryption Daniel J. Bernstein
2019/690 (PDF ) Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
2019/689 (PDF ) On-Device Power Analysis Across Hardware Security Domains Colin O'Flynn, Alex Dewar
2019/688 (PDF ) Better Bootstrapping for Approximate Homomorphic Encryption Kyoohyung Han, Dohyeong Ki
2019/687 (PDF ) General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography Zhengfeng Ji, Youming Qiao, Fang Song, Aaram Yun
2019/686 (PDF ) On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations Nir Bitansky, Akshay Degwekar
2019/685 (PDF ) Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5 Markku-Juhani O. Saarinen
2019/684 (PDF ) Revelio: A MimbleWimble Proof of Reserves Protocol Arijit Dutta, Saravanan Vijayakumaran
2019/683 (PDF ) The Notion of Transparency Order, Revisited Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin
2019/682 (PDF ) Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX Alexandros Bakas, Antonis Michalas
2019/681 (PDF ) Lattice-based Cryptography for IoT in A Quantum World: Are We Ready? Ayesha Khalid, Sarah McCarthy, Weiqiang Liu, Maire O’Neill
2019/680 (PDF ) Non-Commutative Ring Learning With Errors From Cyclic Algebras Charles Grover, Andrew Mendelsohn, Cong Ling, Roope Vehkalahti
2019/679 (PDF ) Forgery Attacks on FlexAE and FlexAEAD Maria Eichlseder, Daniel Kales, Markus Schofnegger
2019/678 (PDF ) A Modified pqsigRM: RM Code-Based Signature Scheme Yongwoo Lee, Wijik Lee, Young-Sik Kim, Jong-Seon No
2019/677 (PDF ) A Note on Lower Digits Extraction Polynomial for Bootstrapping Mingjia Huo, Kewen Wu, Qi Ye
2019/676 (PDF ) Robust and Scalable Consensus for Sharded Distributed Ledgers Eleftherios Kokoris-Kogias
2019/675 (PDF ) Balance: Dynamic Adjustment of Cryptocurrency Deposits Dominik Harz, Lewis Gudgeon, Arthur Gervais, William J. Knottenbelt
2019/674 (PDF ) Polar Sampler: A Novel Bernoulli Sampler Using Polar Codes with Application to Integer Gaussian Sampling Jiabo Wang, Cong Ling
2019/673 (PDF ) A New Approach to Constructing Digital Signature Schemes (Extended Paper) Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu
2019/672 (PDF ) A Blockchain-Assisted Hash-Based Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2019/671 (PDF ) A Server-Assisted Hash-Based Signature Scheme Ahto Buldas, Risto Laanoja, Ahto Truu
2019/670 (PDF ) On designing secure small-state stream ciphers against time-memory-data tradeoff attacks Vahid Amin Ghafari, Honggang Hu, Fujiang Lin
2019/669 (PDF ) Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect Yunwen Liu, Yu Sasaki
2019/668 (PDF ) New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160 Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao
2019/667 (PDF ) PPAD-Hardness via Iterated Squaring Modulo a Composite Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
2019/666 (PDF ) On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling Zheng Wang, Cong Ling
2019/665 (PDF ) Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption Jintai Ding, Pedro Branco, Kevin Schmitt
2019/664 (PDF ) How Diversity Affects Deep-Learning Side-Channel Attacks Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova
2019/663 (PDF ) Can Verifiable Delay Functions be Based on Random Oracles? Mohammad Mahmoody, Caleb Smith, David J. Wu
2019/662 (PDF ) Generalized Proofs of Knowledge with Fully Dynamic Setup Christian Badertscher, Daniel Jost, Ueli Maurer
2019/661 (PDF ) Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa
2019/660 (PDF ) Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling Zheng Wang, Cong Ling
2019/659 (PDF ) Tight Verifiable Delay Functions Nico Döttling, Sanjam Garg, Giulio Malavolta, Prashant Nalini Vasudevan
2019/658 (PDF ) Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest Jun Furukawa, Yehuda Lindell
2019/657 (PDF ) Multi-Party PSM, Revisited: Improved Communication and Unbalanced Communication Leonard Assouline, Tianren Liu
2019/655 (PDF ) Visualizing size-security tradeoffs for lattice-based encryption Daniel J. Bernstein
2019/654 (PDF ) Concise Linkable Ring Signatures and Forgery Against Adversarial Keys Brandon Goodell, Sarang Noether, Arthur Blue
2019/653 (PDF ) On the Local Leakage Resilience of Linear Secret Sharing Schemes Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
2019/652 (PDF ) The Exchange Attack: How to Distinguish Six Rounds of AES with $2^{88.2}$ chosen plaintexts Navid Ghaedi Bardeh, Sondre Rønjom
2019/651 (PDF ) Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing Muhammad Ishaq, Ana Milanova, Vassilis Zikas
2019/650 (PDF ) Incremental Proofs of Sequential Work Nico Döttling, Russell W. F. Lai, Giulio Malavolta
2019/649 (PDF ) Txilm: Lossy Block Compression with Salted Short Hashing Donghui Ding, Xin Jiang, Jiaping Wang, Hao Wang, Xiaobing Zhang, Yi Sun
2019/648 (PDF ) Efficient Invisible and Unlinkable Sanitizable Signatures Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan
2019/647 (PDF ) Strong Asymmetric PAKE based on Trapdoor CKEM Tatiana Bradley, Stanislaw Jarecki, Jiayu Xu
2019/646 (PDF ) Communication-Efficient Unconditional MPC with Guaranteed Output Delivery Vipul Goyal, Yanyi Liu, Yifan Song
2019/645 (PDF ) Attribute Based Encryption for Deterministic Finite Automata from DLIN Shweta Agrawal, Monosij Maitra, Shota Yamada
2019/644 (PDF ) Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era- Aydin Abadi, Michele Ciampi, Aggelos Kiayias, Vassilis Zikas
2019/643 (PDF ) Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai
2019/642 (PDF ) Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs Jonathan Bootle, Vadim Lyubashevsky, Gregor Seiler
2019/641 (PDF ) Simulation Extractability in Groth's zk-SNARK Shahla Atapoor, Karim Baghery
2019/640 (PDF ) On Round Optimal Statistical Zero Knowledge Arguments Nir Bitansky, Omer Paneth
2019/639 (PDF ) Trapdoor Hash Functions and Their Applications Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky
2019/638 (PDF ) On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography Ferucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica
2019/637 (PDF ) Cryptographic Sensing Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
2019/636 (PDF ) Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs
2019/635 (PDF ) Homomorphic Time-Lock Puzzles and Applications Giulio Malavolta, Sri Aravinda Krishnan Thyagarajan
2019/634 (PDF ) SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension Benny Pinkas, Mike Rosulek, Ni Trieu, Avishay Yanai
2019/633 (PDF ) New non-linearity parameters of Boolean functions Igor Semaev
2019/632 (PDF ) Fully Homomorphic Encryption for RAMs Ariel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs
2019/631 (PDF ) Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge Cody Freitag, Ilan Komargodski, Rafael Pass
2019/630 (PDF ) ABE for DFA from k-Lin Junqing Gong, Brent Waters, Hoeteck Wee
2019/629 (PDF ) Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE Shweta Agrawal, Monosij Maitra, Shota Yamada
2019/628 (PDF ) Watermarking Public-Key Cryptographic Primitives Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu
2019/627 (PDF ) Unconditionally Secure Computation Against Low-Complexity Leakage Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
2019/626 (PDF ) Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge Vipul Goyal, Aayush Jain, Amit Sahai
2019/625 (PDF ) Public-Key Cryptography in the Fine-Grained Setting Rio Lavigne, Andrea Lincoln, Virginia Vassilevska Williams
2019/624 (PDF ) Nonces are Noticed: AEAD Revisited Mihir Bellare, Ruth Ng, Björn Tackmann
2019/623 (PDF ) Exploring Constructions of Compact NIZKs from Various Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2019/622 (PDF ) Extended Truncated-differential Distinguishers on Round-reduced AES Zhenzhen Bao, Jian Guo, Eik List
2019/621 (PDF ) A Modified Simple Substitution Cipher With Unbounded Unicity Distance Bruce Kallick
2019/620 (PDF ) Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems Steven D. Galbraith, Lukas Zobernig
2019/619 (PDF ) Continuous Verifiable Delay Functions Naomi Ephraim, Cody Freitag, Ilan Komargodski, Rafael Pass
2019/618 (PDF ) Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods Fukang Liu, Takanori Isobe
2019/617 (PDF ) Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model Sebastian Gajek, Marco Lewandowsky
2019/616 (PDF ) Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak
2019/615 (PDF ) My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks Siemen Dhooghe, Svetla Nikova
2019/614 (PDF ) Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher
2019/613 (PDF ) MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks Taha Atahan Akyildiz, Can Berk Guzgeren, Cemal Yilmaz, Erkay Savas
2019/611 (PDF ) Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set Thaddeus Dryja
2019/610 (PDF ) Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem Jean-Sebastien Coron, Agnese Gini
2019/609 (PDF ) CPA-to-CCA Transformation for KDM Security Fuyuki Kitagawa, Takahiro Matsuda
2019/608 (PDF ) Symmetric Primitives with Structured Secrets Navid Alamati, Hart Montgomery, Sikhar Patranabis
2019/607 (PDF ) Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang
2019/606 (PDF ) An Efficient and Provable Masked Implementation of qTESLA François Gérard, Mélissa Rossi
2019/605 (PDF ) A note on different types of ransomware attacks Mihail Anghel, Andrei Racautanu
2019/604 (PDF ) New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan
2019/603 (PDF ) How to Delegate Computations Publicly Yael Kalai, Omer Paneth, Lisa Yang
2019/602 (PDF ) Continuously Non-Malleable Secret Sharing for General Access Structures Gianluca Brian, Antonio Faonio, Daniele Venturi
2019/601 (PDF ) AuroraLight: Improved prover efficiency and SRS size in a Sonic-like system Ariel Gabizon
2019/600 (PDF ) ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu
2019/599 (PDF ) New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning Ivan Damgård, Daniel Escudero, Tore Frederiksen, Marcel Keller, Peter Scholl, Nikolaj Volgushev
2019/597 (PDF ) A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio Shahram Khazaei
2019/596 (PDF ) Discretisation and Product Distributions in Ring-LWE Sean Murphy, Rachel Player
2019/595 (PDF ) DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero Pedro Moreno-Sanchez, Arthur Blue, Duc V. Le, Sarang Noether, Brandon Goodell, Aniket Kate
2019/594 (PDF ) Computing Primitive Idempotents in Finite Commutative Rings and Applications Mugurel Barcau, Vicentiu Pasol
2019/593 (PDF ) On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces V. Ustimenko, M. Klisowski
2019/592 (PDF ) Statistical Analysis and Anonymity of TOR's Path Selection Andrei Mogage, Emil Simion
2019/591 (PDF ) Simulating Homomorphic Evaluation of Deep Learning Predictions Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
2019/590 (PDF ) Tighter proofs of CCA security in the quantum random oracle model Nina Bindel, Mike Hamburg, Kathrin Hövelmanns, Andreas Hülsing, Edoardo Persichetti
2019/589 (PDF ) A${^2}$L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs Erkan Tairi, Pedro Moreno-Sanchez, Matteo Maffei
2019/588 (PDF ) Formal Notions of Security for Verifiable Homomorphic Encryption Jakub Klemsa, Ivana Trummová
2019/587 (PDF ) Polygraph: Accountable Byzantine Agreement Pierre Civit, Seth Gilbert, Vincent Gramoli
2019/586 (PDF ) Simulation-Extractable zk-SNARK with a Single Verification Jihye Kim, Jiwon Lee, Hyunok Oh
2019/585 (PDF ) On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay
2019/583 (PDF ) Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks Christoph Egger, Pedro Moreno-Sanchez, Matteo Maffei
2019/582 (PDF ) EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security Ran Canetti, Alley Stoughton, Mayank Varia
2019/580 (PDF ) Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs Russell W. F. Lai, Viktoria Ronge, Tim Ruffing, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Jiafan Wang
2019/579 (PDF ) BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices Dominic Letz
2019/578 (PDF ) Deep Learning based Side Channel Attacks in Practice Houssem Maghrebi
2019/577 (PDF ) Improved Multiplication Triple Generation over Rings via RLWE-based AHE Deevashwer Rathee, Thomas Schneider, K. K. Shukla
2019/576 (PDF ) On Group-Characterizability of Homomorphic Secret Sharing Schemes Reza Kaboli, Shahram Khazaei, Maghsoud Parviz
2019/575 (PDF ) On Abelian and Homomorphic Secret Sharing Schemes Amir Jafari, Shahram Khazaei
2019/574 (PDF ) Subliminal channels in post-quantum digital signature schemes Herman Galteland, Kristian Gjøsteen
2019/573 (PDF ) Security of the Suffix Keyed Sponge Christoph Dobraunig, Bart Mennink
2019/572 (PDF ) On the Commitment Capacity of Unfair Noisy Channels Claude Crépeau, Rafael Dowsley, Anderson C. A. Nascimento
2019/571 (PDF ) Multi-Party Virtual State Channels Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, Kristina Hostáková
2019/570 (PDF ) Bias-variance Decomposition in Machine Learning-based Side-channel Analysis Daan van der Valk, Stjepan Picek
2019/569 (PDF ) Lattice RingCT v2.0 with Multiple Input and Output Wallets Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng
2019/568 (PDF ) Post Quantum ECC on FPGA Platform Debapriya Basu Roy, Debdeep Mukhopadhyay
2019/567 (PDF ) (Linkable) Ring Signature from Hash-Then-One-Way Signature Xingye Lu, Man Ho Au, Zhenfei Zhang
2019/566 (PDF ) Deep Learning based Model Building Attacks on Arbiter PUF Compositions Pranesh Santikellur, Aritra Bhattacharyay, Rajat Subhra Chakraborty
2019/565 (PDF ) Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption Nirvan Tyagi, Paul Grubbs, Julia Len, Ian Miers, Thomas Ristenpart
2019/564 (PDF ) Verification of Authenticated Firmware Load Sujit Kumar Muduli, Pramod Subramanyan, Sayak Ray
2019/563 (PDF ) ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA Omer Shlomovits, István András Seres
2019/562 (PDF ) Towards More Secure Constructions of Adjustable Join Schemes Shahram Khazaei, Mojtaba Rafiee
2019/561 (PDF ) Faster Bootstrapping of FHE over the integers with large prime message space Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang
2019/560 (PDF ) Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$ Kwang Ho Kim, Jong Hyok Choe, Dok Nam Lee, Dae Song Go, Sihem Mesnager
2019/559 (PDF ) Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables Evgeny K. Alekseev, Lyudmila A. Kushchinskaya
2019/558 (PDF ) How to not break SIDH Chloe Martindale, Lorenz Panny
2019/557 (PDF ) Extended Galbraith's Test on the Anonymity of IBEs from Higher Residuosity Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao
2019/556 (PDF ) When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop) Gideon Samid
2019/555 (PDF ) Optimal TNFS-secure pairings on elliptic curves with composite embedding degree Georgios Fotiadis, Chloe Martindale
2019/554 (PDF ) How to Build Pseudorandom Functions From Public Random Permutations Yu Long Chen, Eran Lambooij, Bart Mennink
2019/553 (PDF ) Towards post-quantum symmetric cryptography John Gregory Underhill, Stiepan Aurélien Kovac, Xenia Bogomolec
2019/552 (PDF ) Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space Binyi Chen, Yilei Chen, Kristina Hostáková, Pratyay Mukherjee
2019/551 (PDF ) A note on the correlations between NIST cryptographic statistical tests suite Emil Simion, Paul Burciu
2019/550 (PDF ) Spartan: Efficient and general-purpose zkSNARKs without trusted setup Srinath Setty
2019/549 (PDF ) Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir Arka Rai Choudhuri, Pavel Hubacek, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
2019/548 (PDF ) About Wave Implementation and its Leakage Immunity Thomas Debris-Alazard, Nicolas Sendrier, Jean-Pierre Tillich
2019/547 (PDF ) Linearly-Homomorphic Signatures and Scalable Mix-Nets Chloé Hébant, Duong Hieu Phan, David Pointcheval
2019/546 (PDF ) Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies David Cerezo Sánchez
2019/544 (PDF ) Evaluation of Code-based Signature Schemes Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto
2019/543 (PDF ) TMPS: Ticket-Mediated Password Strengthening John Kelsey, Dana Dachman-Soled, Sweta Mishra, Meltem Sonmez Turan
2019/542 (PDF ) Formally Verified Cryptographic Web Applications in WebAssembly Jonathan Protzenko, Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan
2019/541 (PDF ) A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement James Shook, Scott Simon, Peter Mell
2019/540 (PDF ) A chosen key attack against the secret S-boxes of GOST Markku-Juhani O. Saarinen
2019/539 (PDF ) Cryptanalysis of FlexAEAD Mostafizar Rahman, Dhiman Saha, Goutam Paul
2019/538 (PDF ) On Perfect Endomorphic Ciphers Nikolay Shenets
2019/537 (PDF ) Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard
2019/536 (PDF ) Protecting against Statistical Ineffective Fault Attacks Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Florian Mendel, Robert Primas
2019/535 (PDF ) SIKE Round 2 Speed Record on ARM Cortex-M4 Hwajeong soe, Amir Jalali, Reza Azarderakhsh
2019/534 (PDF ) Theoretical and Practical Approaches for Hardness Amplification of PUFs Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Domenic Forte, Mark Tehranipoor
2019/533 (PDF ) Stopping time signatures for some algorithms in cryptography Percy Deift, Stephen D. Miller, Thomas Trogdon
2019/532 (PDF ) Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography Carsten Baum, Ariel Nof
2019/531 (PDF ) How to Correct Errors in Multi-Server PIR Kaoru Kurosawa
2019/530 (PDF ) Speed-up of SCA attacks on 32-bit multiplications Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad
2019/529 (PDF ) UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions Pedro Branco, Manuel Goulão, Paulo Mateus
2019/528 (PDF ) Anomalies and Vector Space Search: Tools for S-Box Analysis (Full Version) Xavier Bonnetain, Léo Perrin, Shizhu Tian
2019/527 (PDF ) Revisiting Privacy-aware Blockchain Public Key Infrastructure Olamide Omolola, Paul Plessing
2019/526 (PDF ) Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman Cas Cremers, Dennis Jackson
2019/525 (PDF ) Misuse Attacks on Post-Quantum Cryptosystems Ciprian Băetu, F. Betül Durak, Loïs Huguenin-Dumittan, Abdullah Talayhan, Serge Vaudenay
2019/524 (PDF ) Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference Hao Chen, Wei Dai, Miran Kim, Yongsoo Song
2019/523 (PDF ) Threshold ECDSA from ECDSA Assumptions: The Multiparty Case Jack Doerner, Yashvanth Kondi, Eysa Lee, abhi shelat
2019/522 (PDF ) Secret-Sharing from Robust Conditional Disclosure of Secrets Amos Beimel, Naty Peter
2019/521 (PDF ) Fully Homomorphic Encryption with k-bit Arithmetic Operations Benjamin M. Case, Shuhong Gao, Gengran Hu, Qiuxia Xu
2019/520 (PDF ) A Note on Sub-Gaussian Random Variables Benjamin M. Case, Colin Gallagher, Shuhong Gao
2019/519 (PDF ) Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications Christopher Patton, Thomas Shrimpton
2019/518 (PDF ) Fast Database Joins and PSI for Secret Shared Data Payman Mohassel, Peter Rindal, Mike Rosulek
2019/517 (PDF ) Mobile Private Contact Discovery at Scale Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, Christian Weinert
2019/516 (PDF ) CellTree: A New Paradigm for Distributed Data Repositories Anasuya Acharya, Manoj Prabhakaran, Akash Trehan
2019/515 (PDF ) A Countermeasure Against Statistical Ineffective Fault Analysis Jakub Breier, Mustafa Khairallah, Xiaolu Hou, Yang Liu
2019/514 (PDF ) Pixel: Multi-signatures for Consensus Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee
2019/513 (PDF ) New Code-Based Privacy-Preserving Cryptographic Constructions Khoa Nguyen, Hanh Tang, Huaxiong Wang, Neng Zeng
2019/512 (PDF ) Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu
2019/511 (PDF ) GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
2019/510 (PDF ) Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang
2019/509 (PDF ) New Slide Attacks on Almost Self-Similar Ciphers Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
2019/508 (PDF ) RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu
2019/507 (PDF ) Simple Schemes in the Bounded Storage Model Jiaxin Guan, Mark Zhandry
2019/506 (PDF ) Forward Security with Crash Recovery for Secure Logs Erik-Oliver Blass, Guevara Noubir
2019/505 (PDF ) DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations Thorben Moos, Felix Wegener, Amir Moradi
2019/504 (PDF ) Afgjort: A Partially Synchronous Finality Layer for Blockchains Thomas Dinsdale-Young, Bernardo Magri, Christian Matt, Jesper Buus Nielsen, Daniel Tschudi
2019/503 (PDF ) Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2019/502 (PDF ) A refined analysis of the cost for solving LWE via uSVP Shi Bai, Shaun Miller, Weiqiang Wen
2019/501 (PDF ) Optimal Merging in Quantum k-xor and k-sum Algorithms María Naya-Plasencia, André Schrottenloher
2019/500 (PDF ) An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster Jean-Claude Bajard, Julien Eynard, Paulo Martins, Leonel Sousa, Vincent Zucca
2019/499 (PDF ) Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography Michael Naehrig, Joost Renes
2019/498 (PDF ) CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations Ward Beullens, Thorsten Kleinjung, Frederik Vercauteren
2019/497 (PDF ) Forward and Backward-Secure Range-Searchable Symmetric Encryption Jiafan Wang, Sherman S. M. Chow
2019/496 (PDF ) Non-malleability for quantum public-key encryption Christian Majenz, Christian Schaffner, Jeroen van Wier
2019/495 (PDF ) Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited Marc Joye
2019/494 (PDF ) On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/493 (PDF ) Evaluating the effectiveness of heuristic worst-case noise analysis in FHE Anamaria Costache, Kim Laine, Rachel Player
2019/492 (PDF ) Decisional second-preimage resistance: When does SPR imply PRE? Daniel J. Bernstein, Andreas Hülsing
2019/491 (PDF ) Best Information is Most Successful Eloi de Cherisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida
2019/490 (PDF ) Sigma protocols for MQ, PKP and SIS, and fishy signature schemes Ward Beullens
2019/489 (PDF ) Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 Leon Botros, Matthias J. Kannwischer, Peter Schwabe
2019/488 (PDF ) Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication Alan Kaminsky
2019/487 (PDF ) From Single-Input to Multi-Client Inner-Product Functional Encryption Michel Abdalla, Fabrice Benhamouda, Romain Gay
2019/486 (PDF ) Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment Suhyeon Lee, Seungjoo Kim
2019/485 (PDF ) A taxonomy of pairings, their security, their complexity Razvan Barbulescu, Nadia El Mrabet, Loubna Ghammam
2019/484 (PDF ) New Number-Theoretic Cryptographic Primitives Eric Brier, Houda Ferradi, Marc Joye, David Naccache
2019/483 (PDF ) Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations Pierrick Méaux, Claude Carlet, Anthony Journault, François-Xavier Standaert
2019/482 (PDF ) Tiny WireGuard Tweak Jacob Appelbaum, Chloe Martindale, Peter Wu
2019/481 (PDF ) An Efficient and Compact Reformulation of NIST Collision Estimate Test Prasanna Raghaw Mishra, Bhartendu Nandan, Navneet Gaba
2019/480 (PDF ) On the Efficiency of Privacy-Preserving Smart Contract Systems Karim Baghery
2019/479 (PDF ) Extended 3-Party ACCE and Application to LoRaWAN 1.1 Sébastien Canard, Loïc Ferreira
2019/478 (PDF ) BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme Sarah McCarthy, James Howe, Neil Smyth, Seamus Brannigan, Máire O’Neill
2019/477 (PDF ) The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects Matter Cas Cremers, Britta Hale, Konrad Kohbrok
2019/476 (PDF ) On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T Muhammad ElSheikh, Ahmed Abdelkhalek, Amr M. Youssef
2019/475 (PDF ) Dual-Mode NIZKs from Obfuscation Dennis Hofheinz, Bogdan Ursu
2019/473 (PDF ) A Method to Reduce the Key Size of UOV Signature Scheme Chengdong Tao
2019/472 (PDF ) Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM) Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E Gunnells
2019/471 (PDF ) UC-Secure CRS Generation for SNARKs Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michal Zajac
2019/470 (PDF ) A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals Niek J. Bouman, Niels de Vreede
2019/469 (PDF ) Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks Rui Qiao, Qinglong Wang, Zongtao Duan, Na Fan
2019/468 (PDF ) The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem Alessandro Budroni, Andrea Tenti
2019/467 (PDF ) Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version) Clément Massart, François-Xavier Standaert
2019/465 (PDF ) Towards a Practical Cluster Analysis over Encrypted Data Jung Hee Cheon, Duhyeong Kim, Jai Hyun Park
2019/464 (PDF ) The complexity of MinRank Alessio Caminata, Elisa Gorla
2019/463 (PDF ) In Pursuit of Clarity In Obfuscation Allison Bishop, Lucas Kowalczyk, Tal Malkin, Valerio Pastro, Mariana Raykova, Kevin Shi
2019/462 (PDF ) How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11 Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes
2019/461 (PDF ) Physical Security of Deep Learning on Edge Devices: Comprehensive Evaluation of Fault Injection Attack Vectors Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu
2019/460 (PDF ) Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny
2019/459 (PDF ) From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1 Gaëtan Leurent, Thomas Peyrin
2019/458 (PDF ) Poseidon: A New Hash Function for Zero-Knowledge Proof Systems Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, Markus Schofnegger
2019/457 (PDF ) Forgery Attack on mixFeed in the Nonce-Misuse Scenario Mustafa Khairallah
2019/456 (PDF ) UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting Peifang Ni, Hongda Li, Xianning Meng, Dongxue Pan
2019/455 (PDF ) FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol João Otávio Massari Chervinski, Diego Kreutz, Jiangshan Yu
2019/454 (PDF ) Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks Ryan Karl, Timothy Burchfield, Jonathan Takeshita, Taeho Jung
2019/453 (PDF ) A New Approach to Modelling Centralised Reputation Systems Lydia Garms, Elizabeth A. Quaglia
2019/452 (PDF ) A Central Limit Framework for Ring-LWE Noise Analysis Sean Murphy, Rachel Player
2019/451 (PDF ) Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher Francesco Berti, Olivier Pereira, François-Xavier Standaert
2019/450 (PDF ) HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data Chenglu Jin, Zheng Yang, Sridhar Adepu, Jianying Zhou
2019/449 (PDF ) Limits to Non-Malleability Marshall Ball, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin
2019/448 (PDF ) Efficient Pseudorandom Correlation Generators: Silent OT Extension and More Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
2019/447 (PDF ) Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier
2019/446 (PDF ) Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions Sanjit Chatterjee, Shravan Kumar Parshuram Puria, Akash Shah
2019/445 (PDF ) Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu
2019/444 (PDF ) Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy Gildas Avoine, Sébastien Canard, Loïc Ferreira
2019/443 (PDF ) Contingent payments on a public ledger: models and reductions for automated verification Sergiu Bursuc, Steve Kremer
2019/442 (PDF ) K2SN-MSS: An Efficient Post-Quantum Signature (Full Version) Sabyasachi Karati, Reihaneh Safavi-Naini
2019/441 (PDF ) The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution Evgenios M. Kornaropoulos, Charalampos Papamanthou, Roberto Tamassia
2019/440 (PDF ) Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
2019/439 (PDF ) A Comprehensive Study of Deep Learning for Side-Channel Analysis Loïc Masure, Cécile Dumas, Emmanuel Prouff
2019/438 (PDF ) Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti
2019/437 (PDF ) Efficient coding for secure computing with additively-homomorphic encrypted data Thijs Veugen
2019/436 (PDF ) Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework Benjamin Dowling, Paul Rösler, Jörg Schwenk
2019/435 (PDF ) A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope Yue Qin, Chi Cheng, Jintai Ding
2019/434 (PDF ) Masking Fuzzy-Searchable Public Databases Alexandra Boldyreva, Tianxin Tang, Bogdan Warinschi
2019/433 (PDF ) Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru
2019/432 (PDF ) Cryptanalysis of a System Based on Twisted Reed-Solomon Codes Julien Lavauzelle, Julian Renner
2019/431 (PDF ) Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation Aurore Guillevic, Simon Masson, Emmanuel Thomé
2019/429 (PDF ) ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh
2019/428 (PDF ) Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur
2019/427 (PDF ) Improved Secure Integer Comparison via Homomorphic Encryption Florian Bourse, Olivier Sanders, Jacques Traoré
2019/426 (PDF ) Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, Alan Szepieniec
2019/425 (PDF ) Homomorphic Training of 30,000 Logistic Regression Models Flavio Bergamaschi, Shai Halevi, Tzipora T. Halevi, Hamish Hunt
2019/423 (PDF ) Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name Peter T. Breuer
2019/422 (PDF ) Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound Alexander Moch, Eik List
2019/421 (PDF ) Continuing to reflect on TLS 1.3 with external PSK Liliya Akhmetzyanova, Evgeny Alekseev, Ekaterina Smyshlyaeva, Alexandr Sokolov
2019/420 (PDF ) Improving Speed of Dilithium’s Signing Procedure Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin
2019/419 (PDF ) Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC Martin R. Albrecht, Carlos Cid, Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
2019/418 (PDF ) Sharing of Encrypted files in Blockchain Made Simpler S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan
2019/417 (PDF ) Numerical Method for Comparison on Homomorphically Encrypted Numbers Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun Hee Lee, Keewoo Lee
2019/416 (PDF ) How many transactions per second can bitcoin really handle ? Theoretically. Evangelos Georgiadis
2019/415 (PDF ) Refinement and Verification of CBC Casper Ryuya Nakamura, Takayuki Jimba, Dominik Harz
2019/414 (PDF ) Two-Round Oblivious Transfer from CDH or LPN Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs
2019/413 (PDF ) On the Streaming Indistinguishability of a Random Permutation and a Random Function Itai Dinur
2019/412 (PDF ) On the complexity of the Permuted Kernel Problem Eliane KOUSSA, Gilles MACARIO-RAT, Jacques PATARIN
2019/411 (PDF ) Exploring the Monero Peer-to-Peer Network Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Verissimo
2019/410 (PDF ) Policy-Based Sanitizable Signatures Kai Samelin, Daniel Slamanig
2019/409 (PDF ) Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes Houda Ferradi, Keita Xagawa
2019/408 (PDF ) Forgery Attack on SNEIKEN Mustafa Khairallah
2019/407 (PDF ) Privacy-Preserving Network Path Validation Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng
2019/406 (PDF ) Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
2019/405 (PDF ) A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware Jo Vliegen, Md Masoom Rabbani, Mauro Conti, Nele Mentens
2019/404 (PDF ) Efficient Message Authentication Codes with Combinatorial Group Testing Kazuhiko Minematsu
2019/403 (PDF ) Fast and simple constant-time hashing to the BLS12-381 elliptic curve Riad S. Wahby, Dan Boneh
2019/402 (PDF ) ILC: A Calculus for Composable, Computational Cryptography Kevin Liao, Matthew A. Hammer, Andrew Miller
2019/401 (PDF ) Side-Channel assessment of Open Source Hardware Wallets Manuel San Pedro, Victor Servant, Charles Guillemet
2019/400 (PDF ) Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL Akira Takahashi, Mehdi Tibouchi
2019/399 (PDF ) Inception makes non-malleable codes shorter as well! Divesh Aggarwal, Maciej Obremski
2019/398 (PDF ) Constant-Round Group Key Exchange from the Ring-LWE Assumption Daniel Apon, Dana Dachman-Soled, Huijing Gong, Jonathan Katz
2019/397 (PDF ) Feistel Structures for MPC, and More Martin R. Albrecht, Lorenzo Grassi, Leo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
2019/396 (PDF ) Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries Evangelia Anna Markatou, Roberto Tamassia
2019/395 (PDF ) Full Database Reconstruction with Access and Search Pattern Leakage Evangelia Anna Markatou, Roberto Tamassia
2019/394 (PDF ) Masking Dilithium: Efficient Implementation and Side-Channel Evaluation Vincent Migliore, Benoit Gérard, Mehdi Tibouchi, Pierre-Alain Fouque
2019/393 (PDF ) A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence Itay Berman, Iftach Haitner, Eliad Tsfadia
2019/392 (PDF ) New Conditional Cube Attack on Keccak Keyed Modes Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier
2019/391 (PDF ) Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense Biswabandan Panda
2019/390 (PDF ) KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures Michael Specter, Sunoo Park, Matthew Green
2019/389 (PDF ) Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution Sauvik Bhattacharya, Oscar Garcia-Morchon, Rachel Player, Ludo Tolhuizen
2019/388 (PDF ) Towards Secret-Free Security Ulrich Rührmair
2019/387 (PDF ) SoK : On DFA Vulnerabilities of Substitution-Permutation Networks Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin
2019/386 (PDF ) Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt
2019/385 (PDF ) Miller Inversion is Easy for the Reduced Tate Pairing of Embedding Degree Greater than one Takakazu Satoh
2019/384 (PDF ) What Storage Access Privacy is Achievable with Small Overhead? Sarvar Patel, Giuseppe Persiano, Kevin Yeo
2019/383 (PDF ) Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd Mathy Vanhoef, Eyal Ronen
2019/382 (PDF ) Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length Daniel Gardham, Mark Manulis
2019/380 (PDF ) A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit Kazumasa Shinagawa, Koji Nuida
2019/379 (PDF ) Non-Malleable Codes for Decision Trees Marshall Ball, Siyao Guo, Daniel Wichs
2019/378 (PDF ) pRate: Anonymous Star Rating with Rating Secrecy Jia Liu, Mark Manulis
2019/377 (PDF ) Lower Bounds for Oblivious Near-Neighbor Search Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo
2019/376 (PDF ) SELL v1.0: Searchable Encrypted Logging Library Amir Jalali, Neil Davenport
2019/375 (PDF ) Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters Xavier Bultel, Pascal Lafourcade
2019/374 (PDF ) Probability 1 Iterated Differential in the SNEIK Permutation Léo Perrin
2019/373 (PDF ) Lelantus: A New Design for Anonymous and Confidential Cryptocurrencies Aram Jivanyan
2019/372 (PDF ) Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap
2019/371 (PDF ) Adding Linkability to Ring Signatures with One-Time Signatures Xueli Wang, Yu Chen, Xuecheng Ma
2019/370 (PDF ) Indifferentiability for Public Key Cryptosystems Mark Zhandry, Cong Zhang
2019/369 (PDF ) On the EA-classes of known APN functions in small dimensions Marco Calderini
2019/368 (PDF ) Strong Post-Compromise Secure Proxy Re-Encryption Alex Davidson, Amit Deo, Ela Lee, Keith Martin
2019/367 (PDF ) SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting Olivier Blazy, Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Elena Pagnin
2019/366 (PDF ) Triggerflow: Regression Testing by Advanced Execution Path Inspection Iaroslav Gridin, Cesar Pereida García, Nicola Tuveri, Billy Bob Brumley
2019/365 (PDF ) Fully Secure Attribute-Based Encryption for $t$-CNF from LWE Rotem Tsabary
2019/364 (PDF ) Everybody's a Target: Scalability in Public-Key Encryption Benedikt Auerbach, Federico Giacon, Eike Kiltz
2019/363 (PDF ) Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs Pratish Datta, Tatsuaki Okamoto, Katsuyuki Takashima
2019/362 (PDF ) Game Channels: State Channels for the Gambling Industry with Built-In PRNG Alisa Cherniaeva, Ilia Shirobokov, Alexander Davydov
2019/361 (PDF ) On polynomial secret sharing schemes Anat Paskin-Chernivasky, Artiom Radune
2019/360 (PDF ) SoK: Layer-Two Blockchain Protocols Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, Arthur Gervais
2019/359 (PDF ) SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search Hao Chen, Ilaria Chillotti, Yihe Dong, Oxana Poburinnaya, Ilya Razenshteyn, M. Sadegh Riazi
2019/358 (PDF ) One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA Leo Weissbart, Stjepan Picek, Lejla Batina
2019/357 (PDF ) Lattice-based proof of a shuffle Núria Costa, Ramiro Martínez, Paz Morillo
2019/356 (PDF ) Ad Hoc Multi-Input Functional Encryption Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, Justin Thaler
2019/355 (PDF ) To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks Anubhab Baksi, Dhiman Saha, Sumanta Sarkar
2019/354 (PDF ) Benchmarking Privacy Preserving Scientific Operations Abdelrahaman Aly, Nigel P. Smart
2019/353 (PDF ) A Faster Constant-time Algorithm of CSIDH keeping Two Points Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi
2019/352 (PDF ) SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies Maxim Jourenko, Kanta Kurazumi, Mario Larangeira, Keisuke Tanaka
2019/351 (PDF ) Forward Secrecy of SPAKE2 Jose Becerra, Dimiter Ostrev, Marjan Skrobot
2019/350 (PDF ) nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski
2019/349 (PDF ) Spin Me Right Round: Rotational Symmetry for FPGA-specific AES Felix Wegener, Lauren De Meyer, Amir Moradi
2019/348 (PDF ) Efficient and Scalable Universal Circuits Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider
2019/347 (PDF ) Selfie: reflections on TLS 1.3 with PSK Nir Drucker, Shay Gueron
2019/346 (PDF ) Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm Christophe Clavier, Leo Reynaud, Antoine Wurcker
2019/345 (PDF ) Second-order Scatter Attack Hugues Thiebeauld, Aurélien Vasselle, Antoine Wurcker
2019/344 (PDF ) Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja
2019/343 (PDF ) Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input Aurelien Vasselle, Antoine Wurcker
2019/342 (PDF ) LightChain: A DHT-based Blockchain for Resource Constrained Environments Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap
2019/341 (PDF ) MixEth: efficient, trustless coin mixing service for Ethereum István András Seres, Dániel A. Nagy, Chris Buckland, Péter Burcsi
2019/340 (PDF ) Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys Antoine Wurcker
2019/339 (PDF ) Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers Yusuke Naito, Takeshi Sugawara
2019/338 (PDF ) Garbled Neural Networks are Practical Marshall Ball, Brent Carmer, Tal Malkin, Mike Rosulek, Nichole Schimanski
2019/337 (PDF ) Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
2019/336 (PDF ) DEEP-FRI: Sampling Outside the Box Improves Soundness Eli Ben-Sasson, Lior Goldberg, Swastik Kopparty, Shubhangi Saraf
2019/335 (PDF ) Examining the Practical Side Channel Resilience of ARX-boxes Yan Yan, Elisabeth Oswald
2019/334 (PDF ) Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova
2019/333 (PDF ) Key-and-Argument-Updatable QA-NIZKs Helger Lipmaa
2019/332 (PDF ) Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields Benjamin Hong Meng Tan, Hyung Tae Lee, Huaxiong Wang, Shu Qin Ren, Khin Mi Mi Aung
2019/331 (PDF ) Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, David Jao
2019/330 (PDF ) Practical Supersingular Isogeny Group Key Agreement Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev
2019/329 (PDF ) Doubly half-injective PRGs for incompressible white-box cryptography Estuardo Alpirez Bock, Alessandro Amadori, Joppe W. Bos, Chris Brzuska, Wil Michiels
2019/328 (PDF ) On the Difficulty of Hiding the Balance of Lightning Network Channels Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquin Garcia-Alfaro
2019/327 (PDF ) Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers Gembu Ito, Tetsu Iwata
2019/326 (PDF ) Shorter Pairing-based Arguments under Standard Assumptions Alonso Gonzalez, Carla Rafols
2019/325 (PDF ) An Efficient Private Evaluation of a Decision Graph Hiroki Sudo, Koji Nuida, Kana Shimizu
2019/324 (PDF ) A Traceable Ring Signature Scheme based on Coding Theory Pedro Branco, Paulo Mateus
2019/323 (PDF ) Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited Sabyasachi Dutta, Kouichi Sakurai
2019/322 (PDF ) A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj
2019/321 (PDF ) Horizontal Collision Correlation Attack on Elliptic Curves Aurélie Bauer, Eliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild
2019/320 (PDF ) Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
2019/319 (PDF ) PGC: Pretty Good Decentralized Confidential Payment System with Auditability Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au
2019/318 (PDF ) Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256 Boyu Ni, Xiaoyang Dong
2019/317 (PDF ) Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation Tiancheng Xie, Jiaheng Zhang, Yupeng Zhang, Charalampos Papamanthou, Dawn Song
2019/316 (PDF ) Extended Affine and CCZ Equivalence up to Dimension 4 Marcus Brinkmann
2019/315 (PDF ) Blockchains from Non-Idealized Hash Functions Juan A. Garay, Aggelos Kiayias, Giorgos Panagiotakos
2019/314 (PDF ) Optimal Bounded-Collusion Secure Functional Encryption Prabhanjan Ananth, Vinod Vaikuntanathan
2019/313 (PDF ) A SAT-based approach for index calculus on binary elliptic curves Monika Trimoska, Sorina Ionica, Gilles Dequen
2019/312 (PDF ) Side-Channel Analysis of the TERO PUF Lars Tebelmann, Michael Pehl, Vincent Immler
2019/311 (PDF ) Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering
2019/310 (PDF ) A Formal Approach to Secure Speculation Kevin Cheang, Cameron Rasmussen, Sanjit Seshia, Pramod Subramanyan
2019/309 (PDF ) Cryptanalysis of CLT13 Multilinear Maps with Independent Slots Jean-Sebastien Coron, Luca Notarnicola
2019/308 (PDF ) Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation Yuan Kang, Chengyu Lin, Tal Malkin, Mariana Raykova
2019/307 (PDF ) Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$ Kwang Ho Kim, Sihem Mesnager
2019/306 (PDF ) Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields Madhurima Mukhopadhyay, Palash Sarkar
2019/305 (PDF ) Practical Algebraic Side-Channel Attacks Against ACORN Alexandre Adomnicai, Laurent Masson, Jacques J. A. Fournier
2019/304 (PDF ) Ternary Syndrome Decoding with Large Weight Rémi Bricout, André Chailloux, Thomas Debris-Alazard, Matthieu Lequesne
2019/303 (PDF ) Analysis of TPL Signature Scheme Terry Shue Chien Lau, Chik How Tan, Theo Fanuela Prabowo
2019/302 (PDF ) A Survey of Leakage-Resilient Cryptography Yael Tauman Kalai, Leonid Reyzin
2019/301 (PDF ) Safe Compilation for Encrypted Computing Peter T. Breuer, Simon Pickin
2019/300 (PDF ) Transient Effect Ring Oscillators Leak Too Ugo Mureddu, Brice Colombier, Nathalie Bochard, Lilian Bossuet, Viktor Fischer
2019/299 (PDF ) A Generic Construction of Revocable Identity-Based Encryption Xuecheng Ma, Dongdai Lin
2019/298 (PDF ) Improved Classical Cryptanalysis of SIKE in Practice Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia
2019/297 (PDF ) Towards Optimized and Constant-Time CSIDH on Embedded Devices Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao
2019/296 (PDF ) Hash functions from superspecial genus-2 curves using Richelot isogenies Wouter Castryck, Thomas Decru, Benjamin Smith
2019/295 (PDF ) Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng
2019/294 (PDF ) Semi-parallel Logistic Regression for GWAS on Encrypted Data Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio
2019/293 (PDF ) Impossibility of Strong KDM Security with Auxiliary Input Cody Freitag, Ilan Komargodski, Rafael Pass
2019/292 (PDF ) Timing attacks on Error Correcting Codes in Post-Quantum Schemes Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede
2019/291 (PDF ) CCA Security and Trapdoor Functions via Key-Dependent-Message Security Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka
2019/290 (PDF ) Cost effective techniques for chip delayering and in-situ depackaging Philippe Loubet Moundi
2019/289 (PDF ) Cryptanalysis of ForkAES Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki
2019/288 (PDF ) On the construction of S-boxes using the leaders and followers metaheuristic Alejandro Freyre-Echevarría, Ismel Martínez-Díaz
2019/287 (PDF ) Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields A. N. Alekseychuk, S. M. Koniushok, M. V. Poremskyi
2019/286 (PDF ) Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function Yindong Chen, Fei Guo, Liu Zhang
2019/285 (PDF ) SpaceFlip : Unbound Geometry Cryptography Gideon Samid
2019/284 (PDF ) Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2 Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2019/283 (PDF ) An Attack on Small Private Keys of RSA Based on Euclidean Algorithm Dimitrios Poulakis
2019/282 (PDF ) A Framework for Cryptographic Problems from Linear Algebra Carl Bootland, Wouter Castryck, Alan Szepieniec, Frederik Vercauteren
2019/281 (PDF ) Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning Phillipp Schoppmann, Adria Gascon, Mariana Raykova, Benny Pinkas
2019/280 (PDF ) Multi-Authority Attribute-Based Encryption from LWE in the OT Model Sam Kim
2019/279 (PDF ) A Note on Key Agreement and Non-Interactive Commitments Alex Lombardi, Luke Schaeffer
2019/278 (PDF ) Uncovering Algebraic Structures in the MPC Landscape Navneet Agarwal, Sanat Anand, Manoj Prabhakaran
2019/277 (PDF ) On the boomerang uniformity of quadratic permutations Sihem Mesnager, Chunming Tang, Maosheng Xiong
2019/276 (PDF ) BOREALIS: Building Block for Sealed Bid Auctions on Blockchains Erik-Oliver Blass, Florian Kerschbaum
2019/275 (PDF ) MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation M. Sadegh Riazi, Mojan Javaheripi, Siam U. Hussain, Farinaz Koushanfar
2019/274 (PDF ) Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue Elaine Shi
2019/273 (PDF ) Compressing Vector OLE Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
2019/272 (PDF ) Quantum Security Analysis of AES Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
2019/271 (PDF ) A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs) Jintai Ding, Chi Cheng, Yue Qin
2019/270 (PDF ) Sync HotStuff: Simple and Practical Synchronous State Machine Replication Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Maofan Yin
2019/269 (PDF ) Digital Signatures for Consensus Sergey Gorbunov, Hoeteck Wee
2019/268 (PDF ) Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys* Sergei Bauer, Martin Brunner, Peter Schartner
2019/267 (PDF ) Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon. Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
2019/266 (PDF ) Fast constant-time gcd computation and modular inversion Daniel J. Bernstein, Bo-Yin Yang
2019/265 (PDF ) TEX - A Securely Scalable Trustless Exchange Rami Khalil, Arthur Gervais, Guillaume Felley
2019/264 (PDF ) Unifying computational entropies via Kullback-Leibler divergence Rohit Agrawal, Yi-Hsiu Chen, Thibaut Horel, Salil Vadhan
2019/263 (PDF ) Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones Jiaping Wang, Hao Wang
2019/262 (PDF ) Revisiting Post-Quantum Fiat-Shamir Qipeng Liu, Mark Zhandry
2019/261 (PDF ) Forward-Secure Multi-Signatures Manu Drijvers, Gregory Neven
2019/260 (PDF ) A Modular Treatment of Blind Signatures from Identification Schemes Eduard Hauck, Eike Kiltz, Julian Loss
2019/259 (PDF ) A Practical Method to Recover Exact Superpoly in Cube Attack SenPeng Wang, Bin Hu, Jie Guan, Kai Zhang, TaiRong Shi
2019/258 (PDF ) Tight Time-Memory Trade-offs for Symmetric Encryption Joseph Jaeger, Stefano Tessaro
2019/257 (PDF ) Uncloneable Quantum Encryption via Oracles Anne Broadbent, Sébastien Lord
2019/256 (PDF ) DLCT: A New Tool for Differential-Linear Cryptanalysis Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
2019/255 (PDF ) Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa
2019/254 (PDF ) A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries Divesh Aggarwal, Kai-Min Chung, Han-Hsuan Lin, Thomas Vidick
2019/253 (PDF ) Founding Secure Computation on Blockchains Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain
2019/252 (PDF ) Reversible Proofs of Sequential Work Hamza Abusalah, Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Michael Walter
2019/251 (PDF ) Consensus through Herding T-H. Hubert Chan, Rafael Pass, Elaine Shi
2019/250 (PDF ) Function-Dependent Commitments from Homomorphic Authenticators Lucas Schabhüser, Denis Butin, Johannes Buchmann
2019/249 (PDF ) Revisiting Variable Output Length XOR Pseudorandom Function Srimanta Bhattacharya, Mridul Nandi
2019/248 (PDF ) Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach Ting Li, Yao Sun
2019/247 (PDF ) Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources Andrea Coladangelo, Alex B. Grilo, Stacey Jeffery, Thomas Vidick
2019/246 (PDF ) Towards optimal robust secret sharing with security against a rushing adversary Serge Fehr, Chen Yuan
2019/245 (PDF ) Distributed Differential Privacy via Shuffling Albert Cheu, Adam Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaev
2019/244 (PDF ) Attacks Only Get Better: How to Break FF3 on Large Domains Viet Tung Hoang, David Miller, Ni Trieu
2019/243 (PDF ) 4-Round Luby-Rackoff Construction is a qPRP: Tight Quantum Security Bound Akinori Hosoyamada, Tetsu Iwata
2019/242 (PDF ) New Constructions of Reusable Designated-Verifier NIZKs Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu
2019/241 (PDF ) Efficient Circuit-based PSI with Linear Communication Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, Avishay Yanai
2019/240 (PDF ) Correlated-Source Extractors and Cryptography with Correlated-Random Tapes Vipul Goyal, Yifan Song
2019/239 (PDF ) Cheaper Private Set Intersection via Differentially Private Leakage Adam Groce, Peter Rindal, Mike Rosulek
2019/238 (PDF ) Robust Encryption, Extended Rémi Géraud, David Naccache, Răzvan Roşie
2019/237 (PDF ) Optimal Oblivious Priority Queues Zahra Jafargholi, Kasper Green Larsen, Mark Simkin
2019/236 (PDF ) Designated-verifier pseudorandom generators, and their applications Geoffroy Couteau, Dennis Hofheinz
2019/235 (PDF ) Reusable Designated-Verifier NIZKs for all NP from CDH Willy Quach, Ron D. Rothblum, Daniel Wichs
2019/234 (PDF ) On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm Léo Ducas, Maxime Plançon, Benjamin Wesolowski
2019/233 (PDF ) Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption Nuttapong Attrapadung
2019/232 (PDF ) On Quantum Advantage in Information Theoretic Single-Server PIR Dorit Aharonov, Zvika Brakerski, Kai-Min Chung, Ayal Green, Ching-Yi Lai, Or Sattath
2019/231 (PDF ) Secret-Sharing Schemes for General and Uniform Access Structures Benny Applebaum, Amos Beimel, Oriol Farràs, Oded Nir, Naty Peter
2019/230 (PDF ) Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino
2019/229 (PDF ) XOR-counts and lightweight multiplication with fixed elements in binary finite fields Lukas Kölsch
2019/228 (PDF ) Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT Nimrod Aviram, Kai Gellert, Tibor Jager
2019/227 (PDF ) Securing Update Propagation with Homomorphic Hashing Kevin Lewi, Wonho Kim, Ilya Maykov, Stephen Weis
2019/226 (PDF ) Flyclient: Super-Light Clients for Cryptocurrencies Benedikt Bünz, Lucianna Kiffer, Loi Luu, Mahdi Zamani
2019/225 (PDF ) Leakage Resilience of the Duplex Construction Christoph Dobraunig, Bart Mennink
2019/224 (PDF ) Compact Adaptively Secure ABE for NC1 from k-Lin Lucas Kowalczyk, Hoeteck Wee
2019/223 (PDF ) Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan
2019/222 (PDF ) (R)CCA Secure Updatable Encryption with Integrity Protection Michael Klooß, Anja Lehmann, Andy Rupp
2019/221 (PDF ) Group Signatures without NIZK: From Lattices in the Standard Model Shuichi Katsumata, Shota Yamada
2019/220 (PDF ) Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing Ivan Damgård, Kasper Green Larsen, Jesper Buus Nielsen
2019/219 (PDF ) Nitro Protocol Tom Close
2019/218 (PDF ) Computational Limitations in Robust Classification and Win-Win Results Akshay Degwekar, Vinod Vaikuntanathan
2019/217 (PDF ) A family of boolean functions with good cryptographic properties Guillermo Sosa Gómez, Octavio Paez Osuna
2019/216 (PDF ) Round Optimal Secure Multiparty Computation from Minimal Assumptions Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky
2019/215 (PDF ) Approx-SVP in Ideal Lattices with Pre-processing Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
2019/214 (PDF ) Four-Round Secure Multiparty Computation from General Assumptions Michele Ciampi, Rafail Ostrovsky
2019/213 (PDF ) On ELFs, Deterministic Encryption, and Correlated-Input Security Mark Zhandry
2019/212 (PDF ) A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes Hossein Oraei, Massoud Hadian Dehkordi
2019/211 (PDF ) MonZa: Fast Maliciously Secure Two Party Computation on Z_{2^k} Dario Catalano, Mario Di Raimondo, Dario Fiore, Irene Giacomelli
2019/210 (PDF ) CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
2019/209 (PDF ) SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki
2019/208 (PDF ) Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Muzhou Li, Kai Hu, Meiqin Wang
2019/207 (PDF ) MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security Dragos Rotaru, Tim Wood
2019/206 (PDF ) Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography James Howe, Ayesha Khalid, Marco Martinoli, Francesco Regazzoni, Elisabeth Oswald
2019/205 (PDF ) A note on isogeny-based hybrid verifiable delay functions Barak Shani
2019/204 (PDF ) The Security of All Private-key Bits in Isogeny-based Schemes Barak Shani
2019/203 (PDF ) Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures Osman Bicer, Alptekin Kupcu
2019/202 (PDF ) The Distinction Between Fixed and Random Generators in Group-Based Assumptions James Bartusek, Fermi Ma, Mark Zhandry
2019/201 (PDF ) DL-Extractable UC-Commitment Schemes Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim, Michał Zając
2019/200 (PDF ) Degree 2 is Complete for the Round-Complexity of Malicious MPC Benny Applebaum, Zvika Brakerski, Rotem Tsabary
2019/199 (PDF ) Password-Authenticated Public-Key Encryption Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu
2019/198 (PDF ) Seedless Fruit is the Sweetest: Random Number Generation, Revisited Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro
2019/197 (PDF ) Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions Esteban Landerreche, Marc Stevens, Christian Schaffner
2019/196 (PDF ) Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider
2019/195 (PDF ) Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, Changmin Lee
2019/194 (PDF ) Classical zero-knowledge arguments for quantum computations Thomas Vidick, Tina Zhang
2019/193 (PDF ) Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/192 (PDF ) An Omission-Tolerant Cryptographic Checksum Francisco Corella, Karen Lewison
2019/191 (PDF ) Zether: Towards Privacy in a Smart Contract World Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh
2019/190 (PDF ) Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
2019/189 (PDF ) An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis Yaoling Ding, An Wang, Siu Ming YIU
2019/188 (PDF ) Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
2019/187 (PDF ) Fully homomorphic encryption modulo Fermat numbers Antoine Joux
2019/186 (PDF ) Re-thinking untraceability in the CryptoNote-style blockchain Jiangshan Yu, Man Ho Allen Au, Paulo Esteves-Verissimo
2019/185 (PDF ) Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019/184 (PDF ) Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj
2019/183 (PDF ) Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm Katherine E. Stange
2019/182 (PDF ) Security is an Architectural Design Constraint Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin
2019/181 (PDF ) Lower Bounds for Leakage-Resilient Secret Sharing Jesper Buus Nielsen, Mark Simkin
2019/180 (PDF ) Disco: Modern Session Encryption David Wong
2019/179 (PDF ) Synchronous, with a Chance of Partition Tolerance Yue Guo, Rafael Pass, Elaine Shi
2019/178 (PDF ) LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness Rohit Sinha, Sivanarayana Gaddam, Ranjit Kumaresan
2019/177 (PDF ) Genus Two Isogeny Cryptography E. V. Flynn, Yan Bo Ti
2019/176 (PDF ) Homomorphic Encryption for Finite Automata Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, Daniele Micciancio
2019/175 (PDF ) The Communication Complexity of Threshold Private Set Intersection Satrajit Ghosh, Mark Simkin
2019/174 (PDF ) Towards an Exponential Lower Bound for Secret Sharing Kasper Green Larsen, Mark Simkin
2019/173 (PDF ) Shorter Quadratic QA-NIZK Proofs Vanesa Daza, Alonso González, Zaira Pindado, Carla Ràfols, Javier Silva
2019/172 (PDF ) Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu
2019/171 (PDF ) XONN: XNOR-based Oblivious Deep Neural Network Inference M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, Farinaz Koushanfar
2019/170 (PDF ) Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes Lingyue Qin, Xiaoyang Dong, Keting Jia, Rui Zong
2019/169 (PDF ) Updatable Anonymous Credentials and Applications to Incentive Systems Johannes Blömer, Jan Bobolz, Denis Diemert, Fabian Eidens
2019/168 (PDF ) Profiling Side-channel Analysis in the Efficient Attacker Framework Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley
2019/167 (PDF ) Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks Shuwen Deng, Wenjie Xiong, Jakub Szefer
2019/166 (PDF ) Verifiable Delay Functions from Supersingular Isogenies and Pairings Luca De Feo, Simon Masson, Christophe Petit, Antonio Sanso
2019/165 (PDF ) libInterMAC: Beyond Confidentiality and Integrity in Practice Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
2019/164 (PDF ) Use your Brain! Arithmetic 3PC For Any Modulus with Active Security Hendrik Eerikson, Marcel Keller, Claudio Orlandi, Pille Pullonen, Joonas Puura, Mark Simkin
2019/163 (PDF ) Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder Melissa Azouaoui, Romain Poussier, François-Xavier Standaert
2019/162 (PDF ) A New Blockchain Proposal Supporting Multi-Stage Proof-of-Work Palash Sarkar
2019/161 (PDF ) Understanding Optimizations and Measuring Performances of PBKDF2 Andrea Francesco Iuorio, Andrea Visconti
2019/160 (PDF ) FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
2019/159 (PDF ) MPC with Synchronous Security and Asynchronous Responsiveness Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi
2019/158 (PDF ) Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors Chris Peikert, Sina Shiehian
2019/157 (PDF ) Schnorr-based implicit certification: improving the security and efficiency of V2X communications Paulo S. L. M. Barreto, Marcos A. Simplicio Jr., Jefferson E. Ricardini, Harsh Kupwade Patil
2019/156 (PDF ) Efficient Constructions for Almost-everywhere Secure Computation Siddhartha Jayanti, Srinivasan Raghuraman, Nikhil Vyas
2019/155 (PDF ) Constant-time BCH Error-Correcting Code Matthew Walters, Sujoy Sinha Roy
2019/154 (PDF ) FastKitten: Practical Smart Contracts on Bitcoin Poulami Das, Lisa Eckey, Tommaso Frassetto, David Gens, Kristina Hostáková, Patrick Jauernig, Sebastian Faust, Ahmad-Reza Sadeghi
2019/153 (PDF ) Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren
2019/152 (PDF ) Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon
2019/151 (PDF ) Solving binary MQ with Grover's algorithm Peter Schwabe, Bas Westerbaan
2019/150 (PDF ) QcBits: Constant-Time Small-Key Code-Based Cryptography Tung Chou
2019/149 (PDF ) Improved Lattice-based CCA2-Secure PKE in the Standard Model Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang
2019/148 (PDF ) On the efficiency of pairing-based proofs under the d-PKE Ariel Gabizon
2019/147 (PDF ) Practical Collision Attacks against Round-Reduced SHA-3 Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song
2019/146 (PDF ) Boomerang Connectivity Table Revisited Ling Song, Xianrui Qin, Lei Hu
2019/145 (PDF ) Achieving GWAS with Homomorphic Encryption Jun Jie Sim, Fook Mun Chan, Shibin Chen, Benjamin Hong Meng Tan, Khin Mi Mi Aung
2019/144 (PDF ) Modeling Power Efficiency of S-boxes Using Machine Learning Rajat Sadhukhan, Nilanjan Datta, Debdeep Mukhopadhyay
2019/143 (PDF ) Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery Benjamin Hettwer, Stefan Gehrer, Tim Güneysu
2019/142 (PDF ) LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs Matteo Campanelli, Dario Fiore, Anaïs Querol
2019/141 (PDF ) A General Proof Framework for Recent AES Distinguishers Christina Boura, Anne Canteaut, Daniel Coggia
2019/140 (PDF ) CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning Jinhyun So, Basak Guler, A. Salman Avestimehr, Payman Mohassel
2019/139 (PDF ) Vulnerability and Remedy of Stripped Function Logic Locking Hai Zhou, Yuanqi Shen, Amin Rezaei
2019/138 (PDF ) Unifying Leakage Models on a Rényi Day Thomas Prest, Dahmun Goudarzi, Ange Martinelli, Alain Passelègue
2019/137 (PDF ) TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2019/136 (PDF ) Divisible E-Cash from Constrained Pseudo-Random Functions Florian Bourse, David Pointcheval, Olivier Sanders
2019/135 (PDF ) It wasn't me! Repudiability and Unclaimability of Ring Signatures Sunoo Park, Adam Sealfon
2019/134 (PDF ) Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/133 (PDF ) On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography. Vasyl Ustimenko
2019/132 (PDF ) Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert
2019/131 (PDF ) Secure Evaluation of Quantized Neural Networks Anders Dalskov, Daniel Escudero, Marcel Keller
2019/130 (PDF ) Are Certificate Thumbprints Unique? Greg Zaverucha, Dan Shumow
2019/129 (PDF ) Homomorphic Secret Sharing from Lattices Without FHE Elette Boyle, Lisa Kohl, Peter Scholl
2019/128 (PDF ) Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions Junichi Tomida
2019/127 (PDF ) Beyond Birthday Bound Secure MAC in Faulty Nonce Model Avijit Dutta, Mridul Nandi, Suprita Talnikar
2019/126 (PDF ) New Automatic search method for Truncated-differential characteristics: Application to Midori, SKINNY and CRAFT AmirHossein E. Moghaddam, Zahra Ahmadian
2019/124 (PDF ) Anomalous Look at Provable Security Douglas Wikström
2019/123 (PDF ) Security of Multilinear Galois Mode (MGM) Liliya Akhmetzyanova, Evgeny Alekseev, Grigory Karpunin, Vladislav Nozdrunov
2019/122 (PDF ) Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry
2019/121 (PDF ) Anonymous Attestation for IoT Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry
2019/120 (PDF ) Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019 Keita Xagawa
2019/119 (PDF ) On the security of the BCTV Pinocchio zk-SNARK variant Ariel Gabizon
2019/117 (PDF ) Non-Interactive Keyed-Verification Anonymous Credentials Geoffroy Couteau, Michael Reichle
2019/116 (PDF ) Multi-Key Homomophic Encryption from TFHE Hao Chen, Ilaria Chillotti, Yongsoo Song
2019/115 (PDF ) Distributional Collision Resistance Beyond One-Way Functions Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev
2019/114 (PDF ) Fast Multiparty Threshold ECDSA with Fast Trustless Setup Rosario Gennaro, Steven Goldfeder
2019/113 (PDF ) Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure Ferucio Laurentiu Tiplea, Cristian Hristea
2019/112 (PDF ) Variable Elimination - a Tool for Algebraic Cryptanalysis Bjørn Greve, Øyvind Ytrehus, Håvard Raddum
2019/111 (PDF ) On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi
2019/110 (PDF ) Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
2019/109 (PDF ) Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture Ahmet Can Mert, Erdinc Ozturk, Erkay Savas
2019/108 (PDF ) Minicrypt Primitives with Algebraic Structure and Applications Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy
2019/107 (PDF ) Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
2019/106 (PDF ) Identity-Based Higncryption Hongbing Wang, Yunlei Zhao
2019/105 (PDF ) Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate Antonio Faonio, Daniele Venturi
2019/104 (PDF ) BADGER - Blockchain Auditable Distributed (RSA) key GEneRation Naomi Farley, Robert Fitzpatrick, Duncan Jones
2019/103 (PDF ) Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE Samuel Jaques, John M. Schanck
2019/102 (PDF ) Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum Hisham S. Galal, Amr M. Youssef
2019/101 (PDF ) Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramon Troncoso-Pastoriza
2019/100 (PDF ) Power Analysis on NTRU Prime Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang
2019/099 (PDF ) Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn
2019/098 (PDF ) A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions Pedro Branco
2019/097 (PDF ) Linearly equivalent S-boxes and the Division Property Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin
2019/096 (PDF ) On Recovering Affine Encodings in White-Box Implementations Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud
2019/095 (PDF ) Variants of the AES Key Schedule for Better Truncated Differential Bounds Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin
2019/094 (PDF ) CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges Aron Gohr, Sven Jacob, Werner Schindler
2019/092 (PDF ) Partitions in the S-Box of Streebog and Kuznyechik Léo Perrin
2019/091 (PDF ) Efficient Zero-Knowledge for NP from Secure Two-Party Computation Li Hongda, Pan Dongxue, Ni Peifang
2019/090 (PDF ) Round5: Compact and Fast Post-Quantum Public-Key Encryption Hayo Baan, Sauvik Bhattacharya, Scott Fluhrer, Oscar Garcia-Morchon, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang
2019/089 (PDF ) The General Sieve Kernel and New Records in Lattice Reduction Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
2019/088 (PDF ) Continuous Key Agreement with Reduced Bandwidth Nir Drucker, Shay Gueron
2019/087 (PDF ) The Secure Link Prediction Problem Laltu Sardar, Sushmita Ruj
2019/086 (PDF ) Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG George Teseleanu
2019/085 (PDF ) The Lattice-Based Digital Signature Scheme qTESLA Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Kramer, Patrick Longa, Jefferson E. Ricardini
2019/084 (PDF ) An Information Obfuscation Calculus for Encrypted Computing Peter T. Breuer
2019/083 (PDF ) Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 Zhen Liu, Yanbin Pan, Zhenfei Zhang
2019/082 (PDF ) Arithmetic Garbling from Bilinear Maps Nils Fleischhacker, Giulio Malavolta, Dominique Schröder
2019/081 (PDF ) Practical Group-Signatures with Privacy-Friendly Openings Stephan Krenn, Kai Samelin, Christoph Striecks
2019/080 (PDF ) Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing Aner Ben Efraim, Michael Nielsen, Eran Omri
2019/079 (PDF ) New Results about the Boomerang Uniformity of Permutation Polynomials Kangquan Li, Longjiang Qu, Bing Sun, Chao Li
2019/078 (PDF ) Testing the Randomness of Cryptographic Function Mappings Alan Kaminsky
2019/077 (PDF ) Pairing Implementation Revisited Michael Scott
2019/076 (PDF ) Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations Matthieu Rivain, Junwei Wang
2019/075 (PDF ) Assessment of the Key-Reuse Resilience of NewHope Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
2019/074 (PDF ) Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu
2019/073 (PDF ) Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model Cristian Hristea, Ferucio Laurentiu Tiplea
2019/072 (PDF ) ZeroCT: Improving ZeroCoin with Confidential Transactions and more Alex Vazquez
2019/071 (PDF ) Repeatable Oblivious Shuffling of Large Outsourced Data Blocks Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong
2019/070 (PDF ) Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt
2019/069 (PDF ) Quantum Indistinguishability of Random Sponges Jan Czajkowski, Andreas Hülsing, Christian Schaffner
2019/068 (PDF ) Sampling the Integers with Low Relative Error Michael Walter
2019/067 (PDF ) Managing Your Kleptographic Subscription Plan George Teseleanu
2019/066 (PDF ) Publicly Verifiable Proofs from Blockchains Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti
2019/065 (PDF ) Multi-Protocol UC and its Use for Building Modular and Efficient Protocols Jan Camenisch, Manu Drijvers, Björn Tackmann
2019/064 (PDF ) A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management Keita Emura, Takuya Hayashi
2019/063 (PDF ) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov
2019/062 (PDF ) Additively Homomorphic IBE from Higher Residuosity Michael Clear, Ciaran McGoldrick
2019/061 (PDF ) SigAttack: New High-level SAT-based Attack on Logic Encryptions Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou
2019/060 (PDF ) CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou
2019/059 (PDF ) BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou
2019/058 (PDF ) Tightly secure hierarchical identity-based encryption Roman Langrehr, Jiaxin Pan
2019/057 (PDF ) Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts Rafael del Pino, Vadim Lyubashevsky, Gregor Seiler
2019/056 (PDF ) Obfuscating simple functionalities from knowledge assumptions Ward Beullens, Hoeteck Wee
2019/055 (PDF ) Rate-Optimizing Compilers for Continuously Non-Malleable Codes Sandro Coretti, Antonio Faonio, Daniele Venturi
2019/054 (PDF ) Deep Learning to Evaluate Secure RSA Implementations Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, Francois Dassance, Guillaume Dufresne, Cecile Dumas, Emmanuel Prouff, Alexandre Venelli
2019/052 (PDF ) Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model Haodong Jiang, Zhenfeng Zhang, Zhi Ma
2019/051 (PDF ) Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu
2019/050 (PDF ) Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka
2019/049 (PDF ) The Relationship between the Construction and Solution of the MILP Models and Applications Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang
2019/048 (PDF ) Sub-logarithmic Distributed Oblivious RAM with Small Block Size Eyal Kushilevitz, Tamer Mour
2019/047 (PDF ) NIST Post-Quantum Cryptography- A Hardware Evaluation Study Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri
2019/046 (PDF ) Block-Anti-Circulant Unbalanced Oil and Vinegar Alan Szepieniec, Bart Preneel
2019/045 (PDF ) Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio Ryo Nishimaki, Takashi Yamakawa
2019/044 (PDF ) Toha Key Hardened Function Ahmad Almorabea
2019/043 (PDF ) A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke Qian Guo, Thomas Johansson, Alexander Nilsson
2019/042 (PDF ) Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs Lisa Kohl
2019/041 (PDF ) Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher Bartosz Zoltak
2019/040 (PDF ) NTTRU: Truly Fast NTRU Using NTT Vadim Lyubashevsky, Gregor Seiler
2019/039 (PDF ) Fully Invisible Protean Signatures Schemes Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2019/038 (PDF ) Identity-based Broadcast Encryption with Efficient Revocation Aijun Ge, Puwen Wei
2019/037 (PDF ) Improving Attacks on Round-Reduced Speck32/64 using Deep Learning Aron Gohr
2019/036 (PDF ) Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR Shuichi Katsumata, Shota Yamada
2019/035 (PDF ) Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ Carsten Baum, Daniele Cozzo, Nigel P. Smart
2019/034 (PDF ) A Formal Treatment of Hardware Wallets Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias
2019/033 (PDF ) FE for Inner Products and Its Application to Decentralized ABE Zhedong Wang, Xiong Fan, Feng-Hao Liu
2019/032 (PDF ) Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation Steven Galbraith, Jake Massimo, Kenneth G. Paterson
2019/031 (PDF ) Collusion Resistant Broadcast and Trace from Positional Witness Encryption Rishab Goyal, Satyanarayana Vusirikala, Brent Waters
2019/028 (PDF ) nQUIC: Noise-Based QUIC Packet Protection Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator
2019/027 (PDF ) Group Signatures with Selective Linkability Lydia Garms, Anja Lehmann
2019/026 (PDF ) Non-malleable encryption with proofs of plaintext knowledge and applications to voting Ben Smyth, Yoshikazu Hanatani
2019/025 (PDF ) STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang
2019/024 (PDF ) A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou, Shu-Mei Hsu
2019/023 (PDF ) Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies Joachim Breitner, Nadia Heninger
2019/022 (PDF ) The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl
2019/021 (PDF ) CryptoNote+ Ilya Aldanov
2019/020 (PDF ) Decentralizing Inner-Product Functional Encryption Michel Abdalla, Fabrice Benhamouda, Markulf Kolhweiss, Hendrik Waldner
2019/019 (PDF ) Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang
2019/018 (PDF ) Generic Constructions of Robustly Reusable Fuzzy Extractor Yunhua Wen, Shengli Liu, Dawu Gu
2019/017 (PDF ) CHURP: Dynamic-Committee Proactive Secret Sharing Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song
2019/016 (PDF ) Fast Message Franking: From Invisible Salamanders to Encryptment Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage
2019/015 (PDF ) More Efficient Algorithms for the NTRU Key Generation using the Field Norm Thomas Pornin, Thomas Prest
2019/014 (PDF ) BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan
2019/013 (PDF ) The Science of Guessing in Collision Optimized Divide-and-Conquer Attacks Changhai Ou, Siew-Kei Lam, Guiyuan Jiang
2019/012 (PDF ) A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$ Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee
2019/011 (PDF ) Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson
2019/010 (PDF ) Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC Rodrigo Abarzúa, Claudio Valencia, Julio López
2019/009 (PDF ) On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner
2019/008 (PDF ) One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren
2019/007 (PDF ) Tight Security Bounds for Generic Stream Cipher Constructions Matthias Hamann, Matthias Krause
2019/006 (PDF ) Minimizing Trust in Hardware Wallets with Two Factor Signatures Antonio Marcedone, Rafael Pass, abhi shelat
2019/005 (PDF ) ScanSAT: Unlocking Obfuscated Scan Chains Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu
2019/004 (PDF ) On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le
2019/002 (PDF ) Leakage-Resilient Group Signature: Definitions and Constructions Jianye Huang, Qiong Huang
2019/001 (PDF ) Sanctorum: A lightweight security monitor for secure enclaves Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas
[ Cryptology ePrint archive ]